0 ratings 0% found this document useful (0 votes) 27 views 20 pages Cyber Security Note
The document discusses the fundamentals of cybersecurity, emphasizing the importance of protecting data and systems from unauthorized access and attacks. It outlines the CIA triad—Confidentiality, Integrity, and Availability—as key principles of information security, along with various types of cyber attacks such as phishing, malware, and denial of service. Additionally, it highlights the significance of authentication and authorization in maintaining security protocols.
AI-enhanced title and description
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here .
Available Formats
Download as PDF or read online on Scribd
Go to previous items Go to next items
Save cyber security note For Later CYBER securi1¥
twohed * Cyber Secuentty a
u the — protection
handisane 1 sofware
Cyber Secuensty of intertnet - Connected
and date, fron
aystens, including
yor altocke
= Fy a Competing contest» geceeity Computes © ber socu-
nity and phipicad wecurity ~ both Sue used by ent 7
do protect ag csest Unauphorized acces to data conser
and other Computers acl segriems:
whieh desig
nity aod avail
ned to maintain
abt ity of data,
~ tadSemation Securdty
dhe Confidentialty , toteg
fs a wubsel et) cagber seceendtg:
Explain “cra hth deterTs .
The Cth Triad of Infomation Seccardty
Confidentiality +
Eneuner thod data on an infoannadion system &
by only an authorized penser:
accened
Sotegntty ~ ‘
oy that the clata on information Sytem
Toteqrsty assure
at terested»
authertzad person ond
when ot rest:
Ensuncs thed it c edited by only
remains’ in. its oreigiqad Blade
: 2 7
Av ol lability
Dada and tnfonmadion’ Aysterns ane anailable. chen tyindl
Securnd4y B privacy + a0
Privacy ratadin te any rights jou h
Personal tndonmadion ee ani ee
er- Pravace polvcres. :
-Sotunity reefer ki» best
a protecdods ee ve foe Fadlon. maiorGotne duction :
ated
sathe- tem cyber Serudiy A ed eae
ne =
dhe security offered through oa
ro prefect youre online In foremabion +
Lipid an {nenessing amount of peep getting
connected 0 cintereneh, te security tfrreeads That
cause Mase farm ane fnencasing 240°
al the woud. eybat !
Dee a. Combining dorm — retaking to indore madion
technology» the Infercned , ane vertu! reoling
Nosd of cyber securdty 1
Cyber Secuensty a Repary Sie it helps i9
Securing dota, Sm Hhnepts Such as dlato the dt
on miwe alto cafequinnd your system tren,
venues. “0 cee
Eepe Cen pee:
virus, ie }
Hocker
Mabwwtes 6. nore
Trep jan’ horses
Pauiwond cracking
verre and Weems :
qe that % locded onto your
A viaua
: ‘Complter yours Kpeyolealge, ree arin
your wich, : a dint
8 Wnaas
Lohas i tre’ volt fonanse,, betpoeso Yavs (rape?
and TROTAA Horse.
Vitcones 5 eran sy
Laiyadag
Vida ov Sobers attache, tol? te ~*°
a mana i
= oA negli
- 94 can
- 74s
SENG
(Donne:
porum ¢
opraad
~ 94 sel
- Dt &o
- t's gf
~ gh. w
Trajan!
Trajan |
jn forme
= oF dos
- oF Y
ods
- ot
To, stor
comput!
contro}
Mewar
Tha we
wold coax
~ Malwe
0 tom
permiscepicntes by adtaching te ethan programs.
<1 cannot be Contealledt remotely
- gay Apreacling made & Moderate
- qe con rmedify ox delete information.
woam
poun & a standalone Softecare thed maplicaded to
spraad aeress system’ -
94 solP- maplicates vottheud attaching do othor Pee
- Dt Cao be Contrellaal remotely
rade Post:
= pits apreading
- gf. tongume a plen nawiances
Tejon ton eas
ooo alin gate ol ottware thet
arqel slow down system.
Trujon Howe stoale
jn foumation «
gt deer not weplicate
ep een, be tantalied
- o's spraaoling wate $1000:
— Ot Steal genseive to fommadion »
fesalk
nomotly.
