100% found this document useful (1 vote)
283 views13 pages

What Is Cyber Security

Cyber security involves protecting internet-connected systems, networks, and data from malicious attacks. It can be divided into cyber and security, where cyber refers to technology like computers and networks, and security protects systems and information. The main goals of cyber security are confidentiality, integrity, and availability of data according to the CIA triad model. Cyber security aims to ensure data is private, accurate, and accessible to authorized users. Common cyber threats include malware, phishing, and man-in-the-middle attacks.

Uploaded by

Watty Post
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
283 views13 pages

What Is Cyber Security

Cyber security involves protecting internet-connected systems, networks, and data from malicious attacks. It can be divided into cyber and security, where cyber refers to technology like computers and networks, and security protects systems and information. The main goals of cyber security are confidentiality, integrity, and availability of data according to the CIA triad model. Cyber security aims to ensure data is private, accurate, and accessible to authorized users. Common cyber threats include malware, phishing, and man-in-the-middle attacks.

Uploaded by

Watty Post
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

What is Cyber Security?

The technique of protecting internet-connected systems such as computers, servers,


mobile devices, electronic systems, networks, and data from malicious attacks is known
as cyber security. We can divide cyber security into two parts one is cyber, and the other
is security. Cyber refers to the technology that includes systems, networks, programs,
and data. And security is concerned with the protection of systems, networks,
applications, and information. In some cases, it is also called electronic information
security or information technology security.

Some other definitions of cyber security are:

"Cyber Security is the body of technologies, processes, and practices designed to protect
networks, devices, programs, and data from attack, theft, damage, modification or
unauthorized access."

"Cyber Security is the set of principles and practices designed to protect our computing
resources and online information against threats."

Play Video

Types of Cyber Security


Every organization's assets are the combinations of a variety of different systems. These
systems have a strong cyber security posture that requires coordinated efforts across all
of its systems. Therefore, we can categorize cyber security in the following sub-domains:

o Network Security: It involves implementing the hardware and software to secure


a computer network from unauthorized access, intruders, attacks, disruption, and
misuse. This security helps an organization to protect its assets against external
and internal threats.
o Application Security: It involves protecting the software and devices from
unwanted threats. This protection can be done by constantly updating the apps
to ensure they are secure from attacks. Successful security begins in the design
stage, writing source code, validation, threat modeling, etc., before a program or
device is deployed.
o Information or Data Security: It involves implementing a strong data storage
mechanism to maintain the integrity and privacy of data, both in storage and in
transit.
o Identity management: It deals with the procedure for determining the level of
access that each individual has within an organization.
o Operational Security: It involves processing and making decisions on handling
and securing data assets.
o Mobile Security: It involves securing the organizational and personal data stored
on mobile devices such as cell phones, computers, tablets, and other similar
devices against various malicious threats. These threats are unauthorized access,
device loss or theft, malware, etc.
o Cloud Security: It involves in protecting the information stored in the digital
environment or cloud architectures for the organization. It uses various cloud
service providers such as AWS, Azure, Google, etc., to ensure security against
multiple threats.
o Disaster Recovery and Business Continuity Planning: It deals with the
processes, monitoring, alerts, and plans to how an organization responds when
any malicious activity is causing the loss of operations or data. Its policies dictate
resuming the lost operations after any disaster happens to the same operating
capacity as before the event.
o User Education: It deals with the processes, monitoring, alerts, and plans to how
an organization responds when any malicious activity is causing the loss of
operations or data. Its policies dictate resuming the lost operations after any
disaster happens to the same operating capacity as before the event.

Importance of Cyber Security


Today we live in a digital era where all aspects of our lives depend on the network,
computer and other electronic devices, and software applications. All critical
infrastructure such as the banking system, healthcare, financial institutions,
governments, and manufacturing industries use devices connected to the Internet as a
core part of their operations. Some of their information, such as intellectual property,
financial data, and personal data, can be sensitive for unauthorized access or exposure
that could have negative consequences. This information gives intruders and threat
actors to infiltrate them for financial gain, extortion, political or social motives, or just
vandalism.

