0% found this document useful (0 votes)
146 views19 pages

Cybersecurity Insights for Engineers

The document provides an overview of cyber security. It defines cyber security and discusses its historical development from the 1970s onward. It then outlines several key topics in cyber security including the concept, types, features, goals, threats, benefits, problems, and importance. The document serves as an introduction to cyber security and covers many fundamental aspects of the field.

Uploaded by

Ibrahim M. Atfi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
146 views19 pages

Cybersecurity Insights for Engineers

The document provides an overview of cyber security. It defines cyber security and discusses its historical development from the 1970s onward. It then outlines several key topics in cyber security including the concept, types, features, goals, threats, benefits, problems, and importance. The document serves as an introduction to cyber security and covers many fundamental aspects of the field.

Uploaded by

Ibrahim M. Atfi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 19

Faculty of Engineering Technical Writing 

Fayoum University                                                     
Mechatronics Department 

Report about 
Cyber Security

Prepared by: Ibrahim Mohamed Atfi


Prepared for: Dr.Mohamed Saber
Index
1. Introduction
2. cyber security concept
3. Types of cyber security
4. Cyber security features
5. The primary goals of cyber security
6. Types of threats in cybersecurity
7. Cyber security benefits
8. Cyber security problems
9. The importance of cyber security
10.Conclusion
Introduction

As the everyday becomes more dependent on Internet-based tools and services


And since these platforms accumulate more of our most sensitive data The
.demand for experts in the field of cyber security is increasing
in this course In this article, you will get an overview of the cybersecurity
landscape as well as international perspectives in the field. We will cover the legal
environment that affects cybersecurity , This course is an introduction to the
.exciting field of cybersecurity
The course includes many basic topics in cybersecurity, and we will talk about a
historical introduction to cybersecurity, in addition to information security and
global frameworks for information security. We will also discuss the
organizational structures of
cybersecurity. Cybercrime is one of
.the most prevalent topics today
Malware is one of the most important
things to learn and understand in
cybersecurity, and in this course we
will talk about one of the most
widespread attack methods, which
isDDoS, and we will also discuss many
tools for detecting electronic crimes,
contemporary risks and different
types of attacks, in addition to threats
..and attacks
We will also learn about illegal
.business models, laws governing cybercrime, and the ITU agenda
cyber security concept

Known as cyber security It is


the use of techniques,
processes, and measures
necessary to ensure the
security of systems, networks,
software, hardware, and data
and protect them from
electronic attacks, and its main
purpose is to reduce electronic
risks that may be exposed to
systems and networks and
protect them from unauthorized
.exploitation
The birth of cyber security

 1970's
The history of cybersecurity dates back to the 1970s, when some terms
.such as spyware, viruses, and worms were not popular
Due to the high rate of cybercrime, these terms were featured in the daily
headlines, and when you go back in time to the inception of cybersecurity,
computers and the Internet were still under development, and it was easy
.to identify threats to a computer

 The eighties of the twentieth century


In the eighties of the twentieth century, Robert T. Morris invented the first
electronic virus program, which gained massive media coverage due to its
spread between devices and causing system failures. Morris was
sentenced to imprisonment and a fine, and that ruling played a role in
..developing laws related to cyber security

 Nineties of the twentieth century


The events of the development of cyber security continue over time, with
the development of viruses that infect devices, as the world became aware
of electronic risks, and among the most prominent measures taken in the
nineties of the twentieth century was to putprotocolsProtect websites
like(http), which is a type of protocol that allows the user to securely access
.the Internet
Types of cyber security

:Cyber security has different types, including the following

 network security(Network Security)


In it, computers are protected from attacks that may be exposed to them
inside and outside the network, and among the most prominent techniques
used to implement network security is the firewall that acts as a protector
between the personal device and other devices in the network, in addition
to e-mail security..

 Application Security (Application Security)


It protects information about an application on a computer, such as
procedures for setting passwords, authentication processes, and security
questions that ensure the identity of the application user..

 operational security (Operational Security


It is managing the risks of internal cybersecurity operations, in which it employs
risk management experts to find an alternative plan in the event that users’ data
is exposed to a cyber attack, and also includes educating employees and training
them on best practices to avoid risks..
Cyber security features

Cyber security has a set of characteristics that distinguish it from other fields, the
most important of which are::

 Trust and distrust:


The firewall of the cybersecurity system has what looks like an electronic filter for
the type and nature of programs and technologies allowed to be activated, allowing
the passage of programs that already have trust from the user as well as the online
store, and the safety of their use has been ensured, and malicious programs are
prevented from intrusive or exploiting loopholes.

The philosophy of information security can be translated at this point, because


cybersecurity deals with all programs as untrustworthy programs, until they are
allowed by the user and ensure their security through their credibility in electronic
stores, allowing the passage of what has been verified as safety, and preventing
unknown sources from System hack.

