0% found this document useful (0 votes)
27 views20 pages

Cyber Security Note

The document discusses the fundamentals of cybersecurity, emphasizing the importance of protecting data and systems from unauthorized access and attacks. It outlines the CIA triad—Confidentiality, Integrity, and Availability—as key principles of information security, along with various types of cyber attacks such as phishing, malware, and denial of service. Additionally, it highlights the significance of authentication and authorization in maintaining security protocols.

Uploaded by

KhushiPanda
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
27 views20 pages

Cyber Security Note

The document discusses the fundamentals of cybersecurity, emphasizing the importance of protecting data and systems from unauthorized access and attacks. It outlines the CIA triad—Confidentiality, Integrity, and Availability—as key principles of information security, along with various types of cyber attacks such as phishing, malware, and denial of service. Additionally, it highlights the significance of authentication and authorization in maintaining security protocols.

Uploaded by

KhushiPanda
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 20
CYBER securi1¥ twohed * Cyber Secuentty a u the — protection handisane 1 sofware Cyber Secuensty of intertnet - Connected and date, fron aystens, including yor altocke = Fy a Competing contest» geceeity Computes © ber socu- nity and phipicad wecurity ~ both Sue used by ent 7 do protect ag csest Unauphorized acces to data conser and other Computers acl segriems: whieh desig nity aod avail ned to maintain abt ity of data, ~ tadSemation Securdty dhe Confidentialty , toteg fs a wubsel et) cagber seceendtg: Explain “cra hth deterTs . The Cth Triad of Infomation Seccardty Confidentiality + Eneuner thod data on an infoannadion system & by only an authorized penser: accened Sotegntty ~ ‘ oy that the clata on information Sytem Toteqrsty assure at terested» authertzad person ond when ot rest: Ensuncs thed it c edited by only remains’ in. its oreigiqad Blade : 2 7 Av ol lability Dada and tnfonmadion’ Aysterns ane anailable. chen tyindl Securnd4y B privacy + a0 Privacy ratadin te any rights jou h Personal tndonmadion ee ani ee er- Pravace polvcres. : -Sotunity reefer ki» best a protecdods ee ve foe Fadlon. maior Gotne duction : ated sathe- tem cyber Serudiy A ed eae ne = dhe security offered through oa ro prefect youre online In foremabion + Lipid an {nenessing amount of peep getting connected 0 cintereneh, te security tfrreeads That cause Mase farm ane fnencasing 240° al the woud. eybat ! Dee a. Combining dorm — retaking to indore madion technology» the Infercned , ane vertu! reoling Nosd of cyber securdty 1 Cyber Secuensty a Repary Sie it helps i9 Securing dota, Sm Hhnepts Such as dlato the dt on miwe alto cafequinnd your system tren, venues. “0 cee Eepe Cen pee: virus, ie } Hocker Mabwwtes 6. nore Trep jan’ horses Pauiwond cracking verre and Weems : qe that % locded onto your A viaua : ‘Complter yours Kpeyolealge, ree arin your wich, : a dint 8 Wnaas Lohas i tre’ volt fonanse,, betpoeso Yavs (rape? and TROTAA Horse. Vitcones 5 eran sy Laiyadag Vida ov Sobers attache, tol? te ~*° a mana i = oA negli - 94 can - 74s SENG (Donne: porum ¢ opraad ~ 94 sel - Dt &o - t's gf ~ gh. w Trajan! Trajan | jn forme = oF dos - oF Y ods - ot To, stor comput! contro} Mewar Tha we wold coax ~ Malwe 0 tom