0% found this document useful (0 votes)
135 views24 pages

Module01-Cyber Security

Uploaded by

Google Verse
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
135 views24 pages

Module01-Cyber Security

Uploaded by

Google Verse
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

Module 01: Introduction to Cyber Security.

Module 01: Introduction to Cyber Security


Overview of computer and web technology

Computer and web technology have revolutionized the way we live, work, and
communicate. They are intricately connected and have evolved significantly over the years.
Here's an overview of these technologies:

Computer Technology

 Hardware: Computers consist of hardware components such as the central processing


unit (CPU), memory (RAM), storage (hard drives, SSDs), input/output devices (keyboard,
mouse, monitor), and various peripheral devices. Advances in hardware have led to faster
processing, increased storage capacity, and more efficient power consumption.
 Software: Computer software includes operating systems (e.g., Windows, macOS, Linux)
and application software (e.g., Microsoft Office, Adobe Photoshop). Software
development and programming languages have expanded, enabling the creation of a wide
range of applications and services.
 Networking: Computer technology has evolved to include wired and wireless networks.
The internet, based on the TCP/IP protocol, allows global connectivity, enabling data
transfer and communication worldwide.
 Security: With the growth of computer usage, cybersecurity has become critical.
Technologies such as firewalls, antivirus software, encryption, and intrusion detection
systems protect against cyber threats.
 Cloud Computing: Cloud technology has emerged, enabling access to remote servers and
services over the internet. Cloud services provide scalable storage, processing power, and
infrastructure on-demand.

Web Technology

Web Development: The World Wide Web (WWW) is at the core of web technology.
Web development involves creating websites and web applications using languages such as
HTML, CSS, JavaScript, and server-side scripting languages like PHP, Python, and Ruby.

 Web Browsers: Web browsers like Google Chrome, Mozilla Firefox, and Microsoft Edge
allow users to access and interact with web content. They support HTML rendering,
JavaScript execution, and provide a user-friendly interface.

Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 1
Module 01: Introduction to Cyber Security.

 Web Standards: Organizations like the World Wide Web Consortium (W3C) establish
web standards and protocols to ensure compatibility and consistency across browsers and
devices. These standards promote accessibility and responsive design.
 Mobile Technology: Mobile web technology has grown significantly with the
proliferation of smartphones and tablets. Responsive web design and mobile applications
enable a seamless user experience on various devices.
 E-commerce: The web has become a major platform for online shopping and transactions.
Secure payment gateways and e-commerce platforms facilitate online business.
 Social Media: Web technology has given rise to social media platforms like Facebook,
Twitter, and Instagram, which connect people, facilitate communication, and support
content sharing.
 Web Hosting: Web hosting services provide the infrastructure and servers needed to
publish websites on the internet. Various hosting options include shared hosting, VPS,
dedicated servers, and cloud hosting.
 Search Engines: Search engines like Google and Bing use complex algorithms to index
and rank web content, making it easier for users to find information online.
 Web Security: Web security measures, such as HTTPS, SSL/TLS encryption, and secure
coding practices, protect users' data and privacy. Security breaches and data protection are
growing concerns in web technology.
 Web Analytics: Tools like Google Analytics help website owners track visitor behavior,
analyze website performance, and make data-driven decisions.

Both computer and web technology are constantly evolving. Emerging technologies
like artificial intelligence (AI), blockchain, and the Internet of Things (IoT) are further
shaping the landscape of computing and the web. As these technologies advance, they
continue to influence nearly every aspect of modern life, from business and communication
to entertainment and education.

Communication and Web technology


Communication and web technology are closely intertwined and have transformed the
way we interact, collaborate, and share information in the digital age. Here's an overview of
how communication and web technology intersect:

Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 2
Module 01: Introduction to Cyber Security.

 Web-Based Communication Tools: The web is a platform for a wide range of


communication tools and platforms, including:
 Email: Web-based email services like Gmail, Outlook, and Yahoo Mail have made it
easier to send, receive, and manage emails. They often include features like
attachments, filters, and real-time syncing across devices.
 Instant Messaging and Chat: Web technologies power instant messaging platforms
like WhatsApp, Facebook Messenger, Slack, and Microsoft Teams, enabling real-time
text, voice, and video communication.
 Voice and Video Calling: Web-based applications like Zoom, Skype, and Google
Meet offer high-quality voice and video calling over the internet, facilitating remote
meetings, interviews, and personal conversations.
 Social Media: Platforms like Facebook, Twitter, Instagram, and LinkedIn connect
people and organizations, enabling them to share updates, messages, and multimedia
content.
 Web Conferencing: Web technology supports virtual meetings and webinars,
allowing people to communicate and collaborate regardless of their physical location.
Features include screen sharing, document collaboration, and interactive chat.
 Collaboration Tools: Web-based collaboration tools like Google Workspace
(formerly G Suite) and Microsoft Office 365 offer document editing, real-time
collaboration, and file sharing, fostering teamwork in a digital workspace.
 Blogs and Forums: Web technology enables the creation of blogs and online forums
where people can share their thoughts, discuss topics, and engage in conversations on
various subjects.
 Web-Based Email Marketing: Organizations use web technology to send marketing
emails, newsletters, and promotional content to subscribers. Tools like MailChimp
and Constant Contact facilitate email marketing campaigns.
 Online Surveys and Feedback Forms: Web technology is used for creating and
distributing online surveys and feedback forms, making it easy for organizations to
gather user input and opinions.
 APIs and Web Services: Application Programming Interfaces (APIs) and web
services provide the means for different software systems to communicate and share
data over the web. These enable integration between various applications and
services.

Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 3
Module 01: Introduction to Cyber Security.

 Web Security: Ensuring secure communication is a significant aspect of web


technology. This includes encryption protocols (SSL/TLS), secure authentication, and
measures to protect data and user privacy.
 Mobile Communication Apps: Mobile apps, heavily reliant on web technologies,
provide users with messaging, voice calls, video calls, and other forms of
communication on smartphones and tablets.

Communication and web technology continue to evolve, offering new features and
possibilities for connecting people and organizations worldwide. The integration of artificial
intelligence, improved video streaming, augmented reality, and virtual reality in web-based
communication further expands the opportunities for effective and engaging digital
interactions.

Internet
The internet, often simply referred to as "the net," is a global network of
interconnected computer networks that use standardized communication protocols to link
devices worldwide. It is the largest and most extensive information and communication
infrastructure ever created. Here are some key aspects of the internet:

 Global Connectivity: The internet connects millions of computers and devices


worldwide. It knows no geographical boundaries and allows people and organizations to
communicate, share information, and access resources from nearly anywhere on the
planet.
 Protocols: The internet relies on a set of protocols, most notably the Internet Protocol
(IP) and Transmission Control Protocol (TCP). These protocols govern the routing and
transmission of data across the network.
 World Wide Web (WWW): The World Wide Web is a system of interlinked documents
and resources, accessed via web browsers. It was developed in the early 1990s and is one
of the most popular and widely used services on the internet.
 Email: Electronic mail (email) is a fundamental and widely used communication tool on
the internet. It enables users to exchange messages, documents, and files quickly and
efficiently.
 Web Search Engines: Search engines like Google, Bing, and Yahoo enable users to find
specific information on the web by searching for keywords or phrases.

Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 4
Module 01: Introduction to Cyber Security.

 E-commerce: The internet has revolutionized commerce, allowing businesses to sell


products and services online. E-commerce platforms like Amazon, eBay, and Alibaba
have transformed retail.
 Cloud Computing: Cloud services, offered by companies like Amazon Web Services
(AWS), Microsoft Azure, and Google Cloud, provide on-demand access to computing
resources and storage over the internet.
 Online Streaming: The internet has enabled the streaming of video and audio content
through platforms like Netflix, YouTube, Spotify, and Apple Music.
 Internet of Things (IoT): IoT refers to the network of interconnected devices and objects
that can collect and exchange data. These devices include smart appliances, wearables,
and industrial sensors.
 Cybersecurity: Internet security measures are essential to protect data, privacy, and
infrastructure. Technologies like firewalls, encryption, and antivirus software are used to
mitigate cyber threats.
 Web Accessibility: Efforts are made to ensure that the web is accessible to all
individuals, including those with disabilities. This includes adherence to web content
accessibility guidelines (WCAG).
 Emerging Technologies: Ongoing developments in artificial intelligence, virtual reality,
blockchain, and 5G connectivity are reshaping the capabilities and potential of the
internet.

The internet has had a profound impact on nearly every aspect of modern life, from
business and education to communication and entertainment. It has facilitated globalization,
democratized information access, and fostered innovation on a massive scale. As it continues
to evolve, the internet is expected to bring about further transformations in how we interact,
work, and live.

Advent of Internet
The advent of the internet represents a pivotal moment in the history of technology
and communication. Here's an overview of the key milestones and developments in the
evolution of the internet:

 1960s - The ARPANET: The precursor to the internet was the ARPANET (Advanced
Research Projects Agency Network), a U.S. Department of Defence project created in
1969. ARPANET was designed to facilitate communication among researchers and
Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 5
Module 01: Introduction to Cyber Security.

scientists. It used packet-switching technology, a fundamental concept behind the modern


internet.
 1970s - Development of Protocols: During the 1970s, the foundational communication
protocols that underpin the internet were developed. The Transmission Control Protocol
(TCP) and the Internet Protocol (IP) were standardized, creating the basis for the TCP/IP
protocol suite, which is still used today.
 1980s - Expansion and Commercialization: In the 1980s, the ARPANET evolved into a
larger network known as the Defense Data Network (DDN), and other networks, like
NSFNET (National Science Foundation Network), emerged. This decade saw the
transition from a research and military network to one that began to be used for
commercial and civilian purposes.
 1990s - World Wide Web: The invention of the World Wide Web by Tim Berners-Lee in
1989 and the release of the first web browser in 1991 marked a turning point. The web
made it possible for individuals to access and share information and multimedia content
using a user-friendly interface. This period also witnessed the commercialization of the
internet, with the launch of commercial ISPs and the dot-com boom.
 Late 1990s - Broadband and E-commerce: High-speed broadband internet access
became widely available in the late 1990s, enabling faster web surfing and multimedia
content streaming. E-commerce platforms like Amazon and eBay gained prominence,
transforming the way people shopped.
 Early 2000s - Social Media and Web 2.0: The early 2000s saw the rise of social media
platforms like Friendster, MySpace, and later, Facebook, Twitter, and LinkedIn. Web 2.0
principles encouraged user-generated content and interactivity, reshaping online
communication and collaboration.
 Mid-2000s - The Mobile Internet: The advent of smartphones and the iPhone in 2007
ushered in the era of mobile internet access. This allowed people to access the web and
communicate on the go, leading to the development of mobile apps and mobile-friendly
websites.
 2010s - Cloud Computing and Streaming: Cloud computing services like Amazon Web
Services (AWS), Google Cloud, and Microsoft Azure became essential for businesses,
while streaming services like Netflix, YouTube, and Spotify changed the way people
consumed media.

Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 6
Module 01: Introduction to Cyber Security.

 2020s - IoT, 5G, and Emerging Technologies: The 2020s have seen the expansion of the
Internet of Things (IoT), which connects a wide range of devices to the internet. The
rollout of 5G networks promises faster and more reliable connectivity, while emerging
technologies like artificial intelligence (AI), blockchain, and augmented reality (AR) are
being integrated into the internet ecosystem.

World wide web


The World Wide Web (WWW), often referred to as the web, is a system of
interconnected documents, resources, and multimedia content that is accessed over the
internet. The World Wide Web was invented by British computer scientist Tim Berners-Lee in
1989 while working at CERN in Switzerland.

The first web page was created in 1990, and the web quickly expanded, becoming the
primary medium for sharing information, conducting e-commerce, socializing, and accessing
online services. It has played a transformative role in how we work, learn, communicate, and
entertain ourselves in the digital age. It's a key component of the internet and is used for
information retrieval, communication, and a wide range of online activities. Here are some
key aspects of the World Wide Web:

 Hypertext and Hyperlinks: The web is built on the concept of hypertext, which
allows documents to contain links to other documents. These links are called
hyperlinks, and they enable users to navigate between web pages by simply clicking
on them. Hyperlinks make the web non-linear and highly interactive.
 Web Pages: Web pages are individual documents that can contain various types of
content, including text, images, videos, and interactive elements. They are typically
created using HTML (Hypertext Markup Language) and can be displayed in web
browsers.
 Web Browsers: Web browsers, like Google Chrome, Mozilla Firefox, Microsoft
Edge, and Safari, are software applications that allow users to access, view, and
interact with web content. They render web pages and provide the interface for
navigating the web.2
 Uniform Resource Locators (URLs): URLs are web addresses that are used to
locate and access specific web resources. They consist of a protocol (e.g., "http" or
"https"), domain name (e.g., "www.example.com"), and a specific path to a resource
(e.g., "/page1").
Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 7
Module 01: Introduction to Cyber Security.

 HTML and Web Standards: The web operates based on standardized protocols and
languages, with HTML as the core markup language for creating web pages. Web
standards ensure consistency and compatibility across different browsers.
 HTTP and HTTPS: Hypertext Transfer Protocol (HTTP) is the protocol used for
transmitting web pages, while HTTPS (HTTP Secure) is the secure version of HTTP,
encrypting data exchanged between the user and the web server. HTTPS is essential
for secure web browsing.
 Web Servers: Web servers store and deliver web content to users when they request it
through their web browsers. Servers respond to requests, retrieve web pages, and send
them to the user's browser.
 Search Engines: Search engines like Google, Bing, and Yahoo index web content and
provide a means for users to search and find specific information on the web.
 Web Development: Web development involves creating and maintaining web pages
and websites. Web developers use various technologies, including HTML, CSS
(Cascading Style Sheets), and JavaScript, to design and build web applications.
 Web Accessibility: Efforts are made to ensure that web content is accessible to
individuals with disabilities, as per web content accessibility guidelines (WCAG).
This includes providing alternative text for images, semantic HTML, and keyboard
navigation support.

Internet infrastructure for data transfer and governance


Internet infrastructure for data transfer and governance is a critical component in the
modern digital ecosystem. It encompasses the physical and digital resources, protocols, and
practices that enable the secure and efficient exchange of data while ensuring compliance
with relevant regulations and standards. Here's an overview of key elements in internet
infrastructure for data transfer and governance:

 Data Centres: Data centres are physical facilities where servers, storage, and
networking equipment are housed. These facilities play a crucial role in data storage,
processing, and distribution. Data centres must be strategically located, efficiently
designed, and secured to protect sensitive data.
 Network Infrastructure: This includes the hardware (routers, switches, fiber-optic
cables, etc.) and software (protocols and routing algorithms) that enable data to flow

Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 8
Module 01: Introduction to Cyber Security.