 Protection from internal threats:


One of the most important characteristics of cybersecurity is to protect the device
from internal threats, which may take place based on the user’s lack of culture or
ignorance in the field of information security, in which he may allow unknown
programs to be activated or use tools that affect his personal security or the
sensitivity of sharing his information , or one of the tools he uses contains a
malicious virus that his system should not contain, then cybersecurity quickly
alerts the individual or organization to the danger they face and whoThis action
occurs as quickly as possible.

 Overview:

Cyber security tools are based on giving their user - individuals or companies - a
comprehensive view of the strengths and weaknesses of their systems, so that
they can identify technological gaps and work to solve them as soon as possible,
while giving them suggestions for the ideal way to prevent their recurrence again.
 continuous monitoring:

Cyber security is based on the feature of continuous monitoring, as its firewall


does not work for one time or at certain hours, but the system works all the time
with the aim of detecting any defect as soon as it exists and working to quickly fix
it and prevent it from causing any damage and maintain the security of
information and security of the user for as long as possible.

 Compliance with policies and laws:


The goal of cybersecurity in the first place is to maintain the confidentiality and
privacy of data and information, in addition to combating harmful viruses of all
kinds, and in order to achieve this goal effectively, the powers granted to its
professionals must not be exploited in order to penetrate the base on which it was
created.

Therefore, compliance with the laws and legislative policies related to information
security is one of the most important characteristics of cybersecurity, as it is not
possible for external sources to see what is being shared of sensitive information
and data, or to misuse it in any possible way, and these laws vary according to the
type and nature of the field in which the protection is applied cyber.

 Diversity:
The cyber security system must have aggregated solutions related to dealing with
cyber threats, so that the system is not activated to protect against one type of
threat and allow another, but rather it must analyze, detect, deal and prevent all
types of possible attacks that pose a threat to the safety and security of information.

The primary goals of cyber security


1. Data confidentiality protection

Cybersecurity helps protect the confidentiality of data by preventing access to


it by unauthorized persons. It also gives the user the opportunity to implement
a set of methods to ensure that he can access it safely without allowing
intruders to know its content, or reveal its information, and among the
methods used to protect Data confidentiality is what follows:

 encryption
It is one of the best methods used in the field of data confidentiality
protection, and encryption mainly depends on the use of algorithms to
convert data into codes that are only readable by users who possess the
decryption key.

 Access and control authority


This method allows the user to access his data by using his credentials, such
as: username, serial number, etc..

 Authentication
This method enables the user to protect his data by allowing him to access
it by confirming his identity using a smart card, password or fingerprint.

 delegation
This method gives the user permission to access data and systems after
verifying their identity, and that they are the people who are allowed to
access them based on company policies.

 Securitymaterial
Physical security protects all property of IT facilities, such as equipment,
devices, facilities and resources from physical threats such as: vandalism,
theft, fire, etc., by putting in place appropriately designed measures that
prevent access to the IT property.
2. Maintaining data integrity and authenticity
The cybersecurity of the user ensures that his data is accurate, protected, and
has not been subjected to any unauthorized modification, and uses 3 methods
to maintain the integrity of the data, which are as follows:

 Backups
This method relies on copying data periodically and keeping backup
copies of it, to be used in case the original data is lost or damaged.

 Checksums
Checksums are the way to ensure that data is safe and free from
tampering or errors after it is transmitted and stored, as it is used to
ensure the integrity of data and the way it is transmitted by converting it
into numerical values. To compare two sets of data and make sure they
match each other.

 data correction codes


This method relies on storing data as symbols to make it easy to detect
any change that may occur to it, and then correct it automatically..

3. data saving
Cyber security provides the user with safe and reliable ways to access and modify
his data at any time, and they are used to achieve thisTwo main methods, as
:follows

 physical protection
This method provides the protection of various information by storing
the sensitive information in safe places and facilities that are secured
against exposure to any attacks or violations.

 data redundancy
Cybersecurity ensures that computers that have backup copies are
protected in the event of any problems or malfunctions.
Types of threats in cybersecurity
After identifying both the concept and characteristics of cybersecurity, it is now
the turn to shed light on the most famous types of threats in it, which represent
the biggest scourge that the digital world deals with, which often cause heavy
losses that are difficult to deal with, and the role of cybersecurity here is not to
defend against its attacks Not only, but to prevent it from happening in the first
place, as follows:

1. Malware:
Malware are advanced viruses that are designed to circumvent the
protection systems installed on the system and cause damage or
malfunction, allowing the manipulation or control of sensitive data based
primarily on exploitable vulnerabilities..