permis cepicntes by adtaching te ethan programs. <1 cannot be Contealledt remotely - gay Apreacling made & Moderate - qe con rmedify ox delete information. woam poun & a standalone Softecare thed maplicaded to spraad aeress system’ - 94 solP- maplicates vottheud attaching do othor Pee - Dt Cao be Contrellaal remotely rade Post: = pits apreading - gf. tongume a plen nawiances Tejon ton eas ooo alin gate ol ottware thet arqel slow down system. Trujon Howe stoale jn foumation « gt deer not weplicate ep een, be tantalied - o's spraaoling wate $1000: — Ot Steal genseive to fommadion » fesalk nomotly. Hackers $ » breaks Into To tommeq. a hacker Compupers , usually by § admine strative cortrols + Madoors : Tha woud tmatware’ comer trbm he term "mauicious Sol teoare.” Maleoone a 90g software thad enfocts and clamages : ‘ ompuber Syfon - ubtvimd Het otonen's Kaew ledge Von pormitsion Groin Horses? eee th ytrreses Thad 609 Trejo email vi is od heey dlupl’ cate compete heres arte hem golver 1 Steal nforra system the d fe ee de vines area tha most sorfous There ds com petierss: How to averd “Trapan “ “ecunthy tutes, such ay Avan Trtanand Secor Td coll preverd you from dawn leasing Trojan Horses: Panwenst Crockings Pamwena attacks ane aMocks by hockew thad arr able 49 olatexmine panwends on And Parword to dPPerend Preotectest electronic arens ana Social? nededonk sites. { ong Porwond. fame panisond for hoo aldPferant sites; Cyber Secutty Goals + “The objective of Cuberseceans, & to From biking atlen, compromised 0% atdacksd. Oy ben te lon be measured by of Jawt one of three gosb- ds protoch the Condy, ty of dada. Q. Paerenve the ing 3. Prwmote te avadlabrlir, af data ron, author’ cad Ue, 1 Cook dentiality: thoe ane the Adele ‘of Condy olen alt . Eneny p tren Accu Controd ro deed Infernal futhen beaten Author zecbion oy hygicad Seccenrey Lr 4 conbiclembaltty ts roughly eauvaled to privacy and avoids dha “unathorired ob’sclosune of indoamed a. ‘ one 14 gnvolyes the preo doc h'on of dada, Preovicltey a for those whe ane allowed seo while ‘clés allow ing others Prom Iearning anything arbors FAs Content. whod a che difdensnce befwaan authors zoBIe0 and audhentication:? dutrendicadion father zabion 1) on the lau Fender Process, waive gutherszation precen, tthe fdantity of wens ane cha perioms 0% Wer’ othe checked Be providing tHe raKer ane checksal for acresitng accen to the Septem the regoun cae ) On the authant cation pees, white fa this a (wend Gyens on persons ane verted, OF persons, gk val dated oe) 94 a clone before, the aestho- while this procen #8 clone riratiog procets after the acethentication pence. nado i Lotta. of, Maso the Car Pre see tiv) 99 nencls esally Ae 4 fogio deforls. : ) duthentication dedenriined whether Ha penton M4 User ot nod . @) Gener aransmil informa thon Hhrepugh 99 10 ‘Teken. Wilage om secte-ulfy Jevels « awhste MH determines what permiaion oleer He wee hace? tranimé thro ugh AA Henenall, mebion Token, Pew futhen teatioo Aucthonézecbion physical Seccercfby conkyclarbialtny is aveids the tt envelver the fon these ing others from Igenning anything whod o& the aubhenticadion.? Authent¢ ) a0 the the identity of wens one Checked foe providing the accen to the Septem: 29 the CWwers OF pemsens OF a rivasiog preecet: tv) 99 nencls estab, He toqid defarls. s (1) Authents colon determine whether tHe person ic user .on not, (1) sGanenatty ronan! eae Hon Myrbugh an 10 Token. reoug hh 