between different devices and data centres. High-speed, reliable networks are
essential for data transfer.
 Cloud Computing: Cloud platforms provide scalable and on-demand resources for
data storage and processing. They offer the flexibility needed for managing and
governing data while adhering to various compliance standards.
 Security Measures: Security is paramount for data governance. Infrastructure must
include firewalls, encryption, access controls, and intrusion detection systems to
protect data from unauthorized access, breaches, or cyberattacks.
 Data Storage: Storage solutions range from traditional on-premises servers to cloud-
based and hybrid storage options. Data storage infrastructure should support data
retention policies, redundancy, and data recovery.
 Data Encryption: Encryption technologies like SSL/TLS, IPsec, and end-to-end
encryption protect data during transmission and storage. This is critical for ensuring
data privacy and security.
 Data Governance Frameworks: Data governance is the process of managing data
quality, data policies, and data access rights. A framework should be established to
define data ownership, responsibilities, and compliance with regulations like GDPR,
HIPAA, or other industry-specific standards.
 Data Transfer Protocols: Protocols like HTTP, FTP, and various application-level
protocols are used for transferring data. Choosing the right protocol depends on the
type of data and the security requirements.
 Blockchain and Distributed Ledger Technology: These technologies can play a role
in ensuring data integrity, transparency, and traceability. They are particularly
valuable for applications involving financial transactions and sensitive records.
 Compliance and Regulatory Measures: Infrastructure should facilitate compliance
with regional and industry-specific regulations. This might include data residency
requirements, data classification, and audit trails.
 Monitoring and Auditing Tools: Systems for monitoring data traffic, logging, and
auditing are vital for ensuring that data transfer and governance are in line with
policies and standards. This includes intrusion detection systems, security information
and event management (SIEM) tools, and data loss prevention (DLP) systems.

Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 9
Module 01: Introduction to Cyber Security.

 User Authentication and Access Control: To enforce data governance, robust user
authentication and access control mechanisms should be in place. This ensures that
only authorized users can access and modify data.
 Disaster Recovery and Redundancy: Infrastructure should incorporate backup and
disaster recovery solutions to protect against data loss due to hardware failures,
natural disasters, or cyberattacks.
 Scalability and Performance: The infrastructure should be scalable to accommodate
increasing data volumes and ensure that data transfer and governance functions
smoothly as the organization grows.
 Data Catalogues and Metadata Management: These tools help organizations keep
track of their data assets, making it easier to classify, search, and manage data for
governance purposes.

Internet society
The Internet Society (ISOC) is a global nonprofit organization founded in 1992 with
the mission to promote the open development, evolution, and use of the internet for the
benefit of all people. ISOC plays a pivotal role in advocating for an open, secure, and
accessible internet and in shaping its future. Here are some key aspects of the Internet
Society:

 Advocacy for Open Internet: The Internet Society is a strong advocate for
maintaining the fundamental principles of an open internet. It works to ensure that the
internet remains a global, collaborative platform accessible to all, free from
censorship and discrimination.
 Technical Leadership: ISOC has been closely associated with the Internet
Engineering Task Force (IETF) and the Internet Architecture Board (IAB), playing a
crucial role in developing and maintaining the technical standards and protocols that
underpin the internet.
 Internet Governance: The organization is actively involved in discussions related to
internet governance, striving to ensure a multi-stakeholder approach that includes
governments, civil society, the private sector, and technical experts.
 Access and Connectivity: ISOC promotes efforts to increase internet access and
connectivity, particularly in underserved and remote areas. It supports initiatives to
bridge the digital divide and expand access to those who lack it.

Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 10
Module 01: Introduction to Cyber Security.

 Security and Trust: ISOC emphasizes the importance of online security, privacy, and
trust. It provides resources and support for individuals, organizations, and
policymakers to strengthen the security of internet infrastructure and services.
 Community Building: ISOC encourages the development of local chapters and
communities of internet enthusiasts around the world. These chapters play a crucial
role in promoting ISOC's mission on a regional and local level.
 Internet Hall of Fame: The Internet Society established the Internet Hall of Fame to
honor individuals who have made significant contributions to the development and
advancement of the internet.
 Publications and Research: ISOC produces reports, articles, and research on various
internet-related topics. These resources are made available to the public to further
understanding and knowledge of the internet.
 Collaboration and Partnerships: ISOC collaborates with other organizations,
including regional internet registries, universities, governments, and industry
stakeholders, to address various challenges and opportunities related to the internet.
 Capacity Building: The Internet Society offers educational programs, workshops,
and online courses to help individuals and organizations build their knowledge and
expertise related to internet technologies and policies.
 Support for Internet Standards: ISOC's support for the development and promotion
of open standards ensures that the internet remains interoperable and adaptable to
emerging technologies and use cases.

The Internet Society is committed to fostering an internet that remains open, globally
connected, secure, and accessible. Its work encompasses both technical and policy aspects,
with a focus on ensuring that the internet continues to serve as a force for innovation,
collaboration, and positive change around the world.

Introduction to cyber security


Cyber security is the most concerned matter as cyber threats and attacks are
overgrowing. Attackers are now using more sophisticated techniques to target the systems.
Individuals, small-scale businesses or large organization, are all being impacted. So, all these
firms whether IT or non-IT firms have understood the importance of Cyber Security and
focusing on adopting all possible measures to deal with cyber threats.

Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 11
Module 01: Introduction to Cyber Security.

