Assignment on Cyber Security
B.Com 5th Semester – RCUB
Page 1 – Introduction to Cyber Security
Cyber Security is the practice of protecting systems, networks, and data from digital attacks.
In today’s world, almost every activity depends on the internet – shopping, banking,
education, government services. This makes security very important.
Definition: Cyber Security refers to the protection of systems, networks, software and data
from attacks, theft and damage. It mainly ensures Confidentiality, Integrity and Availability
(CIA).
Objectives:
1. Confidentiality – Only authorized users should access data.
2. Integrity – Data should not be altered or corrupted.
3. Availability – Services should be available when required.
Example: Banks use cyber security to protect ATM and online transactions.
Page 2 – Internet & Communication Topologies
The Internet is a global network of networks that connects millions of devices. It works
through servers, routers, ISPs, and DNS. Communication takes place in different network
structures called topologies.
Types of Topologies:
- Bus: All devices share a single backbone cable.
- Star: Devices connected to a central hub.
- Ring: Devices connected in a circle.
- Mesh: Every device connected to every other device.
- Hybrid: Combination of topologies.
Each has its advantages and disadvantages. Security in these topologies is crucial because a
single weak link can compromise the network.
Page 3 – Internet Challenges & Data Security
The internet faces many challenges related to security. Major issues include hacking,
phishing, identity theft, malware attacks, and Distributed Denial of Service (DDoS).
Data Security is the process of protecting digital data from unauthorized access or
corruption. Methods include:
- Encryption
- Firewalls
- Authentication
- Virtual Private Networks (VPNs)
Example: In 2019, Facebook suffered a data breach where details of over 530 million users
were leaked.
Page 4 – Cyber Crime (Basics & Types)
Cybercrime is any crime committed using computers or the internet.
Types:
- Against Individuals: Identity theft, online harassment, cyberstalking.
- Against Property: Hacking, software piracy, data theft.
- Against Government: Attacks on government websites, cyber espionage.
Cybercrimes are increasing due to easy internet access and lack of awareness among users.
Page 5 – Cyber Crime (Advanced Threats)
Advanced cyber threats include:
- Ransomware: Locks data and demands money.
- Spyware: Monitors user activity.
- Keyloggers: Record keystrokes to steal passwords.
- Zero-day attacks: Exploiting software weaknesses unknown to developers.
Case Study: The WannaCry ransomware attack in 2017 affected banks, hospitals, and
organizations worldwide, causing billions of dollars in damage.
Page 6 – Cyber Law in India
To control cybercrimes, India introduced the Information Technology Act, 2000 (IT Act).
Key Provisions:
1. Legal recognition of electronic documents and signatures.
2. Punishments for hacking, identity theft, and fraud.
3. Recognition of digital evidence in courts.
Amendment in 2008: Added cyber terrorism, data protection, and stronger penalties.
Institutions:
- CERT-In (Computer Emergency Response Team India)
- Cyber Crime Police Cells
- RBI Guidelines for online banking
Page 7 – Social Media and Its Importance
Social media platforms like Facebook, Instagram, Twitter, and WhatsApp are widely used
for communication, entertainment, and business.
Benefits:
- Easy communication
- Digital marketing
- Knowledge sharing
- Business promotion
Example: Zomato and Swiggy use social media ads to promote food delivery services.
Page 8 – Challenges of Social Media
Although social media is useful, it has challenges:
- Fake news and misinformation
- Cyberbullying and trolling
- Privacy loss
- Political manipulation (Example: Cambridge Analytica scandal)
- Addiction leading to reduced productivity
Thus, social media requires strong regulation and user awareness.
Page 9 – Security Issues in Social Media
Major issues:
- Data privacy leakage to third-party apps
- Fake accounts and impersonation
- Malware spread through malicious links
- Social engineering (tricking people into revealing secrets)
Preventive Measures:
1. Use Two-Factor Authentication (2FA)
2. Do not share personal details openly
3. Strong passwords
4. Report fake profiles
Page 10 – E-Commerce & Its Scope
E-Commerce is the buying and selling of goods and services over the internet.
Types:
- B2B (Business to Business)
- B2C (Business to Customer)
- C2C (Customer to Customer)
- C2B (Customer to Business)
Scope:
- Online retail
- Internet banking
- Online ticket booking
- Online education
Example: Flipkart and Amazon have changed the way Indians shop.
Page 11 – Digital Payments & Security
Digital payments are essential for e-commerce. Modes include debit/credit cards, UPI,
mobile wallets, and net banking.
Security Issues:
- Phishing websites
- OTP frauds
- Fake apps
- Card skimming
Regulatory Guidelines:
- RBI mandates two-factor authentication
- Transaction alerts via SMS/email
Case Study: UPI in India crossed 14 billion transactions in 2023, showing massive digital
adoption.
Page 12 – Mobile & Endpoint Security + Conclusion
Mobile devices are most vulnerable to cyber attacks.
Threats:
- Malicious apps
- SIM swap attacks
- Spyware
Security Tips:
- Keep phones updated
- Use antivirus
- Download apps only from Play Store/App Store
- Avoid public Wi-Fi for banking
Conclusion:
Cyber Security is the backbone of the digital economy. With proper laws, awareness, and
security measures, cyber threats can be minimized.
Bibliography:
1. William Stallings – Network Security Essentials
2. Forouzan – Data Communications and Networking
3. RCUB Cyber Security Syllabus
4. Websites: cert-in.org.in, rbi.org.in, cisco.com