Cyber-attack is now an international concern that hacks the system, and other security
attacks could endanger the global economy. Therefore, it is essential to have an
excellent cyber security strategy to protect sensitive information from high-profile
security breaches. Furthermore, as the volume of cyber-attacks grows, companies and
organizations, especially those that deal with information related to national security,
health, or financial records, need to use strong cyber security measures and processes to
protect their sensitive business and personal information.

Cyber Security Goals


Cyber Security's main objective is to ensure data protection. The security community
provides a triangle of three related principles to protect the data from cyber-attacks.
This principle is called the CIA triad. The CIA model is designed to guide policies for an
organization's information security infrastructure. When any security breaches are
found, one or more of these principles has been violated.

We can break the CIA model into three parts: Confidentiality, Integrity, and Availability.
It is actually a security model that helps people to think about various parts of IT
security. Let us discuss each part in detail.

Confidentiality

Confidentiality is equivalent to privacy that avoids unauthorized access of information. It


involves ensuring the data is accessible by those who are allowed to use it and blocking
access to others. It prevents essential information from reaching the wrong people. Data
encryption is an excellent example of ensuring confidentiality.

Integrity

This principle ensures that the data is authentic, accurate, and safeguarded from
unauthorized modification by threat actors or accidental user modification. If any
modifications occur, certain measures should be taken to protect the sensitive data from
corruption or loss and speedily recover from such an event. In addition, it indicates to
make the source of information genuine.
Availability

This principle makes the information to be available and useful for its authorized people
always. It ensures that these accesses are not hindered by system malfunction or cyber-
attacks.

Types of Cyber Security Threats


A threat in cyber security is a malicious activity by an individual or organization to
corrupt or steal data, gain access to a network, or disrupts digital life in general. The
cyber community defines the following threats available today:

Malware
Malware means malicious software, which is the most common cyber attacking tool. It is
used by the cybercriminal or hacker to disrupt or damage a legitimate user's system.
The following are the important types of malware created by the hacker:

o Virus: It is a malicious piece of code that spreads from one device to another. It
can clean files and spreads throughout a computer system, infecting files, stoles
information, or damage device.
o Spyware: It is a software that secretly records information about user activities on
their system. For example, spyware could capture credit card details that can be
used by the cybercriminals for unauthorized shopping, money withdrawing, etc.
o Trojans: It is a type of malware or code that appears as legitimate software or file
to fool us into downloading and running. Its primary purpose is to corrupt or
steal data from our device or do other harmful activities on our network.
o Ransom ware: It's a piece of software that encrypts a user's files and data on a
device, rendering them unusable or erasing. Then, a monetary ransom is
demanded by malicious actors for decryption.
o Worms: It is a piece of software that spreads copies of itself from device to
device without human interaction. It does not require them to attach themselves
to any program to steal or damage the data.
o Adware: It is an advertising software used to spread malware and displays
advertisements on our device. It is an unwanted program that is installed without
the user's permission. The main objective of this program is to generate revenue
for its developer by showing the ads on their browser.
o Botnets: It is a collection of internet-connected malware-infected devices that
allow cybercriminals to control them. It enables cybercriminals to get credentials
leaks, unauthorized access, and data theft without the user's permission.

Phishing
Phishing is a type of cybercrime in which a sender seems to come from a genuine
organization like PayPal, eBay, financial institutions, or friends and co-workers. They
contact a target or targets via email, phone, or text message with a link to persuade
them to click on that links. This link will redirect them to fraudulent websites to provide
sensitive data such as personal information, banking and credit card information, social
security numbers, usernames, and passwords. Clicking on the link will also install
malware on the target devices that allow hackers to control devices remotely.

Man-in-the-middle (MITM) attack


A man-in-the-middle attack is a type of cyber threat (a form of eavesdropping attack) in
which a cybercriminal intercepts a conversation or data transfer between two
individuals. Once the cybercriminal places themselves in the middle of a two-party
communication, they seem like genuine participants and can get sensitive information
and return different responses. The main objective of this type of attack is to gain access
to our business or customer data. For example, a cybercriminal could intercept data
passing between the target device and the network on an unprotected Wi-Fi network.