What is cyber security?

"Cyber security is primarily about people, processes, and technologies working


together to encompass the full range of threat reduction, vulnerability reduction, deterrence,
international engagement, incident response, resiliency, and recovery policies and activities,
including computer network operations, information assurance, law enforcement, etc."

OR

Cyber security is the body of technologies, processes, and practices designed to


protect networks, computers, programs and data from attack, damage or unauthorized access.

 The term cyber security refers to techniques and practices designed to protect digital
Data.
 The data that is stored, transmitted or used on an information system.

OR

Cyber security is the protection of Internet-connected systems, including hardware,


software, and data from cyber-attacks. It is made up of two words one is cyber and other is
security.

 Cyber is related to the technology which contains systems, network and programs or
data.
 Whereas security related to the protection which includes systems security, network
security and application and information security.

Why is cyber security important?

Listed below are the reasons why cyber security is so important in what’s become a

predominant digital world:

 Cyber attacks can be extremely expensive for businesses to endure.


 In addition to financial damage suffered by the business, a data breach can also inflict
untold reputational damage.
 Cyber-attacks these days are becoming progressively destructive. Cybercriminals are
using more sophisticated ways to initiate cyber attacks.
 Regulations such as GDPR are forcing organizations into taking better care of the
personal data they hold.

Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 12
Module 01: Introduction to Cyber Security.

Because of the above reasons, cyber security has become an important part of the
business and the focus now is on developing appropriate response plans that minimize the
damage in the event of a cyber attack but, an organization or an individual can develop a
proper response plan only when he has a good grip on cyber security fundamentals.

Cyber security Fundamentals: (CIA Triad)

Confidentiality

 Confidentiality is about preventing the disclosure of data to unauthorized parties.


 It also means trying to keep the identity of authorized parties involved in sharing and
holding data private and anonymous.
 Protecting confidentiality is dependent on being able to define and enforce certain access
levels for information.
 In some cases, doing this involves separating information into various collections that are
organized by who needs access to the information and how sensitive that information
actually is - i.e., the amount of damage suffered if the confidentiality was breached.
 Often confidentiality is compromised by cracking poorly encrypted data, Man-in-the-
middle (MITM) attacks, disclosing sensitive data.
 Some of the most common means used to manage confidentiality include access control
lists, volume and file encryption, and Unix file permissions.
 Standard measures to establish confidentiality include:
 Data encryption
 Two-factor authentication
 Biometric verification
 Security tokens

Integrity

 Integrity refers to protecting information from being modified by unauthorized parties.


 This is an essential component of the CIA Triad and designed to protect data from deletion
or modification from any unauthorized party, and it ensures that when an authorized
person makes a change that should not have been made the damage can be reversed.
 Standard measures to guarantee integrity include:
 Cryptographic checksums
 Using file permissions
Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 13
Module 01: Introduction to Cyber Security.

 Uninterrupted power supplies


 Data backups

Availability

 Availability is making sure that authorized parties are able to access the information when
needed.
 This is the final component of the CIA Triad and refers to the actual availability of your
data. Authentication mechanisms, access channels and systems all have to work properly
for the information they protect and ensure it's available when it is needed.
 Standard measures to guarantee availability include:
 Backing up data to external drives
 Implementing firewalls
 Having backup power supplies
 Data redundancy

Understanding the CIA triad

The CIA Triad is all about information. While this is considered the core factor of the
majority of IT security, it promotes a limited view of the security that ignores other important
factors.

For example, even though availability may serve to make sure you don't lose access to
resources needed to provide information when it is needed, thinking about information
security

in itself doesn't guarantee that someone else hasn't used your hardware resources without

authorization.

It's important to understand what the CIA Triad is, how it is used to plan and also to
implement a quality security policy while understanding the various principles behind it. It's
also important to understand the limitations it presents. When you are informed, you can
utilize the CIA Triad for what it has to offer and avoid the consequences that may come along
by not understanding it

Cybersecurity Goals

Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 14
Module 01: Introduction to Cyber Security.

 Confidentiality: Ensuring that sensitive data remains private and is only accessible to
authorized users.
 Integrity: Maintaining the accuracy and reliability of data, ensuring it's not altered by
unauthorized parties.
 Availability: Ensuring that systems and data are available and accessible when
needed.
 Authentication: Verifying the identity of users and systems.
 Authorization: Determining what actions and resources users are allowed to access.
 Non-Repudiation: Preventing individuals from denying their actions or transactions.

Cybersecurity Measures

Cybercrime is constructed around the well-organized exploitation of weaknesses, and


the cyber security teams are always a hindrance because they must protect all possible
entrances while an attacker only needs to discover and exploit one weakness or vulnerability.
As described earlier, some of the common best cyber security practices for cyber security and
cyber-attack prevention measures are as follows:

 Firewalls: Hardware or software-based systems that monitor and control incoming and
outgoing network traffic to prevent unauthorized access.
 Antivirus Software: Programs designed to detect, prevent, and remove malware.
 Encryption: The process of encoding data to protect it from unauthorized access,
ensuring that even if data is intercepted, it cannot be read without the decryption key.
 Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS): Tools
that monitor network traffic for suspicious activity and can either detect or block
potential threats.
 Patch Management: Keeping software and systems up to date with the latest security
patches and updates.
 Security Awareness Training: Educating individuals and organizations about
cybersecurity best practices and the risks associated with various online activities.
 Two-Factor Authentication (2FA) and Multi-Factor Authentication (MFA): Adding
an extra layer of security by requiring more than just a password for user authentication.