2. Malicious ransomware:
The malicious ransom virus is one of the most dangerous electronic attacks in
our current digital world, which according to the latest global statistics, there is
a malicious ransom type attack approximately every 10 seconds at least, in
which all the data of the victim is blocked and encrypted, and not allowed to
access it until after a ransom is paid The more this data is confidential and
sensitive, the more the owners of these viruses take advantage of the matter
and impose major impractical orders, in which the victim only has to succumb to
it in the end..

3. Phishing for info:


In which the lack of culture of the electronic victim or lack of attention to the
information presented to him is exploited, and he is made to share of his own free
will sensitive information related to his credit card or confidential information
that should not be shared with the public, such as the password for logging in to
digital platforms or other sites, and the percentage of electronic attacks is
considered Phishing accounts for 80% of attacks on individuals and organizations,
and according to Google, more than 2.1 million sites were estimated to be
dedicated to this in 2020 alone.

4. Exploiting binary programs or what is known as a


middleman attack:
The middleman attack is one of the common tools used in cyber-attacks, in
which the attacker takes advantage of the victim's resort to a second weak
technical source, and enters the system through it, such as exploiting the Wi-Fi
network and penetrating the system of the devices shared in it and working to
install malicious programs that help in controlling her.

5. Direct phishing or what is known as spear phishing:


In it, an individual or an institution is targeted in and of itself, and all its defense
and protection systems are studied in detail, and then worked to discover the
loopholes contained in the system and the mechanism of adapting them in favor
of a systematic penetration and control process.

6. Advanced long-running sequencing:


In it, the protection systems are intrusively and gradually penetrated, so that it
is not discovered until after a long period of time, during which the damage has
already been done and the total control of the system has been successfully
completed.

7. Denial of Service attacks:


And in which the system is bombarded with a barrage of traffic, messages and
fake users, so that a kind of pressure arises on the servers and disrupts them or
causes them to slow down, causing huge losses, especially if this attack takes
place at a special time when the company expects to achieve significant gains
from visitors’ turnout, especially in During the seasons, discounts, or after the
announcement of strong competitive offers.
Cyber security benefits

Protect networks, data and information


The process of protecting different networks, systems, and data is one of the most
prominent benefits offered by modern cybersecurity science. The experts in this
field are working onApplicationVarious means and methods that mainly aim to
.protect the data, networks and resources of different companies

Improving the level of protection and security


As well as protecting corporate data, resources and
informationdifferent,Cybersecurity, with its various applications, also improves the
level of security and protection for companies. This is done through the periodic
maintenance of the protection systems and programs that these companies follow.
In addition to applying the latest technologies and security systems available in the
.field
Ensuring business continuity
The application of cyber security and information security services to the programs
and applications of different companies can ensure their business continuity. Where
cyber security works to save company resources and data from attacks and
crimescyber,Thus, it provides an ideal working environment for her. Ensuring
business continuity is one of the tasks in which the benefits of cybersecurity are
.clearly evident

Enhancing the confidence of employers in their companies


Through its various and varied applications that aim to maintain the security of
the company's information in a waygeneral,Cyber security builds great reliability
in the company in the hearts of its staff. Thus, this confidence contributes to the
increase in the production of thesecompany,This means an increase in profits and
sales.
Recover leaked data
Cybersecurity not only protects corporate data and resources, but also recovers
and recovers leaked data or resources. One of the most significant benefits of
cybersecurity is the quickest possible data recovery. Where the leaked
information, if it spreads for a sufficient period, can contribute to the destruction
of the company's business and plans.

Improving information security in general


The science of cyber security is mainly considered one of the branches of the
science of information security, therefore, when applying the means and methods
of this science in different companies, this matter contributes to improving the
information security of this company significantly..

Protection of personal information


The concept of cyber security is not limited to protecting corporate data and
resourcesJust,But this concept is also expanded to include the protection of
personal data of users. Many viruses and malware steal this dataand
information,Hence it is used forattacks,or to collect money. Therefore,
cybersecurity specialists apply various methods and means that help protect the
user's personal data and information.

Protect business and its applications


Various cybersecurity applications can provide a safe working environment that is
free from the risks of attacks and cybercrime. Therefore, when applying these
means, programs and systems in a company,What,The employees of this company
can safely conduct their business. One of the most prominent benefits of
cybersecurity is the process of using different applications and methods to protect
business.

Protecting Business Productivity


Some viruses and malware, when they reach computers, reduce the performance of
these devices. Which causes a noticeable delay in the processes and applications
that are executed on these devices. But when applying cybersecurity services to
thesedevices,The risk of infection with these viruses can be avoided. It can also get
rid of viruses and malware on them. Thus, cybersecurity helps protect and ensure
continuity of work productivity.

