0% found this document useful (0 votes)
11 views18 pages

Cyber Security

Uploaded by

arsalserver
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views18 pages

Cyber Security

Uploaded by

arsalserver
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Cyber Security

What is Cyber Security?

Cyber Security means protecting computers, mobile phones, internet, and data from
hackers, viruses, and any kind of digital attack.

Think of it like this:

 Your house = your computer/internet.


 Thieves = hackers.
 Locks, cameras, guards = cyber security.

So, cyber security makes sure no one can break in, steal, or damage your digital life.

Importance of Cyber Security


Cyber Security is very important in today’s world because almost everything is done online.
Here’s why it matters:

1. Protects Personal Information


o Your photos, passwords, ATM PINs, bank details, and identity are stored online.
o Without cyber security, hackers can steal and misuse this information.
2. Protects Money and Online Transactions
o People use online banking, shopping apps, and digital wallets.
o Cyber security ensures that your money goes safely to the right place and no
hacker steals it.
3. Protects Businesses and Companies
o Companies have secret data, customer details, and financial records.
o Hackers can attack businesses to steal or leak data.
o Cyber security saves businesses from huge financial losses.
4. Protects National Security
o Government and military use computer systems to store sensitive information.
o If hackers break in, it can harm the entire country’s safety.
o Cyber security keeps the country safe from cyber warfare and terrorism.
5. Prevents Misuse of Data
o Without cyber security, hackers can change or delete data.
o Example: A hacker may change marks in a university system or fake results in an
election.
6. Keeps Systems and Websites Available
o Hackers sometimes overload websites (like bank or shopping sites) to make them
crash.
o Cyber security ensures that websites and apps stay online and available for users.

4 Principles of Cyber Security (Detailed +


Easiest Wording)

1. Confidentiality – Keeping Information Private

 What it means: Confidentiality makes sure that only the right people can see or use the
information. No unauthorized person should be able to read it.
 Why it matters: Imagine if your ATM PIN, exam results, medical report, or
company secrets were open to everyone – it would be very risky.
 Real-life example:
o Only you and the bank should know your ATM PIN.
o A doctor’s computer should not let strangers see your medical history.
 How we protect it:
o Strong passwords
o Encryption (turning data into secret code)
o Access controls (only giving access to authorized users)
 Simple comparison: Like keeping your diary locked with a key. Only you have the
key, so only you can read it.

2. Integrity – Keeping Information Correct and Safe from Changes

 What it means: Integrity ensures that data stays correct, original, and unaltered. No one
should be able to change it without permission.
 Why it matters: If information is changed by hackers, it becomes unreliable. Wrong data
can cause serious damage.
 Real-life example:
o If you transfer Rs. 5000 online, it should stay Rs. 5000, not change to Rs. 50 or
Rs. 50,000.
o In a university, a student’s marks should not be changed by hackers.
 How we protect it:
o Hashing (a mathematical check to see if data is changed)
o Digital signatures (proof that data is original)
o Backups (so original data can be restored)
 Simple comparison: Like putting your message in a sealed envelope – if someone opens
it, you will know it was tampered with.
3. Availability – Keeping Information and Systems Ready When Needed

 What it means: Availability ensures that systems, data, and websites are always ready to
use when people need them.
 Why it matters: Even if data is safe and correct, it’s useless if people can’t access it at
the right time.
 Real-life example:
o A bank’s website should always be online when customers want to send money.
o An online shopping website should not crash during sales.
 How we protect it:
o Firewalls to block bad traffic
o Backups and disaster recovery plans
o Using multiple servers so the system never fully goes down
 Simple comparison: Like electricity supply – it must be available whenever you switch
on the light. If it’s not available, life gets disturbed.

4. Non-Repudiation – No Denying After Doing Something

 What it means: Non-repudiation means once a person does an action (like sending an
email, transferring money, or making an online purchase), they cannot later deny it.
 Why it matters: Without non-repudiation, people can cheat and refuse to accept what
they did.
 Real-life example:
o If you buy something online, the system generates a receipt. Later you cannot
say, “I never bought it,” because the receipt is proof.
o When someone sends an email with a digital signature, they cannot deny that
they sent it.
 How we protect it:
o Digital signatures
o Audit logs (record of activities)
o Receipts and confirmations
 Simple comparison: Like when you buy something from a shop and get a signed receipt
– you cannot later deny that you made the purchase.