Cybersecurity Best Practices

Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 15
Module 01: Introduction to Cyber Security.

Cybersecurity best practices are crucial for safeguarding personal and organizational
data from cyber threats. Here are some key practices:

 Strong Passwords: Use complex, unique passwords for each account or system.
Consider using a password manager to generate and store passwords securely.
 Multi-Factor Authentication (MFA): Enable MFA wherever possible. This adds an
extra layer of security by requiring additional verification beyond passwords.
 Regular Updates and Patching: Keep all software, operating systems, and applications
up-to-date with the latest security patches. Regularly install updates to fix vulnerabilities.
 Firewalls and Security Software: Use firewalls to control incoming and outgoing
network traffic and install reputable antivirus/anti-malware software to detect and prevent
threats.
 Data Encryption: Encrypt sensitive data, both in transit and at rest. Encryption helps
protect data if it falls into unauthorized hands.
 Awareness and Training: Educate employees or individuals about cybersecurity risks,
phishing scams, and best practices. Regular training can help prevent human error-based
security breaches.
 Backup Your Data: Regularly back up important data to an external, secure location.
This helps in case of data loss due to ransomware attacks or system failures.
 Limit Access and Permissions: Implement the principle of least privilege, granting users
access only to the data and systems necessary for their roles.
 Secure Wi-Fi Networks: Use strong encryption (WPA3) and change default passwords
on routers. Avoid connecting to public Wi-Fi for sensitive transactions.
 Incident Response Plan: Develop and practice an incident response plan to mitigate the
impact of a security breach. This includes steps to identify, contain, eradicate, and recover
from security incidents.
 Regular Security Audits: Conduct regular security audits and risk assessments to
identify vulnerabilities and address them promptly.
 Vendor Risk Management: Assess and manage the security risks posed by third-party
vendors or partners that have access to your systems or data.

Remember, cybersecurity is an ongoing process that requires continuous attention and


adaptation to evolving threats. Implementing these best practices can significantly enhance

Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 16
Module 01: Introduction to Cyber Security.

your defense against cyber threats, but it's essential to stay vigilant and proactive in
protecting your digital assets.

Cybersecurity Careers: The field of cybersecurity offers various career opportunities,


including cybersecurity analysts, ethical hackers, security engineers, incident responders, and
security consultants. Professionals in this field play a crucial role in protecting organizations
from cyber threats.

Issues and challenges of Cyber security

Cybersecurity faces a wide range of issues and challenges, many of which continue to
evolve with the changing technology landscape. Addressing these issues is essential to protect
data, systems, and infrastructure from cyber threats. Here are some of the key challenges and
issues in cybersecurity:

 Cyber Threats: Cyber threats are constantly evolving and becoming more
sophisticated. This includes malware, ransomware, phishing attacks, and advanced
persistent threats (APTs). The ability of attackers to create new attack vectors and
techniques poses a significant challenge for cybersecurity professionals.
 Insider Threats: Insider threats come from within an organization and can be
intentional or unintentional. Malicious employees or contractors can compromise
security, as can employees who inadvertently click on malicious links or share
sensitive information.
 Zero-Day Vulnerabilities: Zero-day vulnerabilities are software vulnerabilities that
are not yet known to the vendor, making them challenging to defend against.
Cybercriminals often exploit these vulnerabilities before patches are available.
 Supply Chain Vulnerabilities: The interconnected nature of the supply chain means
that cyber vulnerabilities in one company can affect others. This was evident in the
SolarWinds and Colonial Pipeline attacks, where supply chain weaknesses were
exploited.
 Internet of Things (IoT): The proliferation of IoT devices, many of which lack
robust security features, poses a significant challenge. These devices can be exploited
as entry points into networks or used in botnet attacks.
 Cloud Security: As organizations migrate data and systems to the cloud, securing
these environments becomes increasingly complex. Misconfigured cloud resources
and shared responsibility models can lead to vulnerabilities.

Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 17
Module 01: Introduction to Cyber Security.

