0% found this document useful (0 votes)
62 views12 pages

Cyber Law and Internet Security-UNIT-III

The document covers various aspects of Cyber Law and Internet Security, focusing on developing secure information systems through key security goals such as confidentiality, integrity, and availability. It discusses threats to information systems, security measures like authentication, encryption, and firewalls, as well as the importance of governance, risk management, and physical security of IT assets. Additionally, it highlights the significance of access control, CCTV, intrusion detection systems, and backup security measures in maintaining data protection and organizational safety.

Uploaded by

rotisen158
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views12 pages

Cyber Law and Internet Security-UNIT-III

The document covers various aspects of Cyber Law and Internet Security, focusing on developing secure information systems through key security goals such as confidentiality, integrity, and availability. It discusses threats to information systems, security measures like authentication, encryption, and firewalls, as well as the importance of governance, risk management, and physical security of IT assets. Additionally, it highlights the significance of access control, CCTV, intrusion detection systems, and backup security measures in maintaining data protection and organizational safety.

Uploaded by

rotisen158
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

BCA-602

Cyber Law and Internet Security


Developing Secure Information Systems
1. Introduction to Secure Information Systems
 Information System: A system that collects, processes, stores, and distributes
information. Example: Banking software, E-commerce websites.
 Security in Information Systems: Protection of data from unauthorized access, theft,
or damage.

Key Security Goals (CIA Triad)

1. Confidentiality – Keeping information secret from unauthorized users.


2. Integrity – Ensuring data is accurate and not changed by unauthorized people.
3. Availability – Ensuring data is available when needed.

2. Threats to Information Systems


Types of Threats

1. Human Threats
o Hackers, cybercriminals, or disgruntled employees.
o Example: Phishing attacks, insider threats.
2. Natural Threats
o Disasters like earthquakes, floods, and fires.
3. Technical Threats
o Malware, viruses, ransomware, and software bugs.

3. Security Measures
1. Authentication & Access Control

 Authentication: Verifying user identity (e.g., passwords, biometrics, OTPs).


 Access Control: Restricting user access based on roles (e.g., admin vs. regular user).

2. Encryption

 Converts data into unreadable form to prevent unauthorized access.


 Example: AES encryption for securing online transactions.

3. Firewalls & Antivirus Software


 Firewalls: Block unauthorized access to networks.
 Antivirus: Detects and removes malware.

4. Backup & Disaster Recovery

 Regular data backups prevent loss due to cyberattacks or system failures.


 Disaster Recovery Plan (DRP): Steps to recover data after a cyberattack.

5. Security Policies & User Awareness

 Educating employees on strong passwords, phishing risks, and safe browsing.

4. Secure Software Development


1. Secure Coding Practices

 Avoid using weak passwords and storing plain text data.


 Use input validation to prevent SQL injection attacks.

2. Testing for Security

 Penetration Testing: Simulating cyberattacks to find vulnerabilities.


 Security Audits: Regular checks on security systems.

5. Laws and Compliance


 IT Act 2000 (India): Cybercrime laws in India.
 GDPR (Global): Protects user data in European countries.
 ISO 27001: International standard for information security.

Conclusion
 Developing secure information systems is important to protect sensitive data.
 Use strong security measures like encryption, firewalls, and authentication.
 Regular security audits and user awareness help reduce cyber risks.

Information Security Governance & Risk


Management
1. Introduction
 Information Security Governance: The process of ensuring that security policies,
procedures, and controls are properly implemented in an organization.
 Risk Management: Identifying, analyzing, and reducing security risks to protect
information systems.
2. Information Security Governance
Key Elements of Governance

1. Security Policies – Set rules for data protection. Example: Password policies.
2. Security Roles & Responsibilities – Assigning roles (e.g., IT admin, security
officer).
3. Compliance with Laws & Regulations – Following legal guidelines like IT Act
2000, GDPR.
4. Security Awareness & Training – Educating employees on cyber threats.
5. Incident Response Plan – A plan for handling security breaches or cyberattacks.