🌐 Cyber Security Threats and Vulnerabilities

🔹 THREATS (Detailed, Easiest Wording)

A threat is anything that can harm your computer, data, or network. It can come from
hackers, viruses, or even careless mistakes.
Here are the main types explained:
1. Malware (Malicious Software)

 Malware means harmful software that attackers put into your system.
 Types of malware:
o Virus → attaches to files and spreads when files are opened.
o Worm → spreads automatically through networks without user action.
o Trojan Horse → looks like a useful program but secretly damages your system.
 Example: A virus that deletes your documents or a Trojan that steals your passwords.

👉 Think of it like a fake gift box that looks nice but has a bomb inside.

2. Phishing

 Fake emails, messages, or websites created by hackers to trick people.


 Purpose: Steal personal information like passwords, ATM PINs, or bank details.
 Example: You get an email saying: “Your bank account is locked, click this link to
unlock it.” When you click, the hacker gets your details.

👉 It’s like a fisherman throwing bait (fake message) to catch a fish (you).

3. Ransomware

 A special kind of malware.


 It locks your files or computer and demands money (ransom) to unlock them.
 Example: Suddenly all your files get encrypted, and a message appears: “Pay $500 or
your files will be deleted.”

👉 It’s like a kidnapper locking your things and asking for ransom to return them.

4. Denial of Service (DoS/DDoS) Attack

 Attackers flood a website or server with too much traffic, making it crash.
 DoS = one attacker, DDoS = many computers used together.
 Example: A shopping website goes down during a big sale because attackers overload it.

👉 It’s like hundreds of people blocking the entrance of a shop so no real customer can enter.
5. Password Attacks

 Hackers try to steal or guess your password.


 Types:
o Brute force attack → trying all possible combinations.
o Dictionary attack → using common words or passwords (like “123456”).
o Keylogger → software that records what you type.
 Example: If your password is “123456,” hackers can guess it in seconds.

👉 It’s like a thief trying all possible keys until one opens your lock.

6. Man-in-the-Middle Attack (MITM)

 Hacker secretly sits between your communication with another person or website.
 Example: You connect to public Wi-Fi, and a hacker listens to your bank transaction
details.

👉 It’s like a spy secretly listening when two people are talking privately.

7. Insider Threats

 Sometimes the danger is not from outside, but from employees or trusted people inside
the organization.
 They may steal or leak data on purpose, or by mistake.
 Example: An employee copying company secrets and selling them to competitors.

👉 It’s like a trusted guard of a house secretly helping the thieves.

🔹 VULNERABILITIES (Detailed, Easiest Wording)

A vulnerability is a weakness in the system that allows a threat to succeed.


It’s not the attack itself, but the open door or broken lock that makes attacks possible.

1. Weak Passwords

 Many people use easy passwords like “123456” or “password.”


 Hackers can guess or crack these very quickly.
 Example: If your email password is “abc123,” anyone can break in.

👉 It’s like locking your house with a very thin rope instead of a strong lock.

2. Unpatched / Outdated Software

 Software often has bugs (mistakes in code).


 Companies release updates (patches) to fix these bugs.
 If you don’t update, hackers can exploit those bugs.
 Example: Using an old version of Windows that has known security holes.

👉 It’s like leaving a broken window in your house and never repairing it.

3. Misconfigured Systems

 When security settings are not properly set, it leaves the system weak.
 Example: A website that doesn’t require login for admin pages.

👉 It’s like leaving the main door of your house open by mistake.

4. Lack of Encryption

 If data is not encrypted (turned into secret code), hackers can easily read it.
 Example: Sending passwords in plain text over the internet without HTTPS.

👉 It’s like sending a secret letter without putting it in an envelope.

5. Human Errors (Carelessness)

 People sometimes make mistakes that open doors for hackers.


 Examples:
o Clicking on unsafe links.
o Sharing passwords with friends.
o Forgetting to log out of accounts on public computers.

👉 It’s like leaving your house keys outside the door by mistake.
6. Public Wi-Fi Usage

 Public Wi-Fi is often unsecured.


 Hackers sitting on the same Wi-Fi can easily steal your data.
 Example: Logging into your bank account while using free café Wi-Fi.

👉 It’s like talking loudly about your ATM PIN in a crowded place – anyone can hear.

🔹 THREAT vs VULNERABILITY (Easy Comparison)

 Threat = Attacker/Thief → The thing that tries to harm.


 Vulnerability = Weakness/Open Door → The weakness that lets the threat in.
 Attack = When the thief actually uses the weakness to harm you.