 Mobile Device Security: The widespread use of mobile devices for work and
personal tasks increases the attack surface. Mobile malware, unsecured Wi-Fi
networks, and lost or stolen devices are ongoing concerns.
 Regulatory Compliance: Many industries and regions have specific regulations
governing data protection and cybersecurity. Staying compliant with these regulations
can be challenging, especially for organizations operating in multiple jurisdictions.
 Skill Shortage: There is a shortage of skilled cybersecurity professionals. The rapid
growth in cyber threats and the dynamic nature of the field make it difficult for
organizations to find and retain qualified talent.
 User Awareness: Human error is a significant factor in cybersecurity breaches. Users
may click on phishing emails, use weak passwords, or ignore security policies.
Raising awareness and providing training is crucial.
 National Security and Geopolitical Threats: Nation-state actors engaging in cyber-
espionage, cyber-warfare, or cybercrime can have far-reaching implications. These
actors often have substantial resources and advanced capabilities.
 Emerging Technologies: New technologies like AI, blockchain, and quantum
computing bring both opportunities and risks. AI can be used to enhance security, but
it can also be used by attackers. Quantum computing threatens traditional encryption
methods.
 Privacy Concerns: The collection and use of personal data by organizations and the
potential for data breaches raise privacy concerns. Privacy regulations like GDPR in
Europe are changing how data is handled.
 Ransomware: Ransomware attacks have become more targeted, with attackers
demanding significant sums of money. Victims, including municipalities and critical
infrastructure providers, face difficult decisions.
 Global Threat Landscape: Cyber threats know no borders, and international
cooperation is required to combat them effectively. Geopolitical tensions can affect
cybersecurity efforts and hinder cooperation.

Cybersecurity is a dynamic field that requires constant vigilance, adaptation, and


collaboration to address these challenges effectively. Organizations must adopt a holistic
approach to cybersecurity, including implementing best practices, investing in technology
solutions, and fostering a cybersecurity-aware culture.

Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 18
Module 01: Introduction to Cyber Security.

Cyberspace
Cyberspace is a conceptual domain that encompasses the digital environment created
by interconnected computer systems, networks, and the internet. It is a virtual realm where
information is stored, shared, and processed, and where digital interactions, communication,
and activities take place. Here are some key aspects of cyberspace:

 Digital Environment: Cyberspace exists entirely in the digital realm, consisting of


data, information, and digital resources. It encompasses everything from web pages
and social media platforms to online databases and cloud storage.
 Interconnected Networks: The concept of cyberspace relies on the global
interconnection of computer networks, allowing data to flow across geographical
boundaries. The internet serves as the primary infrastructure for cyberspace.
 Communication: Cyberspace facilitates communication through various means,
including email, instant messaging, social media, and video conferencing. It
transcends physical limitations, enabling real-time interactions regardless of distance.
 Information Exchange: Information is shared and disseminated in cyberspace. This
includes news, research, entertainment, and a vast array of digital content that users
can access and distribute.
 E-commerce and Online Transactions: Cyberspace is a hub for e-commerce and
online financial transactions. It enables individuals and businesses to buy and sell
goods and services, manage finances, and conduct electronic banking securely.
 Cybersecurity: The digital nature of cyberspace makes it susceptible to various cyber
threats, such as malware, hacking, phishing, and data breaches. Cybersecurity
measures are crucial to protect the integrity, confidentiality, and availability of data
within cyberspace.
 Online Communities and Social Networks: People form online communities,
engage in social networking, and share information and experiences. Social media
platforms, forums, and virtual communities are integral parts of cyberspace.
 Data Storage and Cloud Computing: Cyberspace includes vast data storage and
cloud computing services, enabling organizations and individuals to store, process,
and access data and applications remotely.

Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 19
Module 01: Introduction to Cyber Security.

 Digital Content: The digital content in cyberspace ranges from text, images, and
videos to software, music, and games. It is available for consumption and interaction
through websites, apps, and streaming services.
 Virtual Reality and Augmented Reality: Emerging technologies like virtual reality
(VR) and augmented reality (AR) are expanding the possibilities of cyberspace by
creating immersive digital experiences and overlays on the physical world.
 Privacy and Security Concerns: The open and interconnected nature of cyberspace
raises issues related to online privacy, data security, and the protection of personal
information. These concerns have led to the development of various regulations and
privacy practices.
 Cyber Warfare and Espionage: Cyberspace has become an arena for nation-states
and threat actors to engage in cyber warfare, espionage, and information operations.
These activities have far-reaching implications for national security.

Cyberspace has transformed how people interact, work, learn, and entertain
themselves. It is a dynamic environment that continues to evolve, driven by technological
advancements and societal changes. As it evolves, the challenges of maintaining security,
privacy, and ethical use in cyberspace remain central concerns for governments,
organizations, and individuals.

Architecture of Cyberspace
The "architecture" of cyberspace, in the context of the internet and digital networks,
refers to the underlying structure, protocols, and components that make up the virtual
environment where digital data and communication take place. It encompasses a wide range
of technologies, standards, and systems that enable the functioning of the internet and digital
networks. Here are some key elements of the architecture of cyberspace:

1. Network Infrastructure
 Internet Backbone: The internet backbone consists of high-capacity, long-distance
communication links that connect major data centres and network hubs. These links
form the core of the global internet infrastructure.
 Network Protocols: The internet relies on a set of communication protocols,
primarily the Internet Protocol (IP) suite. These protocols govern data packet routing,
addressing, and data transfer.

Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 20
Module 01: Introduction to Cyber Security.