3. Risk Management in Information Security


Steps in Risk Management

1. Risk Identification
o Finding threats (e.g., malware, hacking, data leaks).
o Identifying vulnerabilities (e.g., weak passwords, outdated software).
2. Risk Assessment
o Evaluating how dangerous a threat is.
o Example: A phishing attack may lead to data leaks.
3. Risk Mitigation (Reducing Risk)
o Technical Controls (firewalls, antivirus).
o Administrative Controls (security policies, employee training).
o Physical Controls (CCTV, biometric access).
4. Risk Monitoring & Review
o Regularly checking security measures.
o Updating policies as per new threats.

4. Types of Security Risks


1. Cyber Threats – Hacking, malware, phishing.
2. Human Errors – Weak passwords, accidental data deletion.
3. Physical Threats – Theft, natural disasters.

5. Importance of Governance & Risk Management


✅ Protects confidential data.
✅ Reduces financial losses due to cyberattacks.
✅ Ensures compliance with laws.
✅ Builds trust with customers and employees.
Conclusion
 Information Security Governance ensures a strong security framework.
 Risk Management helps organizations prevent cyberattacks and data breaches.
 Both are essential for protecting sensitive information and ensuring business
continuity.

Security Architecture & Design


1. Introduction
 Security Architecture: The structure of an information system that ensures security
principles are applied to protect data.
 Security Design: The process of planning and implementing security controls in
software, hardware, and networks.

2. Key Components of Security Architecture


1. Hardware Security – Secure physical devices (e.g., firewalls, secure servers).
2. Software Security – Secure coding practices to prevent vulnerabilities.
3. Network Security – Protecting data transmission using encryption and firewalls.
4. Access Control – Restricting unauthorized access (e.g., multi-factor authentication).

3. Principles of Secure System Design


1. Least Privilege – Users should only have access to what they need.
2. Defense in Depth – Multiple security layers (firewalls, antivirus, encryption).
3. Fail-Safe Defaults – If a system fails, it should remain secure.
4. Security by Design – Security should be included during development, not added
later.

Security Issues in Hardware


1. Introduction
 Hardware Security: Protecting physical components like CPUs, memory, and
storage devices from attacks.
 Security Issues: Hardware vulnerabilities that hackers can exploit to steal data or
damage systems.

2. Common Hardware Security Issues


1. Physical Threats

 Theft or tampering with devices.


 Example: Stolen laptops, USB data theft.

2. Hardware Trojans

 Malicious circuits inserted into hardware to leak data or damage systems.


 Example: Compromised microchips in military devices.

3. Firmware Attacks

 Firmware: Software embedded in hardware (e.g., BIOS, UEFI).


 Attackers can modify firmware to take control of devices.

4. Side-Channel Attacks

 Hackers gather information by analyzing how hardware behaves.


 Example: Listening to processor power usage to extract encryption keys.

5. Supply Chain Attacks

 Attackers compromise hardware during manufacturing.


 Example: Fake chips installed in government or enterprise servers.

3. How to Protect Hardware?


✅ Secure Boot – Ensures only trusted software runs on a device.
✅ TPM (Trusted Platform Module) – Hardware-based security for encryption.
✅ Hardware Firewalls – Dedicated devices that protect networks from attacks.
✅ Physical Security – Using biometric access, locks, and CCTV for device safety.
✅ Regular Firmware Updates – Fix security bugs in hardware components.

Conclusion
 Security Architecture & Design ensures that systems are built securely from the
start.
 Hardware Security Issues can lead to serious threats like data leaks and system
failure.
 Protecting hardware with strong security measures is essential for overall
cybersecurity.

Data Storage & Downloadable Devices


1. Introduction to Data Storage
 Data Storage: The process of saving digital data for future use.
 Types of Data Storage: Primary, Secondary, and Cloud Storage.
2. Types of Data Storage
1. Primary Storage (Volatile Memory)

 RAM (Random Access Memory): Temporary storage for active processes.


 Cache Memory: High-speed memory used for quick data access.

2. Secondary Storage (Non-Volatile Memory)

 Hard Disk Drive (HDD): Traditional storage with moving parts.


 Solid-State Drive (SSD): Faster storage with no moving parts.
 Optical Discs (CD/DVD/Blu-ray): Used for media storage.
 Flash Drives (USB, SD Cards): Portable storage devices.

3. Cloud Storage

 Data stored on remote servers accessed via the internet.


 Example: Google Drive, Dropbox, OneDrive.