3" Uunatdfarived obigctorunce of preodech’on who aro alloweel drFfonence bebwaan Feachion Process , autrantication pres, ane yorstesl, glow before. the aushe- and indemenebion of data, Preovicléag accey ty geod] while ‘désalloo, Ps Content equavalend to privac abot Quthora zadien and , fusthord zofion polite autherszation the - peuom om Wes ribjer ane checkeal fon accening the rey our CY pohile fo this ey Ue om poses, vali aleaded « Lis clone while thes preset proce. often the authentication wwe & nosol te twarls pear Shy tevels « vilege ot. Seetert! dpermines what He en bewe ? white peremniasion oloes teanimtt tofou thre ugh on Aeeu Henenal mation Tokens & Doregnity Integrity tools Totegatty refers 40 the methods Bon Sonening tha® cata % meal, [check Sumse] arceunate cinel Ya Peauanst cron Dato. Coureeling Tat unauthorizect eaten “medi beation. Uo the prepecty that tnfoemarion Availabilty has net he altened Ih an aunau thenized way, % dnd jhad ounce Of the taLremadion 2 genuine. Avosilecb ity Aveilabitity i the Property én oti indormasion ig actestble ancl modifable ~ toa # fashion by sthete authorized do Tt ts the guanantes of nebiable and acco to Oten Sens hive owas lab? le Phystoat Protecbion Compudatiedad resl undone Tyre oP cyber pidacks "6 Cyebec- adtack Han explePdartion of tom puter Systems and networks s lt cre mati efous ode to alter“ Computer tode, loge Ot lata and Iead 4 ber Crimes » Such as We are ivi ine Hod era, : * Now a day, mest of “the people we Computer anol lodennet - + Dur to the pen ctency on aby ital Hn thy ill Computer activity « peak rae pala $$ gqrnewsiog cand changing Witte “aby claut Web Qyster woon These Leb aHael 4 Inge at & fate a and 3 Erampl a pre DNS Ss lohers | cache IP ae 3. Seni Tt & Preote Web and 24 $ clench of cyber Adtack web bared attack Aystem bared aldack (lk parecl aiack: These ano dhe attacks which ocr 09 Woebstfe on Loch applications. Some of the fmpordant web ~ ‘bard atiacks ane ar fotiiws- Js injection addacks! 94 & the ablack in ehich some dada eill be fate a web application fo maniputade the app Licehon and ¥elch, the naguied fn done emaction + Example Sgt tnjechiors Code rajechor » 109 tn fection ete « rajtetsd éajection, XML @ DME Spoofing DME speeding 4 a hype of Computers geceirutty hackin Wwherebp a data és introduced into & pag resolves cache cousins the nome Sewer ac Tp adelnons ; elevercting Peace tne ablacker? meducn 90 in cenneed 2. Senion acking t Trae security attack On & usec protect ed ned eoork + web appli codvors erent and user Senionr By Heating gonion Over a cookies te stone tthe state 4s phtsrn Phesing ov a type of adtock which adap te seo Senate prformastion » Like, ex fagin crasten Hobs ond cad Cord number > cere When O° Adtoakan i mes quexasling ot a trusiumrthy entity in etectroaie tommunt tabon + 5 Bnube fence Te rh a typt of adback eahich Uses teval and anno’ mathed. This oft nok gered 0 Rouge number of gueny and validdes then to auword and actual alate Uke wer P personal dent Bron number. This affack my pe cus minah to Crack encreg pteel alata, On by -Secentty 1 aunal yrds to det an orig a8 acho netroonk geceandty « obtain : denial of Senwice: Te F Of adtack 4 on ried work 14 accomplisher “t's by flooding ‘He darget with srePhe on Sencling 14 indoxmadion that buggery by aw wy “Types of Cyber Adack ears: fo adtacken & the indivireal on organization whe Per foun the mallerous achvities to olatnoy, expose, aber, disable, Sfeal “on geo a conedbont oa makes t accen to System- based Hacks ey There ane the attacks which fr < pay aes intanelesl to com J Wines» wean “Frojan hore, Back deo, Bot Us Back deonss B14 a enethed —thad, bypauer ‘ithe normal te cabin proces. alovebpen tne ete Che door $0. thod an" application eh: eperation “System Lan he Anceatd fortd trawbleAhooting on Das? prxposo © Bots A bot + nef won Tyree Hockeng ¢ Adware aad Poé Notas How ths Yend ous of phisis tot Nak website a Build fe Froud a nts a em fo | and ck ey rteel lado, gant eoctio serven Ghent 4d with tr ate A bot fan auchmated proces Inad idtenacds s nefwonk — fenuicer Nyper_of Cybers Crime Spam Email Spyware, phi sing » Denial of Sonvicr, he) , ATM She mming Hocerng Adware’, Malware (Trofanr yinies + Worm and Point of Scale Crimer notes Ho® ths: phising . wDoaks 2 Send oud -thoaancls Victims etvckon HN K in of Phising emails Stal beeing bis Lolth nano to fake legittmade- they enfer personal (7 Parma he* eb site met a at ul he , foe foaie Froudstens Compile “the Stoten dada 8 Yell.t4, anline (= on use > themselves. Seeley ct + Email Spam is the vetectasa’c veruion “of Junk mod involves sending Unwanted manages rotten sunsolicitedl - jidivantiving 21 fo.,.4 lanne. Nembert recipients + Spam Sento Bes A uedais on fH con be —eaed . deliver, : ss FP a a w Treefan horuel, inuses coo | spyroant 1 an 4 regpt es] Fisni attacks Spy wodine: Fraud aden, a ue 4 i pp malwars thad hackers we + rpy o? Phe pace a sts arcey, fo, your pervonal Tn honmadby you co erclen fo got, panting oledas’ts ., 07 enking achiwity Cunsetver, by ant~ spyooars +oet. f Adware pi i a type of —mativane that bom bands you cotth endlen acl and POP-UP ‘orndlowws that Could potentially 1o8 dangers Ths "bel eau to. memove de aoledars' > tp for your olewice ~ “f (we an adwar removal Anots Wp Shoutel - prow tooe Rao Bom wont Ramemwarne 7 a Sany ar Af Bounch + Hackers tte ee parquet leek pau oul oP your dlovion and demanf a ramen fn nedurcy Tatrwtea Detection Syetem Cid) An 106 MW & Seca’ system cabich mon tons dhg Compudere : systems ond nadoonk drattic« = 34 analyse that rakse for possible heshile adbtaaky ow nt, chron the tudetden and abe for System misuse On attacks orfainating from the fosidon ~ A Aevoatt doe a job Yet tritening Ha Incoming tall fom the intenned, the IDS iiq al similar con compli ments the firewall Secunt A vulnerability is 0 thaws ‘on wesknen tr a, Septem & _cenb gration had allackarr acces bv Cause ton exist fo desian , implemantotton 1 O% Con’ eeplord 72 azo heather zo unintended bahaviors Vutnorabit'tes (sare, Mardesana , ov ,neboonk be explotisd jy Compromise o Sifstoro s dentab'ty on ovallabi Why» * ‘ Polvantages of Idaint tying Vad pera bilities Cs) Proactive Defense t Tent vubidtnbiope allecs Driqani xodiom to’ asldeven then pedo! at adkans Cay Beplott «them» : Enhanced Security: — oe a ee : tng, vubogisbetsher, onganizabion | Cao gtrengthan oy rai nat A ue en ob alata breaches. Coimplionce « Add mening | Kross vulnenaibitities,. helps engani- Zosion comply teh indleateif> ragillociony & standarh + het fh aq explore” Ar explort...i) 2, piece of Software O10 vlad Saquerte Indlentaneds 0, 09 Vulnenabt ipo cifing Eten pan Geplat aoa ied fa aback =n penton unauthorreed action y Such At, fostaling rikWerour aallware » accening bo [sins Soft (oi 8 guration and may teenie 1 Cone Potture an 1a get of taroman ds , faks advontage ob a

You might also like