 Internet Service Providers (ISPs): ISPs are organizations that provide access to the
internet for individuals and businesses. They connect end-users to the global internet
by providing data transmission services.
 Domain Name System (DNS): The DNS is a distributed system that translates
human-readable domain names (e.g., www.example.com) into IP addresses that
computers use to locate web servers and other network resources.
 Web Servers and Clients: Web servers host websites, applications, and online
services. Web clients, typically web browsers, are used by individuals to request and
display web content.
 Data Centres: Data centres are facilities that house servers and storage systems,
providing computing resources and hosting data and applications. Cloud providers
operate extensive data centre networks.
 Content Delivery Networks (CDNs): CDNs improve web performance by caching
and distributing web content to edge servers located closer to end-users. This reduces
latency and enhances load times.
 Internet Exchange Points (IXPs): IXPs are physical locations where different ISPs
connect their networks to exchange traffic. They facilitate efficient routing and reduce
data transfer costs.
2. Routing and Switching Infrastructure

Routers and switches direct data traffic within networks. They make routing decisions to
determine the most efficient path for data packets to reach their destination.

 Security Measures: Firewalls, intrusion detection and prevention systems (IDPS),


and encryption technologies are essential components to protect networks, systems,
and data from cyber threats.
 Protocols and Standards: A wide range of internet protocols and standards, such as
HTTP, FTP, SMTP, and SSL/TLS, facilitate communication, data transfer, and
security on the web.
 Cybersecurity Systems: Security systems, including antivirus software, intrusion
detection systems, and access control mechanisms, safeguard networks and data
against cyber threats.

Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 21
Module 01: Introduction to Cyber Security.

 Peering and Transit Agreements: ISPs enter into peering and transit agreements to
exchange traffic and ensure connectivity. These agreements help route data between
different networks.
 Wireless and Mobile Technologies: Wi-Fi, 4G, 5G, and other wireless technologies
provide mobile and remote access to the internet, expanding connectivity beyond
wired networks.
 Network Management and Monitoring Tools: Tools for network administrators to
manage and monitor network performance, detect issues, and ensure network
availability.
 IPv4 and IPv6: Internet Protocol versions 4 (IPv4) and 6 (IPv6) govern IP
addressing. IPv6 was introduced to address the depletion of available IPv4 addresses.
 Edge Computing and IoT Devices: Edge computing involves processing data closer
to the source of data generation. IoT (Internet of Things) devices connect to the
internet and generate data at the edge of networks.
 Blockchain Technology: Blockchain technology is used to create decentralized and
secure distributed ledgers, which have applications in areas like cryptocurrency and
supply chain management.

The architecture of cyberspace is dynamic and constantly evolving to meet the


demands of an increasingly interconnected and digital world. Advancements in technology,
new standards, and emerging technologies continue to shape the architecture of cyberspace,
ensuring the internet remains a powerful and versatile platform for communication,
information sharing, and online services.

Regulation of Cyberspace

The regulation of cyberspace refers to the legal and policy framework that governs
activities in the digital realm, including the internet and other computer networks. Regulation
is necessary to ensure that cyberspace remains secure, protects the rights of individuals and
organizations, and operates in a manner consistent with the law. In India, several regulations
and laws govern cyberspace, aiming to address various aspects of cybersecurity, data
protection, digital rights, and online conduct. Here are some key regulations related to
cyberspace in India:

 Information Technology Act, 2000 (IT Act): The IT Act is the primary legislation
governing cyber activities and electronic commerce in India. It defines cybercrimes, lays

Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 22
Module 01: Introduction to Cyber Security.

down penalties for offenses like hacking, data theft, cyber fraud, and sets legal provisions
for electronic signatures and records.
 The Information Technology (Reasonable Security Practices and Procedures and
Sensitive Personal Data or Information) Rules, 2011: These rules under the IT Act
provide guidelines and regulations for the collection, handling, and protection of sensitive
personal data or information by Indian companies.
 The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and
Services) Act, 2016: This Act established the legal framework for the Aadhaar system,
which assigns a unique identification number to Indian residents. It addresses the
collection and storage of biometric and demographic data and aims to ensure data
protection and privacy.
 The Reserve Bank of India (RBI) Guidelines: The RBI issues various guidelines and
regulations related to cybersecurity for banks and financial institutions. These guidelines
focus on securing banking operations and customer data against cyber threats.
 The Personal Data Protection Bill, 2019 (PDP Bill): Though not enacted as of my last
update in January 2022, the PDP Bill aims to regulate the processing and transfer of
personal data in India. It focuses on protecting the privacy and rights of individuals
regarding their personal data.
 The Cyber Security Strategy of India: The Indian government has developed a
comprehensive cybersecurity strategy to enhance the country's cybersecurity posture,
combat cyber threats, and strengthen cybersecurity measures across sectors.
 Computer Emergency Response Team-India (CERT-In): CERT-In is the national
nodal agency in India that handles cybersecurity incidents, alerts, and provides guidelines
to mitigate cyber threats.

These regulations and agencies collectively aim to address cybersecurity challenges,


protect sensitive data, promote safe online practices, and ensure a secure digital environment
in India. It's essential for individuals and organizations operating in India's cyberspace to
adhere to these regulations to safeguard against cyber threats and comply with legal
requirements.

Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 23
Module 01: Introduction to Cyber Security.

Ms. Asma, Assistant professor, Dept. of Computer Science, PESIAMS, Shimoga Page 24

You might also like