Example:

 Weak password (vulnerability) + Hacker guessing it (threat) = Your account hacked


(attack).

🌐 Security Measures in Cyber Security


👉 Meaning:
Security measures are the steps, tools, and practices used to protect computers, networks,
and data from hackers, malware, and other cyber threats.
Think of them as locks, guards, and alarms for your digital world.

🔹 1. Strong Passwords and Authentication

 What it is: Using hard-to-guess passwords and verifying identity before giving access.
 Why it’s needed: Weak passwords like “123456” can be hacked in seconds.
 How to do it:
o Use long passwords with letters, numbers, and symbols.
o Change passwords regularly.
o Use Multi-Factor Authentication (MFA) → (Password + OTP on mobile).

👉 It’s like having both a key and a fingerprint lock on your house door.
🔹 2. Antivirus and Anti-Malware Software

 What it is: Software that detects and removes harmful programs (viruses, worms,
ransomware).
 Why it’s needed: Hackers often use malware to steal or damage data.
 How to do it:
o Install good antivirus software.
o Keep it updated.
o Scan your system regularly.

👉 It’s like a doctor giving your computer regular health checkups.

🔹 3. Firewalls

 What it is: A firewall acts like a security guard between your computer/network and the
internet.
 Why it’s needed: It blocks unwanted traffic and allows only safe communication.
 How to do it:
o Use built-in firewalls in Windows or routers.
o Configure them properly to block unsafe access.

👉 It’s like a security gate that checks everyone before they enter your colony.

🔹 4. Data Encryption

 What it is: Turning normal data into secret code so hackers can’t read it.
 Why it’s needed: If data is stolen, encryption keeps it safe and unreadable.
 How to do it:
o Use HTTPS websites.
o Encrypt sensitive files and emails.
o Use VPN for safe browsing.

👉 It’s like writing a secret message in code that only you and your friend can read.

🔹 5. Regular Software Updates (Patching)

 What it is: Installing the latest updates released by software companies.


 Why it’s needed: Updates fix security holes (bugs) that hackers can exploit.
 How to do it:
o Keep Windows, browsers, and apps updated.
o Turn on auto-updates.

👉 It’s like repairing broken doors and windows in your house so thieves can’t enter.

🔹 6. Backups

 What it is: Making a copy of your important data and storing it safely.
 Why it’s needed: If hackers delete or lock your files (ransomware), you can restore
them.
 How to do it:
o Take regular backups on external hard drives.
o Use cloud storage backups (Google Drive, OneDrive, etc.).

👉 It’s like keeping an extra copy of your house keys in a safe place.

🔹 7. Access Control

 What it is: Giving permission only to the right people to access data or systems.
 Why it’s needed: Not everyone should have full access, otherwise data can be misused.
 How to do it:
o Use login accounts with different levels (admin, user, guest).
o Give access only on a “need-to-know” basis.

👉 It’s like giving different keys of your house to family, friends, or guests depending on trust.

🔹 8. Secure Networks

 What it is: Protecting Wi-Fi and internet connections.


 Why it’s needed: Hackers can break into weak or open Wi-Fi networks.
 How to do it:
o Use strong Wi-Fi passwords.
o Avoid using public Wi-Fi for banking.
o Use VPN to hide your online activity.

👉 It’s like locking the main gate of your house colony so strangers can’t enter.

🔹 9. Security Awareness and Training

 What it is: Educating people about safe practices online.


 Why it’s needed: Many attacks succeed because users make mistakes (like clicking fake
links).
 How to do it:
o Don’t click on suspicious links.
o Don’t share passwords.
o Be careful of phishing emails.

👉 It’s like teaching family members not to open the door for strangers.

🔹 10. Intrusion Detection and Monitoring

 What it is: Systems that watch network activity and detect suspicious behavior.
 Why it’s needed: Helps to quickly find and stop attacks.
 How to do it:
o Use Intrusion Detection Systems (IDS).
o Monitor system logs regularly.

👉 It’s like having CCTV cameras to catch intruders early.

🔹 11. Physical Security

 What it is: Protecting the physical devices like computers, servers, and storage.
 Why it’s needed: If someone steals your device, your data is at risk.
 How to do it:
o Lock computer rooms.
o Use CCTV cameras.
o Restrict access to server rooms.

👉 It’s like putting a lock and security guard for your house itself, not just online safety.

