cyber security unit-5
cyber security unit-5
Information Security
Scope
Availability: Ensuring that information and systems are available when needed.
This includes measures to prevent or quickly recover from disruptions like
hardware failures or cyber-attacks.
Areas of Application:
Physical Security: Protecting physical assets, such as paper documents, server
rooms, and hardware.
Cyber security
Scope:
Network Security: Protecting the integrity and usability of networks and data.
This includes measures like firewalls, intrusion detection systems, and secure
network architecture.
Application Security: Ensuring software and applications are secure from cyber
threats. This includes practices like secure coding, patch management, and
vulnerability assessments.
Threats:
Hacking: Unauthorized access to systems and data, often with malicious intent.
Cyber security plays a vital role across all sectors that rely on digital
infrastructure. Its applications span industries, systems, and everyday
technology use.
Here are some key applications of cyber security.
Cloud Security:
Protecting data stored in cloud environments from unauthorized access
and breaches.
Securing cloud-bascd applications and services from cyber threats.
E-Commerce
Protecting customer data during purchases.
Secure payment gateways.
Education
Protecting student and faculty data.
Preventing cyberbullying and unauthorized access.
Key Impacts
1.Financial Losses:
Direct Costs:
Expenses related to restoring systems, recovering data, and repairing
damage.
Costs associated with determining the cause and extent of the breach.
Fines for non-compliance with data protection.
Compensation to affected customers.
Indirect Costs:
Loss of revenue due to disrupted operations and damaged customer
trust.
2. Reputational Damage:
Customers lose confidence in the organization’s ability to protect their
data.
Brand image takes a hit, potentially causing long-term loss of business.
Media coverage often amplifies negative perception.
Investors may become unwilling to invest in an organization with a
history of security breaches.
3. Legal Consequences:
Organizations may face significant fines for violating data protection
regulations.
4. Operational Disruption
Systems may need to be shut down for investigation and recovery.
Business continuity can be affected, causing delays in services and supply
chains.
5. Loss Of Sensitive Data
Proprietary data, trade secrets, or strategic plans can be stolen.
If customer or employee information is leaked, it can lead to identity
theft or fraud.
6. Decline in Customer and Stakeholder Trust
Customers may switch to more secure competitors.
Partners and investors may reconsider their association with the
organization.
Future sales and stock prices can be negatively impacted.
7. Increased Costs for Security Improvements
Organizations need to invest heavily in cybersecurity technologies,
infrastructure, and personnel to prevent and mitigate data breaches.
Continuous monitoring, threat detection, and regular security updates
are essential, requiring dedicated resources.
Conclusion
Security breaches can have a devastating impact on organizations, affecting
their financial stability, reputation, operations. Proactive cybersecurity
measures are crucial to prevent breaches.
2. Reputational Damage:
Cyber incidents can severely damage an organization's reputation.
Loss of customer trust can lead to decreased sales, loss of business,
and difficulty in acquiring new customers.
Customers lose confidence in the organization’s ability to protect their
data.
Brand image takes a hit, potentially causing long-term loss of business.
Media coverage often amplifies negative perception.
Investors may become unwilling to invest in an organization with a
history of security breaches.
3. Legal Consequences:
Organizations may face significant fines for violating data protection
regulations.
4. Operational Disruption
Cyber attacks can disrupt business operations, causing downtime and
loss of productivity.
Systems may need to be shut down for investigation and recovery.
Business continuity can be affected, causing delays in services and supply
chains.
5. Loss Of Sensitive Data
Proprietary data, trade secrets, or strategic plans can be stolen.
If customer or employee information is leaked, it can lead to identity
theft or fraud.
6. Decline in Customer and Stakeholder Trust
Customers may switch to more secure competitors.
Partners and investors may reconsider their association with the
organization.
Future sales and stock prices can be negatively impacted.
7. Increased Costs for Security Improvements
Organizations need to invest heavily in cybersecurity technologies,
infrastructure, and personnel to prevent and mitigate threats.
Continuous monitoring, threat detection, and regular security updates
are essential, requiring dedicated resources.
Conclusion:
The evils and perils of cyber threats for organizations can have severe
consequences.
Proactive and robust cybersecurity measures are essential for the
survival and success of modern organizations.
5. Explain how cookies impact data security and personal security.
Cookies, small text files that websites store on a user's computer, play a
crucial role in web functionality by remembering user preferences, login
information, and browsing history.
However, they also have significant implications for data security and
personal security.
Session Hijacking:
Some cookies store session information that helps maintain a user's login
state across pages or sessions.
If an attacker gains access to a user's session cookie, they can access
their accounts without credentials.
Unencrypted Cookies:
Privacy Concerns:
Cookies can track users' browsing behaviors, preferences, and activities
across different websites.
This tracking can lead to privacy concerns as users might feel that their
online activities are being monitored without their permission.
Mitigating Risks
Ensure that your browser is up-to-date and has security features that
can block or manage cookies effectively.
Use browser settings to manage cookie preferences, such as blocking
third-party cookies or deleting cookies after each session.
Use incognito or private browsing modes to limit the persistence of
cookies and reduce tracking.
Conclusion
while cookies are essential for the functionality and user experience
of the web, they also present significant data security and personal
security risks if not handled properly.
Understanding these risks and implementing appropriate security
measures and privacy practices is crucial for both individuals and
organizations to protect sensitive information and maintain online
safety.
Data Vigilance
How It Works:
Browser Fingerprinting
Privacy Threats:
Browser fingerprints are difficult to change or hide, making it
possible to track users across different sessions and devices
persistently.
Just like with dataveillance, browser fingerprinting can be used to
build detailed profiles of users' online activities and preferences.
Users may feel their privacy is invaded as they have little control
over how their fingerprints are collected and used.