Hackers $
» breaks Into
To tommeq. a hacker
Compupers , usually by § admine strative
cortrols +
Madoors :
Tha woud tmatware’ comer trbm he term "mauicious
Sol teoare.”
Maleoone a 90g software thad enfocts and clamages
: ‘
ompuber Syfon - ubtvimd Het otonen's Kaew ledge Von
pormitsionGroin Horses?
eee th ytrreses Thad 609
Trejo email vi is od heey
dlupl’ cate
compete
heres arte
hem golver 1 Steal nforra
system
the d fe ee de
vines area tha most sorfous
There
ds com petierss:
How to averd “Trapan “
“ecunthy tutes, such ay Avan Trtanand Secor Td
coll preverd you from dawn leasing Trojan Horses:
Panwenst Crockings
Pamwena attacks ane aMocks by hockew thad
arr able 49 olatexmine panwends on And
Parword to dPPerend Preotectest electronic arens
ana Social? nededonk sites. {
ong Porwond.
fame panisond for hoo aldPferant sites;
Cyber Secutty Goals +
“The objective of Cuberseceans, & to
From biking atlen, compromised 0% atdacksd. Oy ben te
lon be measured by of Jawt one of three gosb-
ds protoch the Condy, ty of dada.
Q. Paerenve the ing
3. Prwmote te avadlabrlir, af data ron, author’ cad
Ue,
1 Cook dentiality:
thoe ane the Adele ‘of Condy olen alt .
Eneny p tren
Accu Controd
ro deed Infernalfuthen beaten
Author zecbion
oy
hygicad Seccenrey
Lr 4
conbiclembaltty ts roughly eauvaled to privacy and
avoids dha “unathorired ob’sclosune of indoamed a.
‘ one
14 gnvolyes the preo doc h'on of dada, Preovicltey a
for those whe ane allowed seo while ‘clés allow
ing others Prom Iearning anything arbors FAs Content.
whod a che difdensnce befwaan authors zoBIe0 and
audhentication:?
dutrendicadion father zabion
1) on the lau Fender Process, waive gutherszation precen,
tthe fdantity of wens ane cha perioms 0% Wer’ othe
checked Be providing tHe raKer ane checksal for acresitng
accen to the Septem the regoun cae
) On the authant cation pees, white fa this a (wend
Gyens on persons ane verted, OF persons, gk val dated
oe) 94 a clone before, the aestho- while this procen #8 clone
riratiog procets after the acethentication pence.
nado i
Lotta. of, Maso the Car Pre
see tiv) 99 nencls esally Ae 4
fogio deforls. :
) duthentication dedenriined
whether Ha penton M4
User ot nod .
@) Gener aransmil informa
thon Hhrepugh 99 10 ‘Teken.
Wilage om secte-ulfy Jevels «
awhste MH determines what
permiaion oleer He wee hace?
tranimé
thro ugh AA
Henenall,
mebion
Token,
Pewfuthen teatioo
Aucthonézecbion
physical Seccercfby
conkyclarbialtny is
aveids the
tt envelver the
fon these
ing others from Igenning anything
whod o& the
aubhenticadion.?
Authent¢
) a0 the
the identity of wens one
Checked foe providing the
accen to the Septem:
29 the
CWwers OF pemsens
OF a
rivasiog preecet:
tv) 99 nencls estab, He
toqid defarls. s
(1) Authents colon determine
whether tHe person ic
user .on not,
(1) sGanenatty ronan! eae
Hon Myrbugh an 10 Token.
reoug hh
3"
Uunatdfarived obigctorunce of
preodech’on
who aro alloweel
drFfonence bebwaan
Feachion Process ,
autrantication pres,
ane yorstesl,
glow before. the aushe-
and
indemenebion
of data, Preovicléag accey
ty geod] while ‘désalloo,
Ps Content
equavalend to privac
abot
Quthora zadien and
,
fusthord zofion
polite autherszation
the - peuom om Wes
ribjer ane checkeal fon accening
the rey our CY
pohile fo this ey Ue
om poses, vali aleaded «
Lis clone
while thes preset
proce.
often the authentication
wwe & nosol te twarls pear
Shy tevels «
vilege ot. Seetert!
dpermines what
He en bewe ?
white
peremniasion oloes
teanimtt tofou
thre ugh on Aeeu
Henenal
mation
Tokens& Doregnity Integrity tools
Totegatty refers 40 the methods
Bon Sonening tha® cata % meal, [check Sumse]
arceunate cinel Ya Peauanst cron Dato. Coureeling Tat
unauthorizect eaten “medi beation.