3. Downloadable Devices
 Devices used to store, transfer, and download data.
 Examples:
✅ USB Flash Drives – Small, portable, easy-to-use.
✅ External Hard Drives – Large storage capacity for backups.
✅ SD Cards – Used in cameras, smartphones.
✅ Smartphones & Tablets – Can store and download files.

4. Security Issues in Data Storage & Downloadable


Devices
1. Data Loss – Accidental deletion or corruption.
2. Malware & Viruses – Infected USBs can spread viruses.
3. Unauthorized Access – Stolen devices can expose private data.
4. Cloud Security Risks – Hackers can attack cloud storage accounts.

5. Protection Measures
✅ Use encryption for sensitive data.
✅ Keep backups on external drives or cloud storage.
✅ Use antivirus software to scan USBs and downloaded files.
✅ Enable password protection on storage devices.

Conclusion
 Data Storage is essential for keeping and managing digital information.
 Downloadable Devices help in data transfer and backup.
 Proper security measures should be taken to prevent data loss and theft.

Physical Security of IT Assets


1. Introduction
 Physical Security: Protecting IT assets (computers, servers, network devices) from
physical threats like theft, damage, or natural disasters.
 Important for ensuring data confidentiality, integrity, and availability.

2. Types of IT Assets That Need Protection


✅ Hardware – Servers, computers, routers, storage devices.
✅ Software – Operating systems, applications, databases.
✅ Network Equipment – Switches, modems, firewalls.
✅ Data Centers – Large server rooms hosting critical data.
✅ Portable Devices – Laptops, USB drives, external hard disks.

3. Threats to IT Assets
1. Theft & Unauthorized Access

 Hackers or insiders stealing laptops, hard drives, or data.


 Example: Stolen USB with sensitive company data.

2. Natural Disasters

 Fire, floods, earthquakes can damage IT infrastructure.

3. Vandalism & Sabotage

 Attackers physically damaging IT equipment.

4. Power Failures

 Sudden power cuts or voltage fluctuations can damage hardware.

4. Physical Security Measures


1. Access Control

 Biometric authentication (fingerprint, retina scan).


 Keycard access for restricted areas.
 Security guards to prevent unauthorized entry.
2. Surveillance & Monitoring

 CCTV cameras to monitor sensitive areas.


 Motion sensors & alarms for detecting intrusions.

3. Environmental Controls

 Fire suppression systems (sprinklers, fire extinguishers).


 Temperature control (HVAC systems) for cooling servers.

4. Secure Storage

 Lockable server racks to prevent theft.


 Secure cabinets for portable devices (laptops, USBs).

5. Backup Power & Disaster Recovery

 Uninterruptible Power Supply (UPS) for power backup.


 Data backups stored in multiple locations.

5. Importance of Physical Security


✅ Prevents data theft and hardware loss.
✅ Protects against natural disasters.
✅ Ensures business continuity and system availability.
✅ Reduces financial losses due to damaged or stolen IT assets.

Conclusion
 Physical Security is as important as cybersecurity.
 Protecting IT assets with access control, surveillance, and disaster recovery plans
ensures data safety and business continuity.

Access Control
1. Introduction
 Access Control: A security method that restricts unauthorized users from accessing
data, systems, or physical locations.
 Ensures Confidentiality, Integrity, and Availability (CIA Triad) of data.

2. Types of Access Control


1. Mandatory Access Control (MAC)
✅ Highly Secure – Used in military and government systems.
✅ Access is based on security levels (e.g., Confidential, Secret, Top Secret).
✅ Example: Only authorized users with "Top Secret" clearance can access top-secret
documents.

2. Discretionary Access Control (DAC)

✅ Owner-Based – The owner of the data decides who gets access.


✅ Example: A user sets a password on a file and decides who can open it.

3. Role-Based Access Control (RBAC)

✅ Access based on job roles – Users are assigned roles with specific permissions.
✅ Example:

 Admin – Full control over the system.


 Employee – Limited access to company files.

4. Attribute-Based Access Control (ABAC)

✅ Access is based on user attributes (e.g., location, device type, time).


✅ Example:

 A user can only access company data from the office network, not from personal
devices.