🔹 12. Incident Response Plan

 What it is: A plan to handle security problems if they happen.


 Why it’s needed: Attacks can still happen, so you must be ready to respond quickly.
 How to do it:
o Detect the attack.
o Contain the problem.
o Fix it and recover data.

👉 It’s like having an emergency plan in case of fire in your house.


Security Practices in Cyber Security
👉 Meaning:
Security practices are the habits, rules, and safe ways of using technology that help keep
computers, data, and networks safe from hackers and cyber threats.

Think of them like daily safety habits – locking doors, checking windows, and being careful
with strangers.

🔹 1. Use Strong and Unique Passwords

 Passwords should not be simple like “12345” or “password.”


 Use a mix of letters, numbers, and symbols.
 Don’t use the same password everywhere.
 Change passwords regularly.

👉 It’s like having a strong lock on your door that thieves can’t easily break.

🔹 2. Enable Multi-Factor Authentication (MFA)

 This adds an extra layer of protection (password + OTP, fingerprint, or face scan).
 Even if a hacker steals your password, they cannot log in without the second step.

👉 It’s like having two locks on your door – key + fingerprint.

🔹 3. Keep Software and Systems Updated

 Hackers use old bugs in outdated software to attack.


 Always install updates for Windows, apps, browsers, and antivirus.
 Turn on automatic updates.

👉 It’s like repairing broken doors and windows so thieves can’t enter.

🔹 4. Install and Use Antivirus and Firewalls

 Antivirus protects from viruses, malware, and ransomware.


 Firewall blocks unsafe internet traffic from entering your system.
 Always keep them updated.
👉 It’s like a guard dog (antivirus) and a security gate (firewall) protecting your house.

🔹 5. Backup Your Data Regularly

 Always keep a copy of important files.


 Store backups in an external hard drive or cloud storage.
 If hackers delete or lock your files (ransomware), you can restore them.

👉 It’s like keeping an extra key or copy of documents in a safe place.

🔹 6. Be Careful of Emails and Links (Phishing Protection)

 Don’t click on links or open attachments from unknown emails.


 Check the sender’s address carefully.
 Never share personal details through email or messages.

👉 It’s like not trusting strangers who knock on your door with fake offers.

🔹 7. Use Secure Wi-Fi and VPN

 Set a strong password on your Wi-Fi.


 Avoid using public Wi-Fi for banking or important work.
 Use a VPN to hide your identity and encrypt browsing.

👉 It’s like putting a lock on your home’s main gate and covering your windows so no one peeks
inside.

🔹 8. Limit Access and Permissions

 Give access to sensitive data only to the right people.


 Don’t use “admin rights” unless necessary.
 Use guest accounts for unknown users.

👉 It’s like giving house keys only to trusted family members, not to everyone.
🔹 9. Encrypt Sensitive Data

 Turn data into secret code so hackers cannot read it.


 Use HTTPS websites, encrypted emails, and secure messaging apps.

👉 It’s like writing secrets in code language that only you and your friend understand.

🔹 10. Train and Educate Users

 Many cyber attacks happen because of human mistakes.


 Learn about phishing, safe browsing, and password safety.
 Companies should train employees about cyber security.

👉 It’s like teaching family members not to open doors for strangers.

🔹 11. Log Out and Lock Devices

 Always log out from accounts after use.


 Lock your computer and phone when not using them.
 Avoid saving passwords on public computers.

👉 It’s like closing and locking doors when leaving your house.

🔹 12. Monitor and Detect Suspicious Activity

 Keep an eye on system logs and network traffic.


 Use Intrusion Detection Systems (IDS) in organizations.
 Quickly report if you see unusual behavior.

👉 It’s like having CCTV cameras that alert you if someone suspicious enters.

🔹 13. Physical Security Practices

 Protect actual devices, not just online data.


 Lock server rooms and important devices.
 Use CCTV cameras in offices.

👉 It’s like locking your cupboard to protect jewelry, not just locking your house.
🔹 14. Have an Incident Response Plan

 Even with all protections, attacks can happen.


 Be ready with a plan:
1. Detect the problem.
2. Stop the attack.
3. Recover data from backups.
4. Learn and improve security.

👉 It’s like having an emergency fire escape plan in your house.

📘 Cyber Security Terms Explained in Most


Detailed & Easiest Wording

🔹 1. Hacker

 A hacker is a person who uses their computer skills to enter (access) systems, networks,
or data.
 Not all hackers are bad. Some are good (ethical hackers) who help companies find
weaknesses. Some are bad (black-hat hackers) who steal or destroy data.
👉 Example: A thief tries to break into your house = bad hacker. A security expert checks
your locks to keep you safe = good hacker.