Uo the prepecty that tnfoemarion Availabilty
has net he altened Ih an aunau
thenized way, % dnd jhad ounce
Of the taLremadion 2 genuine.
Avosilecb ity
Aveilabitity i the Property én oti indormasion ig
actestble ancl modifable ~ toa # fashion by
sthete authorized do Tt ts the guanantes
of nebiable and acco to Oten Sens hive
owas lab? le
Phystoat Protecbion
Compudatiedad resl undone
Tyre oP cyber pidacks
"6 Cyebec- adtack Han explePdartion of tom puter
Systems and networks
s lt cre mati efous ode to alter“ Computer tode,
loge Ot lata and Iead 4 ber Crimes » Such as
We are ivi ine Hod era, :
* Now a day, mest of “the people we Computer anol
lodennet -
+ Dur to the pen ctency on aby ital Hn thy ill
Computer activity « peak
rae pala $$ gqrnewsiog cand changing Witte “aby
claut
Web
Qyster
woon
These
Leb
aHael
4 Inge
at &
fate a
and 3
Erampl
a pre
DNS Ss
lohers |
cache
IP ae
3. Seni
Tt &
Preote
Web
and
24 $clench
of cyber Adtack
web bared attack
Aystem bared aldack
(lk parecl aiack:
These ano dhe attacks which ocr 09 Woebstfe on
Loch applications. Some of the fmpordant web ~ ‘bard
atiacks ane ar fotiiws-
Js injection addacks!
94 & the ablack in ehich some dada eill be
fate a web application fo maniputade the app Licehon
and ¥elch, the naguied fn done emaction +
Example Sgt tnjechiors Code rajechor » 109
tn fection ete «
rajtetsd
éajection, XML
@ DME Spoofing
DME speeding 4 a hype of Computers geceirutty hackin
Wwherebp a data és introduced into & pag resolves
cache cousins the nome Sewer ac
Tp adelnons ; elevercting Peace tne ablacker?
meducn 90 in cenneed
2. Senion acking t
Trae security attack On & usec
protect ed ned eoork +
web appli codvors erent
and user Senionr
By Heating
gonion Over a
cookies te stone tthe state
4s phtsrn
Phesing ov a type of adtock which adap te seo
Senate prformastion » Like, ex fagin crasten Hobs ond cad
Cord number > cere When O° Adtoakan i mes quexasling
ot a trusiumrthy entity in etectroaie tommunt tabon +5 Bnube fence
Te rh a typt of adback eahich Uses teval
and anno’ mathed. This oft nok gered 0
Rouge number of gueny and validdes then to
auword and
actual alate Uke wer P
personal dent Bron number. This affack my
pe cus minah to Crack encreg pteel alata,
On by -Secentty 1 aunal yrds to det an orig a8 acho
netroonk geceandty «
obtain
: denial of Senwice:
Te F Of adtack 4
on ried work
14 accomplisher “t's by flooding ‘He darget with
srePhe on Sencling 14 indoxmadion that buggery
by
aw
wy
“Types of Cyber Adack ears:
fo adtacken & the indivireal on organization whe
Per foun the mallerous achvities to olatnoy,
expose, aber, disable, Sfeal “on geo a conedbont
oa makes t
accen to
System- based Hacks ey
There ane the attacks which fr <
pay aes intanelesl to com
J Wines» wean “Frojan hore, Back deo, Bot
Us Back deonss
B14 a enethed —thad, bypauer ‘ithe normal te
cabin proces. alovebpen tne ete Che
door $0. thod an" application eh: eperation “System
Lan he Anceatd fortd trawbleAhooting on Das? prxposo
© Bots
A bot
+ nef won
Tyree
Hockeng
¢
Adware
aad Poé
Notas
How ths
Yend ous
of phisis
tot Nak
website
a
Build fe
Froud ants a
em fo
| and
ck ey
rteel lado,
gant eoctio
serven
Ghent
4d with
tr ate
A bot fan auchmated proces Inad idtenacds
s nefwonk — fenuicer
Nyper_of Cybers Crime
Spam Email Spyware,
phi sing » Denial of Sonvicr,
he) , ATM She mming
Hocerng
Adware’, Malware (Trofanr yinies + Worm
and Point of Scale Crimer
notes
Ho® ths: phising . wDoaks 2
Send oud -thoaancls Victims etvckon HN K in
of Phising emails Stal beeing bis
Lolth nano to fake legittmade- they enfer
personal (7 Parma he*
eb site
met a at
ul he ,
foe foaie Froudstens Compile “the
Stoten dada 8 Yell.t4, anline
(= on use > themselves.