3. Access Control Methods


1. Authentication – Verifying user identity

 Something You Know – Passwords, PINs


 Something You Have – Smart card, OTP
 Something You Are – Biometric (fingerprint, face scan)

2. Authorization – Granting permission to access specific data or resources

 Example: A student can view exam results but cannot modify them.

3. Audit & Monitoring – Keeping records of access activities

 Logs & Reports – Helps in tracking who accessed what and when.

4. Common Access Control Technologies


✅ Passwords & PINs – Simple but vulnerable.
✅ Biometric Authentication – Fingerprint, retina scan.
✅ Smart Cards & Tokens – Used for secure login.
✅ Multi-Factor Authentication (MFA) – Combines two or more authentication methods
(e.g., password + OTP).

5. Importance of Access Control


✅ Prevents unauthorized access and data breaches.
✅ Ensures only authorized users can access sensitive information.
✅ Protects company secrets, personal data, and financial records.
✅ Helps in legal compliance (GDPR, IT Act 2000).

Conclusion
 Access Control ensures that only the right people can access data and systems.
 Different types of access control (MAC, DAC, RBAC, ABAC) are used based on
security needs.
 Strong authentication and monitoring help prevent cyber threats.

CCTV, Intrusion Detection Systems &


Backup Security Measures
1. CCTV (Closed-Circuit Television)
 Definition: CCTV is a video surveillance system used for monitoring and recording
activities in a secured area.
 Helps in preventing theft, unauthorized access, and monitoring suspicious
activities.

Uses of CCTV in Security

✅ Surveillance – Monitoring offices, data centers, and restricted areas.


✅ Crime Prevention – Deters theft, vandalism, and unauthorized entry.
✅ Evidence Collection – Helps in investigations and legal cases.
✅ Employee & Visitor Monitoring – Ensures workplace safety and rule enforcement.

Types of CCTV Systems

✅ Analog CCTV – Uses traditional cables for recording.


✅ IP CCTV (Digital) – Uses internet-based cameras for remote monitoring.
✅ Wireless CCTV – Uses Wi-Fi or mobile networks for flexibility.

Best Practices for CCTV Security

✅ Place cameras in strategic locations (entry points, server rooms).


✅ Store recordings securely to prevent tampering.
✅ Use password protection for digital CCTV systems.
✅ Regular maintenance and software updates.
2. Intrusion Detection Systems (IDS)
 Definition: IDS is a security system that detects unauthorized access or malicious
activities in a network or system.

Types of Intrusion Detection Systems

✅ Network-based IDS (NIDS) – Monitors network traffic for suspicious activities.


✅ Host-based IDS (HIDS) – Monitors specific devices (servers, computers) for
unauthorized changes.

Functions of IDS

✅ Detects hackers and cyberattacks (e.g., malware, brute force attacks).


✅ Alerts administrators about security threats.
✅ Monitors unusual behavior in the network or system.
✅ Records attack details for future analysis.

Best Practices for IDS Security

✅ Regular updates to detect new threats.


✅ Combine IDS with firewalls and antivirus for better security.
✅ Use real-time alerts for quick response to threats.

3. Backup Security Measures


 Definition: Backup is the process of creating copies of data to recover in case of
data loss.

Types of Backups

✅ Full Backup – Copies all data (slow but complete recovery).


✅ Incremental Backup – Backs up only changed data since the last backup.
✅ Differential Backup – Backs up all changes since the last full backup.
✅ Cloud Backup – Data is stored remotely on cloud services (Google Drive, OneDrive).

Backup Storage Methods

✅ External Hard Drives – Local backup storage.


✅ Network-Attached Storage (NAS) – Secure backups within an organization.
✅ Cloud Storage – Remote storage for disaster recovery.

Best Practices for Backup Security

✅ Regular backups (daily/weekly based on importance).


✅ Store backups in multiple locations (onsite & offsite).
✅ Use encryption to protect sensitive backup data.
✅ Test backup recovery process regularly.
4. Importance of These Security Measures
✅ CCTV prevents unauthorized access and records incidents.
✅ IDS detects cyber threats before damage occurs.
✅ Backup security ensures data recovery after system failures or cyberattacks.

Conclusion
 CCTV, IDS, and Backup Security Measures are essential for physical and cyber
security.
 Implementing proper security controls ensures data protection, monitoring, and
quick recovery from threats.

You might also like