0% found this document useful (0 votes)
55 views

Cyber Security 100

Cyber security combines concepts of cyber relating to digital environments and security relating to protection from threats to mean protecting internet-connected systems from cyber attacks. It encompasses practices and technologies used to safeguard systems and ensure integrity, confidentiality and availability. Understanding cyber security's origins, importance and basic concepts is critical for safeguarding personal information and national security in today's digital age.

Uploaded by

vodnala srujana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views

Cyber Security 100

Cyber security combines concepts of cyber relating to digital environments and security relating to protection from threats to mean protecting internet-connected systems from cyber attacks. It encompasses practices and technologies used to safeguard systems and ensure integrity, confidentiality and availability. Understanding cyber security's origins, importance and basic concepts is critical for safeguarding personal information and national security in today's digital age.

Uploaded by

vodnala srujana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Cyber Security: An Overview

Meaning of "Cyber" and "Security"

Cyber:

 The term "cyber" originates from the Greek word "Kubernetes," meaning "steersman"
or "governor." It was first used in the context of "cybernetics," a field of study that
examines regulatory systems and communication in animals and machines.
 In modern usage, "cyber" relates to computers, information technology, and virtual
reality, typically referring to the digital environment of the internet and networks.

Security:

 "Security" refers to the state of being free from danger or threat. It involves measures
taken to protect against unauthorized access, damage, theft, and other threats to assets,
information, and people.

Cyber Security:

 Cyber security combines these concepts to mean the protection of internet-connected


systems, including hardware, software, and data, from cyber attacks. It encompasses
the practices and technologies used to safeguard these systems and ensure their
integrity, confidentiality, and availability.

Origin of Cyber Security

1. Early Beginnings:
o 1960s: The foundation of cyber security was laid with the development of
ARPANET, the precursor to the internet. Early security efforts focused on
physical security and basic access controls.
2. Emergence of Threats:
o 1970s-1980s: The first computer viruses, like the "Creeper" virus, appeared,
leading to the creation of antivirus software. This period saw an increasing
need for protecting data and software as computer usage spread.
3. Commercialization of the Internet:
o 1990s: As the internet became widely used for commercial purposes, cyber
threats grew in complexity and frequency. Firewalls and intrusion detection
systems (IDS) were developed to counter these threats.
4. Modern Era:
o 2000s-Present: The evolution of sophisticated threats such as Advanced
Persistent Threats (APTs), ransomware, and state-sponsored cyber attacks has
made cyber security a critical field. The focus has expanded to include
proactive threat detection, advanced analytics, and machine learning to combat
evolving cyber threats.

Why Cyber Security - CIA and Threats to CIA

CIA Triad:
1. Confidentiality: Ensures that information is accessible only to those authorized to
access it. This includes protecting data from unauthorized access and disclosure.
2. Integrity: Ensures that information is accurate and reliable, and that it has not been
altered or tampered with by unauthorized individuals.
3. Availability: Ensures that information and resources are available to authorized users
when needed. This includes maintaining the functionality of systems and networks.

Threats to CIA:

1. Confidentiality Threats:
o Phishing Attacks: Attempts to steal sensitive information through deceptive
emails or websites.
o Data Breaches: Unauthorized access to confidential data.
2. Integrity Threats:
o Malware: Malicious software that can alter or destroy data.
o Man-in-the-Middle Attacks: Interception and alteration of communication
between two parties.
3. Availability Threats:
o DDoS Attacks: Distributed Denial of Service attacks that overwhelm systems,
making them unavailable to users.
o Ransomware: Malware that locks users out of their systems or data until a
ransom is paid.

Necessity to Learn Cyber Security

1. Growing Cyber Threats: Increasing number and sophistication of cyber attacks


require skilled professionals.
2. Career Opportunities: High demand for cyber security experts in various industries.
3. Personal Safety: Understanding cyber security helps protect personal information
and assets.
4. Organizational Security: Ensures the safety of organizational data and systems,
preventing operational disruptions.

Consequences of Poor Cyber Security

1. Data Breaches: Unauthorized access to sensitive information can lead to identity


theft and financial loss.
2. Financial Loss: Cyber attacks can result in significant financial damage due to theft,
ransom payments, and recovery costs.
3. Reputational Damage: Loss of customer trust and business reputation due to data
breaches.
4. Operational Disruptions: Cyber attacks can disrupt business operations, leading to
downtime and loss of productivity.
5. Legal Penalties: Non-compliance with data protection regulations can result in hefty
fines and legal actions.

Basic Terminology in Cyber Security

1. Malware: Malicious software designed to harm or exploit any programmable device,


service, or network (e.g., viruses, worms, trojans).
2. Phishing: A method of attempting to acquire sensitive information by masquerading
as a trustworthy entity.
3. Ransomware: Malware that locks or encrypts data and demands a ransom for its
release.
4. Firewall: A network security device that monitors and controls incoming and
outgoing network traffic based on predetermined security rules.
5. Encryption: The process of converting data into a coded form to prevent
unauthorized access.
6. VPN (Virtual Private Network): A service that encrypts your internet connection
and hides your online identity.
7. Zero-Day Exploit: A vulnerability in software that is unknown to the software maker
and has not been patched.
8. Threat Vector: The path or means by which a hacker gains access to a computer or
network server to deliver a malicious outcome.
9. Intrusion Detection System (IDS): A device or software application that monitors
network or system activities for malicious activities or policy violations.
10. Advanced Persistent Threat (APT): A prolonged and targeted cyber attack in which
an intruder gains access to a network and remains undetected for an extended period.

Domains in Cyber Security

1. Network Security: Protecting networks from unauthorized access, misuse, or theft.


Involves firewalls, IDS/IPS, and VPNs.
2. Application Security: Ensuring that software applications are secure from threats
throughout their lifecycle. Involves secure coding practices and application testing.
3. Information Security: Protecting the confidentiality, integrity, and availability of
data. Involves encryption, data masking, and access controls.
4. Operational Security: Managing and protecting data processing and handling
procedures. Involves policies and procedures for handling and protecting data.
5. Endpoint Security: Securing individual devices like computers, smartphones, and
tablets. Involves antivirus software, endpoint detection, and response solutions.
6. Cloud Security: Protecting data, applications, and services in the cloud. Involves
cloud service provider security measures, cloud access security brokers (CASBs), and
secure cloud configurations.
7. Identity and Access Management (IAM): Ensuring that only authorized individuals
have access to specific resources. Involves authentication, authorization, and user
management.
8. Cryptography: Protecting information through the use of codes and encryption.
Involves the use of cryptographic algorithms and protocols.
9. Security Awareness and Training: Educating employees and users about security
risks and best practices. Involves regular training sessions and awareness programs.
10. Incident Response: Preparing for and responding to security breaches or cyber-
attacks. Involves incident detection, mitigation, and recovery procedures.

Cyber security is essential in today's digital age to protect data, systems, and networks from cyber
threats. Understanding its origins, importance, and basic concepts is critical for anyone looking to
safeguard their personal information or pursue a career in this vital field. Cyber security not only
prevents financial and reputational damage but also ensures compliance with legal requirements and
contributes to national security. With the increasing complexity of cyber threats, continuous learning
and adaptation are necessary to stay ahead in this ever-evolving field.

You might also like