Unit 1 (Cyber Security)
Unit 1 (Cyber Security)
1.Introduction to security
What is Cyber Security?
Cyber Security is a process that’s designed to protect networks and
devices from external threats.
The world of Cyber Security revolves around the industry standard of
confidentiality, integrity, and availability, or CIA.
The main element of Cyber Security is the use of authentication
mechanisms.
Privacy means data can be accessed only by authorized parties;
Integrity means information can be added, altered, or removed only by
authorized users and
Availability means systems, functions, and data must be available on-
demand.
Types of Cyber Crimes
Cybercrime is any unauthorized activity involving a computer, device, or
network.
Denial of Service, or DOS
Where a hacker consumes all of a server’s resources, so there’s nothing for
legitimate users to access.
Malware
Where victims are hit with a worm or virus that renders their devices useless.
Man in the Middle
Where a hacker puts himself between a victim’s machine and a router to sniff
data packets.
Phishing
Where a hacker sends a seemingly legitimate-looking email asking users to
disclose personal information
2.CIA Triad
Confidentiality, integrity and availability, also known as the CIA triad, is a
model designed to guide policies for information security within an
organization.
Confidentiality
Confidentiality refers to an organization’s efforts to keep their data
private or secret.
This involves ensuring that only those who are authorized have access to
specific assets and that those who are unauthorized are actively prevented
from obtaining access.
Confidentiality can be violated in many ways, for example, through direct
attacks designed to gain unauthorized access to systems, applications, and
databases in order to steal or tamper with data.
Counter measures
Strong access controls and authentication mechanisms.
Encryption of data in process, in transit, and in storage.
Steganography.
Adequate education and training for all individuals with access to data.
Integrity
Integrity refers to the quality of something being whole or complete.
Integrity is about ensuring that data has not been tampered with and,
therefore, can be trusted.
It is correct, authentic, and reliable.
Counter measures
Protect data integrity include encryption, hashing, digital signatures, digital
certificates Trusted certificate authorities (CAs) issue digital certificates to
organizations to verify their identity to website users.
Availability
Availability means that networks, systems, and applications are up and
running.
It ensures that authorized users have timely, reliable access to resources
when they are needed.
Many things can jeopardize availability, including hardware or software
failure, power failure, natural disasters, and human error.
The most well-known attack that threatens availability is the denial-of-
service attack.
Counter measures
Ensures availability include redundancy (in servers, networks, applications, and
services), hardware fault tolerance (for servers and storage), regular software
patching and system upgrades, backups, comprehensive disaster recovery plans,
and denial-of-service protection solutions.
3.Security attacks
A cyber-attack is an exploitation of computer systems and networks.
It uses malicious code to alter computer code, logic or data and lead to
cybercrimes, such as information and identity theft.
Cyber-attacks can be classified into the following categories:
Web-based attacks
Denial of Service
It is an attack which meant to make a server or network resource
unavailable to the users.
It accomplishes this by flooding the target with traffic or sending it
information that triggers a crash.
It uses the single system and single internet connection to attack a server.
Phishing
Phishing is a type of attack which attempts to steal sensitive information
like user login credentials and credit card number.
It occurs when an attacker is masquerading as a trustworthy entity in
electronic communication.
Session Hijacking
Injection attacks
It is the attack in which some data will be injected into a web application to
manipulate the application and fetch the required information.
DNS Spoofing
System-based attacks
1. Virus
2. Worm
3. Trojan horse
4. Backdoors
5. Bots
A bot (short for "robot") is an automated process that interacts with other
network services.
Common examples of bots program are the crawler, chatroom bots, and
malicious bots.
staying connected with family and friends worldwide via email, text,
FaceTime, etc.
quick access to information and research
banking and bill pay at our fingertips
online learning, job skills, content discovery (YouTube)
involvement in civic engagement (fundraising, social awareness, provides
a voice)
great marketing tools
opportunities for remote employment
Issues
Online vs Reality
Self-image issues
Social media sites provide tools that allow people to earn others’ approval
for their appearance and the possibility to compare themselves to others.
It can be associated with body image concerns.
The “selfieholics” and people who spend most of their time posting and
scrolling are the ones most vulnerable to this.
Unfortunately, there are those who use social network for scams and
other illegal purposes.
There have been reports around the world that social networks are used to
spread rumors, lies or degrading messages that could affect the person’s
reputation.
“Cyber bullying” or an act of being hostile to another user online has also
been observed in some social networks.
Information Access