🔹 2. Malware

 Malware means malicious software (harmful programs).


 It is created to damage your system, steal your data, or spy on you.
 Different types of malware exist like viruses, worms, trojans, spyware, ransomware.
👉 Example: Just like germs that make humans sick, malware makes computers sick.

🔹 3. Virus

 A type of malware that needs a host file (like a program or document) to spread.
 When you open the infected file, the virus activates and spreads to other files.
 It can delete files, slow down computers, or corrupt data.
👉 Example: Like a flu virus spreading from one person to another when they meet.
🔹 4. Worm

 A worm is like a virus, but it spreads automatically without you opening a file.
 It can spread through emails, networks, or USBs.
 It uses a lot of system resources and slows down the network.
👉 Example: Like worms in rotten food that spread by themselves.

🔹 5. Trojan Horse

 A malware that looks safe and useful, but actually contains harmful code inside.
 Named after the Greek story of the “Trojan Horse” (a gift that had soldiers hidden
inside).
 Once installed, it allows hackers to steal data or control your computer.
👉 Example: Like a gift box with a bomb hidden inside.

🔹 6. Spyware

 A malware that secretly monitors your activities.


 It can record keystrokes (what you type), take screenshots, or collect personal details.
👉 Example: Like a hidden CCTV camera watching everything you do without your
permission.

🔹 7. Ransomware

 A dangerous malware that locks your files or system.


 Hackers then demand money (ransom) to unlock them.
 Even after paying, hackers may not return your data.
👉 Example: Like a kidnapper who locks your child (data) and demands ransom.

🔹 8. Phishing

 A trick used by hackers to steal sensitive information (passwords, bank details).


 Usually done through fake emails, messages, or websites that look real.
👉 Example: Like a fisherman using bait to catch a fish — here the fish is you and the bait
is a fake message.
🔹 9. Firewall

 A system that blocks harmful or unwanted traffic from entering your computer/network.
 Works like a filter between your computer and the internet.
👉 Example: Like a security guard at your house gate who checks who is allowed to enter.

🔹 10. Antivirus

 A software that finds, stops, and removes viruses/malware.


 Works like a doctor for your computer.
👉 Example: Just like medicine cures your body from diseases, antivirus cures your
computer.

🔹 11. Encryption

 A method of converting normal data into secret code, so only people with the key can
read it.
👉 Example: Like writing your diary in a secret language that only you and your best
friend understand.

🔹 12. Decryption

 The reverse of encryption. It changes secret code back into normal, readable data.
👉 Example: Unlocking a locked diary with the right key.

🔹 13. Authentication

 The process of verifying who someone is.


 Usually done with usernames, passwords, OTPs, or biometrics.
👉 Example: Like showing your ID card before entering your school exam hall.

🔹 14. Two-Factor Authentication (2FA / MFA)

 A stronger way of authentication that requires 2 or more proofs.


 Example: Password + OTP or Password + Fingerprint.
👉 Example: Like needing both a key and your fingerprint to open a locker.
🔹 15. Denial of Service (DoS) Attack

 A cyberattack where hackers overload a system or website with too many requests.
 The system crashes or becomes too slow for real users.
👉 Example: Imagine thousands of people rushing into a small shop so real buyers cannot
enter.

🔹 16. Data Breach

 When private or confidential data is stolen, leaked, or exposed.


 It can happen due to hacking, weak passwords, or insider threats.
👉 Example: Like a thief breaking into your cupboard and stealing your personal files.

🔹 17. Vulnerability

 A weakness or flaw in software, system, or network that hackers can use to attack.
👉 Example: Like a broken lock on your door that makes it easy for thieves to enter.

🔹 18. Patch / Update

 A fix provided by software companies to close vulnerabilities and improve security.


👉 Example: Like repairing a broken door lock so no thief can enter.

🔹 19. Botnet

 A group of computers infected by malware and controlled by a hacker.


 Hackers use botnets for large attacks like DDoS or sending spam emails.
👉 Example: Like a group of robots controlled by one master to attack together.

🔹 20. Social Engineering

 A trick where hackers manipulate people to share information instead of directly hacking
systems.
👉 Example: Like a thief pretending to be a plumber to enter your house and then stealing
your things.

You might also like