Get rid of spyware


Spyware is software and applications that monitor the performance of computers
and the processes that are performed on them. This information is sent to other
companies for their own use. These serious crimes can have a significant negative
impact on the work of some companies. but for goodluck,Applying different
cybersecurity principles and methods can eliminate and limit these spyware. This
task is considered one of the most important benefits of applying the new science
of cybersecurity.

Provide a safe work environment


If it is applied on a personal level or on a levelcompanies,Cybersecurity can
provide a safe and secure work environment that is free from viruses, malware, and
other crimes that occur in cyberspace. This is done through the application of the
various methods, means, systems and services provided by this science.

Contribution in various sectors


The benefits of cyber security and the services it provides are numerous.
Therefore, the work of this science and its various applications is not limited to the
personal and corporate level only. The different programs, methods and types of
this science are applied in many diverse sectors. Among the most prominent of
thesesectors:

 Financial Institutions and Systems


 Airlines and companies
 The government sector in general
 big companies
 The energy sector and its related companies
 Industrial and commercial companies
 and others too
Cyber security problems

There are many difficulties and threats surrounding cyber security that make the
information security sector on alert, including the following:

Increasing the complexity of cyber attacks


One of the problems of cybersecurity is the increasing complexity of cyber-attacks
in conjunction with the advancement of the cyber field, as the development of
machine learning, artificial intelligence, cryptocurrency and others has resulted in
an increase in malware that puts the data of companies, governments and
individuals at constant risk.

Hide identities
The emergence of some technologies, such as cryptocurrencies, Bitcoin, has played
a role in concealing the identity of users, allowing fraudsters to deploy techniques
to steal information without fear of revealing their identity.

Lack of experts in the security sectorcyber


This means that the cybersecurity sector suffers from an acute shortage of experts,
as this field suffers from a lack of specialists in it.

Unsecured Internet Connection


Excessive reliance on an unsecured Internet connection can lead to the breakdown
of information exchange systems and increase the potential for malware to spread.

Spread of misinformation
Deliberate dissemination of false information using robots or automated sources,
which endangers the safety of users of electronic information.

The evolution of scams


Scams are on the rise, as some are targeting people's data bydeceive themTo click
on a link and the lack of awareness among people about it, and to use e-learning to
craft more persuasive messages to deceive educated people about scams.

Physical cyber attacks


Physical cyber attacks extend beyond the scope of electronic data; There are
people attacking the data of water stations, electricity, and trains.

Access to additional parties (the three parties)


The three parties mean that the user provides access to his data by third parties, for
example, logging in to the sites using social networking applications or email,
which allows the users of those sites to access the information of the person.

The importance of cyber security

Cyber security is important due to the high financial cost of repelling cyber-attacks
of all kinds, as the average budget isthat$17 million was spent on repelling the
attacks.

There are more than 21.1 billion devices connected to the Internet around the
world.WhichThe equivalent of 21.1 billion potential attacks in the world of
cyberspace, which in turn could happen without securityboyishand its biological
developmentthatIt is happening sequentially and rapidly at the present time.

The importance of cybersecurity lies in the fact that it maintains the sensitivity and
security of the information of users, especiallythatIt may put people at risk or the
countries in which they reside, becauseWhichInformation that may be marginal or
unimportant for some individuals may be the linkthatThe hacker needs it to do his
work.
Security helpscyberCountries must maintain the confidentiality of their
information from penetration by hostile countries or exposure to electronic attacks
that cause paralysis or losses, scandals to their economy, which in turn can be
imagined as a type of modern war in our time.

Security helpscyberAlso on the development of cloud services technology, because


there is a wall that protects data privacythatThey are stored in it makes users more
confident inits efficiencyAnd more invested in spending money on it in comfort.

Attention to securitycyberFor sites and services helps to give service providers an


additional competitive advantage, so that the user tends to deal with safe sites,
especiallythatDealing with it requires having payment gateways or sharing
sensitive data or personal information.

Cybersecurity helps protect users from illegal activitiesthatSpeak in the dark web
worldwhichMost of them are life-threatening or put the browser at risk of
exposurefor the matterLegal as well, not to mention moral as well.

In the end, a worldcyber securityIt is large and full of various threats, and no
matter how much protection specialists succeed in renewing defenses and treating
technical gaps, the biggest weakness is relying on the human gap, a point that will
only be solved by continuous technological education represented in a culture of
information protection, if you are afraid to be a new victim If you are a victim of a
cybersecurity breach, you should start educating yourself from now, and if you do
not know the right way to do so, here is the specialized cybersecurity course
offered by the AcademyWorkProfessional Business.
Conclusion

In conclusion, we can say that the application of cyber security means and
services is essential for every user who wants to protect and preserve his data
and information..

You might also like