UNIT 1tk
UNIT 1tk
The main principles of information security are often summed up by the so-called
CIA triad234:
Denial of Service (DoS) attack: In this type of attack, the attackers disrupt
the services of a particular network by sending infinite requests, temporarily
or permanently making the network or machine resources unavailable to the
intended audience1.
Backdoor attack: In this attack, malware, a trojan horse, or a virus gets
installed in our system and starts affecting its security along with the main
file1.
Eavesdropping: This refers to secretly listening to someone’s talk without
their permission or knowledge1.
Remember, computer security is not just about technology, but also about the
people and processes involved. It requires a comprehensive and multi-disciplinary
approach to be effective1.
security terminologies
types of threats:
1. Software Attacks: These include attacks by viruses, worms, trojan
horses, and bots12. They are malicious software that behaves
differently and can harm your system1.
2. Theft of Intellectual Property: This involves stealing sensitive
information, such as trade secrets or proprietary information 1.
3. Identity Theft: This involves stealing personal information to
impersonate someone else1.
4. Theft of Equipment or Information: This involves stealing
physical devices (like computers or hard drives) or digital
information1.
5. Sabotage: This involves deliberate actions aimed at harming an
organization or its resources1.
6. Information Extortion: This involves demanding money in return
for not releasing stolen information1.
7. Social Media Attacks: In this, cyber criminals identify and infect a
cluster of websites that persons of a particular group visit 1.
8. Mobile Malware: There is a saying when there is a connectivity to
the Internet there will be danger to Security1.
9. Outdated Security Software: With new threats emerging
everyday, updation in security software is a prerequisite to have a
secure system1.
10. Corporate Data on Personal Devices: This involves the risk
of corporate data being accessed from personal devices, which may
not have the same level of security as corporate devices 1.
Remember, the best defense against these threats is a combination of
strong security policies, up-to-date technology, and user awareness
Attacks in information security refer to actions that are intended to compromise the
security of an information system. They can be categorized into two types1:
Assets in information security refer to any data, device, or other components that
support information-related activities2. They generally include342:
These assets are valuable to an organization and require protection. The goal of
information security is to protect these assets from various threats and attacks342.
1. Attack Surface Expansion: With the increase in remote work and greater
use of public cloud, highly connected supply chains, and cyber-physical
systems have exposed new and challenging attack surfaces1.
2. Identity System Defense: Misuse of credentials is now a primary method
that attackers use to access systems. Tools and processes to defend identity
systems are becoming increasingly important1.
3. Digital Supply Chain Risk: By 2025, it’s predicted that 45% of
organizations worldwide will have experienced attacks on their software
supply chains1.
4. Vendor Consolidation: Security products are converging, and vendors are
consolidating security functions into single platforms1.
5. Rise of Cybersecurity Practices: With continuous technological
development, there is a corresponding movement in cybersecurity practices3.
These trends highlight the need for organizations to stay vigilant and proactive in
their approach to information security. It’s crucial to keep up with these trends to
protect your organization from potential threats12.
1. Alignment with Business Objectives: The strategy should align with the
organization’s business objectives and support its overall mission2.
2. Risk Assessment: The strategy should include a comprehensive assessment
of the organization’s risk and stakeholder expectations2.
3. Current State Assessment: Understanding the current security state is
crucial for identifying gaps and areas for improvement2.
4. Prioritization of Initiatives: Based on the risk assessment and current state,
the strategy should prioritize security initiatives and build out a security
roadmap2.
5. Proactive Approach: The strategy should shift from a reactive to a
proactive mindset. Instead of focusing on reacting to incidents, the most
effective strategies stress the importance of preventing cyber-attacks1.
6. Resilience: One of the most critical goals for any cybersecurity strategy is
achieving cyber resilience. This means the organization can withstand and
recover from security incidents1.