0% found this document useful (0 votes)
46 views22 pages

Cyber - Security Notes Unit-I

The document provides an overview of cyber security, defining key concepts such as cyber space, cyber crime, and cyber attacks, and emphasizing the importance of protecting data and networks. It outlines the objectives of cyber security, the CIA model (Confidentiality, Integrity, Availability), and various types of cyber security measures. Additionally, it discusses the challenges of internet governance, cyber threats, and different forms of cyber crime, including hacking, data theft, and cyber terrorism.

Uploaded by

krishkiran2408
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views22 pages

Cyber - Security Notes Unit-I

The document provides an overview of cyber security, defining key concepts such as cyber space, cyber crime, and cyber attacks, and emphasizing the importance of protecting data and networks. It outlines the objectives of cyber security, the CIA model (Confidentiality, Integrity, Availability), and various types of cyber security measures. Additionally, it discusses the challenges of internet governance, cyber threats, and different forms of cyber crime, including hacking, data theft, and cyber terrorism.

Uploaded by

krishkiran2408
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 22

Introduction to

Cyber Security
Introduction to Cyber Security
• Cyber space:Virtual space created by computer networks in which
people can
communicate
• Cyber security:Technologies and processes used to protect computers,
data and
networks from unauthorised access of data
• Cyber crime:Any crime carried out by using computers or the
internet
• Cyber attack:Unauthorised access of private or confidential information
contained on computer network or system
• Cyber forensics:The application of scientifically proven methods to
collect,interprets,process and uses digital evidences to provide a conclusive
description of cyber crime activities
• Cyber law:Cyber law or IT law is referred to as “LAW OF THE INTERNET”.It
is a legal system designed to deal with internet-related legal issues.
CYBER+SECURITY

Technology that includes networks and data

Protecting systems,networks,applications and information


Why is Cyber Security important?
• Safety of data and information
• Data breaching
• Saves networks from intruders
• Prevent damages and threats to businesses
Objectives of cyber security
1. Protect confidentiality of data
2. Preserve the integrity of data
3. Promote the availability of data to authorised users
CIA Model:
C

A
I
1.Confidentiality
• Cryptography
• Two factor authentication
• Biometric verification
• Security token(portable devices)
2.Integrity:
Refers to protecting data from being modified by
unauthorized parties.
If occured recover quickly from such event
3.Availability:
Ensures availability to authorised persons
Types of Cyber Security
• Network security
• Application security
• Information or data security
• Mobile security
• Cloud Security
• Operational security
• Identity management
Cyber security vs information security
• Cyber security is often confused with information security.
• Cyber security focuses on protecting computer systems
from unauthorised access or being otherwise damaged or
made inaccessible.
• Information security is a broader category that protects all
information assets, whether in hard copy or digital form.
Internet Governance
• Internet governance refers to the rules, policies,
standards and practices that coordinate and shape global
cyberspace.
• The Internet is a vast network of independently-managed
networks, woven together by globally standardized data
communication protocols (primarily, Internet Protocol,
TCP, UDP, DNS and BGP).
The challenges of Internet governance
• Cyber Threats
• Cyberwarfare
Cyber threats
• A cyber or cyber security threat is a malicious act that
seeks to damage data, steal data, or disrupt digital life in
general.
• Cyber threats include computer viruses, data breaches,
Denial of Service (DoS) attacks, and other attack vectors.
Cyberwarfare
• Cyberwarfare is the use of cyber attacks against a nation-
state, causing it significant harm, up to and including
physical warfare, disruption of vital computer systems and
loss of life.
Types of cyberwarfare attacks
Destabilization
• In recent years, cybercriminals have been attacking governments
through critical infrastructure, including such entities as transportation
systems, banking systems, power grids, water supplies, dams and
hospitals. The adoption of the internet of things makes the
manufacturing industry increasingly susceptible to outside threats.
• From a national security perspective, destabilizing critical digital
infrastructure inflicts damage on vital modern services or processes.
• For example, an attack on the energy grid could have massive
consequences for the industrial, commercial and private sectors.
Sabotage
• Cyber attacks that sabotage government computer
systems can be used to support conventional warfare
efforts. Such attacks can block official government
communications, contaminate digital systems, enable the
theft of vital intelligence and threaten national security.
State-sponsored or military-sponsored attacks,
• for example, may target military databases to get
information on troop locations, weapons and equipment
being used.
Data theft
• Cybercriminals hack computer systems to steal data that
can be used for intelligence, held for ransom, sold, used
to incite scandals and chaos, or even destroyed.
Cyber Crime
• The crime that involves and uses computer devices and
Internet, is known as cybercrime. Cybercrime can be
committed against an individual or a group; it can also be
committed against government and private organizations.
It may be intended to harm someone‘s reputation,
physical harm, or even mental harm.
• Cybercrime can cause direct harm or indirect harm to
whoever the victim is. However, the largest threat of
cybercrime is on the financial security of an individual as
well as the government.
Types of Cybercrime
Hacking
• It is an illegal practice by which a hacker breaches the
computer‘s security system of someone for personal
interest.
Unwarranted mass-surveillance
• Mass surveillance means surveillance of a substantial
fraction of a group of people by the authority especially for
the security purpose, but if someone does it for personal
interest, it is considered as cybercrime.
Child grooming
• It is the practice of establishing an emotional connection
with a child especially for the purpose of child-trafficking
and child prostitution.
Copyright infringement
• If someone infringes someone‘s protected copyright
without permission and publishes that with his own name,
is known as copyright infringement.
Money laundering
Illegal possession of money by an individual or an
organization is known as money laundering. It typically
involves transfers of money through foreign banks and/or
legitimate business. In other words, it is the practice of
transforming illegitimately earned money into the legitimate
financial system.
Cyber terrorism
• Cyber terrorism can be explained as internet terrorism. With the advent
of the internet, individuals and groups are misusing the anonymity to
threaten individuals, certain groups,religions, ethnicities or beliefs.
• Cyberterrorism can be broadly categorized under three major
categories:
• Simple: This consists of basic attacks including the hacking of an
individual system.
• Advanced: These are more sophisticated attacks and can involve
hacking multiple systems and/or networks.
• Complex: These are coordinated attacks that can have a large-scale
impact and make use of sophisticated tools.

You might also like