Distributed denial of service (DDoS)


It is a type of cyber threat or malicious attempt where cybercriminals disrupt targeted
servers, services, or network's regular traffic by fulfilling legitimate requests to the target
or its surrounding infrastructure with Internet traffic. Here the requests come from
several IP addresses that can make the system unusable, overload their servers, slowing
down significantly or temporarily taking them offline, or preventing an organization
from carrying out its vital functions.

Brute Force
A brute force attack is a cryptographic hack that uses a trial-and-error method to
guess all possible combinations until the correct information is discovered.
Cybercriminals usually use this attack to obtain personal information about targeted
passwords, login info, encryption keys, and Personal Identification Numbers (PINS).

SQL Injection (SQLI)


SQL injection is a common attack that occurs when cybercriminals use malicious SQL
scripts for backend database manipulation to access sensitive information. Once the
attack is successful, the malicious actor can view, change, or delete sensitive company
data, user lists, or private customer details stored in the SQL database.

Domain Name System (DNS) attack


A DNS attack is a type of cyber attack in which cyber criminals take advantage of flaws
in the Domain Name System to redirect site users to malicious websites (DNS hijacking)
and steal data from affected computers. It is a severe cyber security risk because the
DNS system is an essential element of the internet infrastructure.

Latest Cyber Threats


The following are the latest cyber threats reported by the U.K., U.S., and Australian
governments:

Romance Scams
The U.S. government found this cyber threat in February 2020. Cybercriminals used this
threat through dating sites, chat rooms, and apps. They attack people who are seeking a
new partner and duping them into giving away personal data.

Dridex Malware
It is a type of financial Trojan malware identifies by the U.S. in December 2019 that
affects the public, government, infrastructure, and business worldwide. It infects
computers through phishing emails or existing malware to steal sensitive information
such as passwords, banking details, and personal data for fraudulent transactions. The
National Cyber Security Centre of the United Kingdom encourages people to make sure
their devices are patched, anti-virus is turned on and up to date, and files are backed up
to protect sensitive data against this attack.

Emotet Malware
Emotet is a type of cyber-attack that steals sensitive data and also installs other malware
on our device. The Australian Cyber Security Centre warned national organizations
about this global cyber threat in 2019.

The following are the system that can be affected by security breaches and
attacks:

o Communication: Cyber attackers can use phone calls, emails, text messages, and
messaging apps for cyber attacks.
o Finance: This system deals with the risk of financial information like bank and
credit card detail. This information is naturally a primary target for cyber
attackers.
o Governments: The cybercriminal generally targets the government institutions to
get confidential public data or private citizen information.
o Transportation: In this system, cybercriminals generally target connected cars,
traffic control systems, and smart road infrastructure.
o Healthcare: A cybercriminal targets the healthcare system to get the information
stored at a local clinic to critical care systems at a national hospital.
o Education: A cybercriminals target educational institutions to get their
confidential research data and information of students and employees.

Benefits of Cyber Security


The following are the benefits of implementing and maintaining cyber security:
o Cyber attacks and data breach protection for businesses.
o Data and network security are both protected.
o Unauthorized user access is avoided.
o After a breach, there is a faster recovery time.
o End-user and endpoint device protection.
o Regulatory adherence.
o Continuity of operations.
o Developers, partners, consumers, stakeholders, and workers have more faith in
the company's reputation and trust.

Cyber Safety Tips


Let us see how to protect ourselves when any cyber attacks happen. The following are
the popular cyber safety tips:

Conduct cyber security training and awareness: Every organization must train their
staffs on cyber security, company policies, and incident reporting for a strong cyber
security policy to be successful. If the staff does unintentional or intentional malicious
activities, it may fail the best technical safeguards that result in an expensive security
breach. Therefore, it is useful to conduct security training and awareness for staff
through seminars, classes, and online courses that reduce security violations.

Update software and operating system: The most popular safety measure is to update
the software and O.S. to get the benefit of the latest security patches.

Use anti-virus software: It is also useful to use the anti-virus software that will detect
and removes unwanted threats from your device. This software is always updated to get
the best level of protection.