Seeley ct
+ Email Spam is the vetectasa’c veruion “of Junk mod
involves sending Unwanted manages rotten sunsolicitedl -
jidivantiving 21 fo.,.4 lanne. Nembert recipients + Spam
Sento Bes A uedais on fH con be —eaed . deliver,
: ss FP a a w
Treefan horuel, inuses coo | spyroant 1 an 4 regpt es]
Fisni attacks
Spy wodine:
Fraud aden,
a ue 4 i pp malwars thad hackers we + rpy o?
Phe pace a sts arcey, fo, your pervonal Tn honmadby
you co erclen fo got,
panting oledas’ts ., 07 enking achiwity
Cunsetver, by ant~ spyooars +oet. f
Adware pi i a type of —mativane that bom bands you cotth
endlen acl and POP-UP ‘orndlowws that Could potentially 1o8 dangers
Ths "bel eau to. memove de aoledars' > tp
for your olewice ~ “f
(we an adwar removal Anots
Wp Shoutel - prow tooeRao Bom wont
Ramemwarne 7 a Sany ar Af Bounch + Hackers tte
ee parquet leek pau oul oP your dlovion and
demanf a ramen fn nedurcy
Tatrwtea Detection Syetem Cid)
An 106 MW & Seca’ system cabich mon tons dhg
Compudere : systems ond nadoonk drattic«
= 34 analyse that rakse for possible heshile adbtaaky
ow nt, chron the tudetden and abe for System
misuse On attacks orfainating from the fosidon
~ A Aevoatt doe a job Yet tritening Ha Incoming tall
fom the intenned, the IDS iiq al similar con compli
ments the firewall Secunt
A vulnerability is 0 thaws ‘on wesknen tr a, Septem &
_cenb gration had allackarr
acces bv Cause
ton exist fo
desian , implemantotton 1 O%
Con’ eeplord 72 azo heather zo
unintended bahaviors Vutnorabit'tes
(sare, Mardesana , ov ,neboonk
be explotisd jy Compromise o Sifstoro s
dentab'ty on ovallabi Why» * ‘
Polvantages of Idaint tying Vad pera bilities Cs)
Proactive Defense t Tent vubidtnbiope allecs
Driqani xodiom to’ asldeven then pedo! at adkans Cay
Beplott «them» :
Enhanced Security: — oe a ee
: tng, vubogisbetsher, onganizabion | Cao gtrengthan
oy rai nat A ue en
ob alata breaches.
Coimplionce « Add mening | Kross vulnenaibitities,. helps engani-
Zosion comply teh indleateif> ragillociony & standarh +
het fh aq explore”
Ar explort...i) 2, piece of Software
O10 vlad Saquerte Indlentaneds 0,
09
Vulnenabt ipo cifing Eten pan
Geplat aoa ied fa aback =n penton unauthorreed
action y Such At, fostaling rikWerour aallware » accening
bo [sins
Soft
(oi 8 guration and may
teenie 1 Cone
Potture an
1a get of taroman ds ,
faks advontage ob a