Perform periodic security reviews: Every organization ensures periodic security


inspections of all software and networks to identify security risks early in a secure
environment. Some popular examples of security reviews are application and network
penetration testing, source code reviews, architecture design reviews, and red team
assessments. In addition, organizations should prioritize and mitigate security
vulnerabilities as quickly as possible after they are discovered.

Use strong passwords: It is recommended to always use long and various combinations
of characters and symbols in the password. It makes the passwords are not easily
guessable.

Do not open email attachments from unknown senders: The cyber expert always
advises not to open or click the email attachment getting from unverified senders or
unfamiliar websites because it could be infected with malware.

Avoid using unsecured Wi-Fi networks in public places: It should also be advised not
to use insecure networks because they can leave you vulnerable to man-in-the-middle
attacks.

Backup data: Every organization must periodically take backup of their data to ensure
all sensitive data is not lost or recovered after a security breach. In addition, backups can
help maintain data integrity in cyber-attack such as SQL injections, phishing, and ransom
ware.
History of Cyber Security
The origin of cybersecurity began with a research project. It only came into existence
because of the development of viruses.

How did we get here?

In 1969, Leonard Kleinrock, professor of UCLA and student, Charley Kline, sent the first
electronic message from the UCLA SDS Sigma 7 Host computer to Bill Duvall, a
programmer, at the Stanford Research Institute. This is a well-known story and a
moment in the history of a digital world. The sent message from the UCLA was the word
"login." The system crashed after they typed the first two letters "lo." Since then, this
story has been a belief that the programmers typed the beginning message "lo and
behold." While factually believed that "login" was the intended message. Those two
letters of messages were changed the way we communicate with one another.

In 1970's, Robert (Bob) Thomas who was a researcher for BBN Technologies in


Cambridge, Massachusetts created the first computer worm (virus). He realized that it
was possible for a computer program to move across a network, leaving a small trail
(series of signs) wherever it went. He named the program Creeper, and designed it to
travel between Tenex terminals on the early ARPANET, printing the message "I'M THE
CREEPER: CATCH ME IF YOU CAN."

An American computer programmer named Ray Tomlinson, the inventor of email, was


also working for BBN Technologies at the time. He saw this idea and liked it. He tinkered
(an act of attempting to repair something) with the program and made it self-replicating
"the first computer worm." He named the program Reaper, the first antivirus
software which would found copies of The Creeper and delete it.

Where are we now?


After Creeper and Reaper, cyber-crimes became more powerful. As computer software
and hardware developed, security breaches also increase. With every new development
came an aspect of vulnerability, or a way for hackers to work around methods of
protection. In 1986, the Russians were the first who implement the cyber power as a
weapon. Marcus Hess, a German citizen, hacked into 400 military computers, including
processors at the Pentagon. He intended to sell secrets to the KGB, but an American
astronomer, Clifford Stoll, caught him before that could happen.

In 1988, an American computer scientist, Robert Morris, wanted to check the size of


the internet. He wrote a program for testing the size of the internet. This program went
through networks, invaded Unix terminals, and copied itself. The program became the
first famous network virus and named as Moris worm or internet worm. The Morris
worm could be infected a computer multiple times, and each additional process would
slow the machine down, eventually to the point of being damaged. Robert Morris was
charged under the Computer Fraud and Abuse Act. The act itself led to the founding
of the Computer Emergency Response Team. This is a non-profit research centre for
issues that could endanger the internet as a whole.

Nowadays, viruses were deadlier, more invasive, and harder to control. We have already
experienced cyber incidents on a massive scale, and 2018 isn't close to over. The above
is to name a few, but these attacks are enough to prove that cyber security is a necessity
for corporations and small businesses alike.
Cyber Security Goals
The objective of Cyber security is to protect information from being stolen,
compromised or attacked. Cyber security can be measured by at least one of three
goals-

1. Protect the confidentiality of data.


2. Preserve the integrity of data.
3. Promote the availability of data for authorized users.

These goals form the confidentiality, integrity, availability (CIA) triad, the basis of all
security programs. The CIA triad is a security model that is designed to guide policies for
information security within the premises of an organization or company. This model is
also referred to as the AIC (Availability, Integrity, and Confidentiality) triad to avoid
the confusion with the Central Intelligence Agency. The elements of the triad are
considered the three most crucial components of security.

The CIA criteria are one that most of the organizations and companies use when they
have installed a new application, creates a database or when guaranteeing access to
some data. For data to be completely secure, all of these security goals must come into
effect. These are security policies that all work together, and therefore it can be wrong
to overlook one policy.

The CIA triad are-

1. Confidentiality
Confidentiality is roughly equivalent to privacy and avoids the unauthorized disclosure
of information. It involves the protection of data, providing access for those who are
allowed to see it while disallowing others from learning anything about its content. It
prevents essential information from reaching the wrong people while making sure that
the right people can get it. Data encryption is a good example to ensure confidentiality.

Tools for Confidentiality

Encryption
Encryption is a method of transforming information to make it unreadable for
unauthorized users by using an algorithm. The transformation of data uses a secret key
(an encryption key) so that the transformed data can only be read by using another
secret key (decryption key). It protects sensitive data such as credit card numbers by
encoding and transforming data into unreadable cipher text. This encrypted data can
only be read by decrypting it. Asymmetric-key and symmetric-key are the two primary
types of encryption.

Access control
Access control defines rules and policies for limiting access to a system or to physical or
virtual resources. It is a process by which users are granted access and certain privileges
to systems, resources or information. In access control systems, users need to present
credentials before they can be granted access such as a person's name or a computer's
serial number. In physical systems, these credentials may come in many forms, but
credentials that can't be transferred provide the most security.

Authentication
An authentication is a process that ensures and confirms a user's identity or role that
someone has. It can be done in a number of different ways, but it is usually based on a
combination of-

o something the person has (like a smart card or a radio key for storing secret
keys),
o something the person knows (like a password),
o Something the person is (like a human with a fingerprint).

Authentication is the necessity of every organizations because it enables organizations


to keep their networks secure by permitting only authenticated users to access its
protected resources. These resources may include computer systems, networks,
databases, websites and other network-based applications or services.

Authorization
Authorization is a security mechanism which gives permission to do or have something.
It is used to determine a person or system is allowed access to resources, based on an
access control policy, including computer programs, files, services, data and application
features. It is normally preceded by authentication for user identity verification. System
administrators are typically assigned permission levels covering all system and user
resources. During authorization, a system verifies an authenticated user's access rules
and either grants or refuses resource access.

Physical Security
Physical security describes measures designed to deny the unauthorized access of IT
assets like facilities, equipment, personnel, resources and other properties from damage.
It protects these assets from physical threats including theft, vandalism, fire and natural
disasters.

2. Integrity
Integrity refers to the methods for ensuring that data is real, accurate and safeguarded
from unauthorized user modification. It is the property that information has not be
altered in an unauthorized way, and that source of the information is genuine.

Tools for Integrity


Backups
Backup is the periodic archiving of data. It is a process of making copies of data or data
files to use in the event when the original data or data files are lost or destroyed. It is
also used to make copies for historical purposes, such as for longitudinal studies,
statistics or for historical records or to meet the requirements of a data retention policy.
Many applications especially in a Windows environment, produce backup files using
the .BAK file extension.

Checksums
A checksum is a numerical value used to verify the integrity of a file or a data transfer. In
other words, it is the computation of a function that maps the contents of a file to a
numerical value. They are typically used to compare two sets of data to make sure that
they are the same. A checksum function depends on the entire contents of a file. It is
designed in a way that even a small change to the input file (such as flipping a single
bit) likely to results in different output value.

Data Correcting Codes


It is a method for storing data in such a way that small changes can be easily detected
and automatically corrected.

3. Availability
Availability is the property in which information is accessible and modifiable in a timely
fashion by those authorized to do so. It is the guarantee of reliable and constant access
to our sensitive data by authorized people.

Tools for Availability

o Physical Protections
o Computational Redundancies

Physical Protections
Physical safeguard means to keep information available even in the event of physical
challenges. It ensure sensitive information and critical information technology are
housed in secure areas.

Computational redundancies
It is applied as fault tolerant against accidental faults. It protects computers and storage
devices that serve as fallbacks in the case of failures.

You might also like