Introduction to Cyber
Security
November 15, 2022 ~ Dhananjay Ramse
Introduction : The internet has made the world smaller in
many ways but it has also opened us up to
Cyber security are techniques generally set influences that have never before been so
forth in published materials that attempt to varied and so challenging. As fast as security
safeguard the cyber environment of a user or grew, the hacking world grew faster. There are
organization. It manages the set of techniques two ways of looking at the issue of cyber
used to save the integrity of networks, security. One is that the companies that provide
programs and data from unauthorized access. cloud computing do that and only that so these
It refers to the body of technologies, processes, companies will be extremely well secured with
and it may also be referred to as information the latest in cutting edge encryption
technology security. The field is of growing technology.
importance due to increasing reliance on
computer systems, including smart phones,
televisions and the various tiny devices that
constitute the Internet of Things.
Keywords : attacks on networks, computer systems and
telecommunication infrastructures.
2. Cyber warfare: It involves nation-states using
IT security, Internet of things (IOT) information technology to go through
something another nation’s networks to cause
damage. In the U.S. and many other people live
in a society, cyber warfare has been
acknowledged as the fifth domain of warfare.
WHAT IS CYBER SECURITY ? Cyber warfare attacks are primarily executed by
hackers who are well-trained in use of benefit
Cyber security is the application of the quality of details computer networks, and
technologies, processes, and controls to operate under the favorable and support of
protect systems, networks, programs, devices nation-states. Rather than closing a target’s key
and data from cyber attacks. networks, a cyber-warfare attack may forced to
put into a situation into networks to
It aims to reduce the risk of cyber attacks and compromise valuable data, degrade
protect against the unauthorized exploitation communications, impair such infrastructural
services as transportation and medical
of systems, networks, and technologies.
services, or interrupt commerce.
3. Cyber espionage: It is the practice of using
information technology to obtain secret
WHY DO WE NEED CYBER information without permission from its
owners or holders. It is the most often used to
SECURITY ? gain strategic, economic, military advantage,
The range of operations of cyber security and is conducted using cracking techniques
involves protecting information and systems and malware.
from major cyber threats. These threats take
many forms. As a result, keeping pace with
cyber security strategy and operations can be a
Who are Cyber Criminals ?
challenge, particularly in government and
enterprise networks where, in their most It involves such activities as child printed sexual
innovative form, cyber threats often take aim at organs or activity; credit card fraud; cyber
secret, political and military assets of a nation, stalking; defaming another online; gaining
or its people. Some of the common threats are : unauthorized access to computer systems;
ignoring copyright, software licensing and
1. Cyber terrorism: It is the innovative use of
trademark safe to protect; overriding
information technology by terrorist groups to
encryption to make illegal copies; software
further their political agenda. It took the form of
piracy and stealing another’s identity to How To Maintain Effective
perform criminal acts. Cybercriminals are those
who conduct such acts. They can be Cyber Security ?
categorized into three groups that reflect their
Historically, organizations and governments
motivation.
have taken a reactive, “point product”
Type 1: Cybercriminals – hungry for approach to combating cyber threats, produce
recognition: something together individual security
technologies – one on top of another to safe
✓ Hobby hackers; their networks and the valuable data within
them. Not only is this method expensive and
✓ IT professionals (social engineering is one of
complex, but news of damaging cyber breaches
the biggest threat);
continues to dominate headlines, rendering
✓ Politically motivated hackers; this method ineffective. In fact, given the area
of group of people of data breaches, the topic
✓ Terrorist organizations. of cyber security has launched to the top of the
priority list for boards of directors, which they
Type 2: Cybercriminals – not interested in
seeking as far as less risky way. Instead,
recognition:
organizations can consider a natively
✓ Psychological prevents; integrated, automated Next-Generation
Security Platform that is specifically designed
✓ Financially motivated hackers (corporate to provide consistent, prevention-based
espionage); protection – on the endpoint, in the data center,
✓ State – sponsored hacking (national on the network, in public and private clouds,
espionage, sabotage); and across Saabs environments. By focusing on
prevention, organizations can prevent cyber
✓ Organized criminals. threats from impacting the network in the first
place, and less overall cyber security risk to a
Type 3: Cybercriminals – the insiders:
manageable degree.
✓ former employees seeking revenge;
✓ Competing companies using employees to
gain economic advantage through damage
and/or theft.
What Cyber Security Can 4. Phishing is a form of fraud where fraudulent
emails are sent that resemble emails from
Prevent ? reputable sources; however, the intention of
these emails is to steal sensitive data, such as
The use of cyber security can help prevent
credit card or login information.
cyber-attacks, data breaches and identity theft
and can aid in risk management.
When an organization has a strong sense of
What does a security analyst
network security and an effective incident
response plan, it is better able to prevent and do ?
serious of these attacks. For example, end user
An information security analysts protects to
protection defends information and guards
against loss or theft while also scanning safe the company’s systems and networks by
computers for malicious code. planning and carrying out measures of security.
They create disruptive solutions to prevent
critical information from being stolen,
damaged, or compromised. Their primary
Types of Cyber Security responsibility is to keep a business or
organizations data, clients, employees, and any
Threats :
virtual stored information safe from cyber
The use of keeping up with new technologies, attacks or hacking of any sort.
security trends and threat intelligence is a
challenging their task. However, it should be in What are the consequences of
order to protect information and other assets cyber attack ?
from cyber threats, which take many forms.
Cyber-attacks will cause more damage
1. Ransom ware is a type of malware that
financially and reputational even to the most
involves an attacker locking the victim's withstand organization. The organization
computer system files typically through which suffers cyber-attack, have to face the
encryption and demanding a payment to losing assets, business reputation and
decrypt and unlock them.
potentially the organization have to face
2. Malware is any file or program used to harm regulatory fines and taking legal action and the
a computer user, such as worms, computer costs of remediation. A survey taken by UK
viruses, Trojan horses and spyware. government about cyber security in 2017,
found that the average cost for a large business
3. Social engineering is an attack that relies on is £19,600 and for a small to medium-sized
human interaction to trick users into breaking business is £1,570.
security procedures in order to gain sensitive
information that is typically protected.
HACKING TOOLS : usually done by stating an urgent need for
action (which they should take) and describing
There are various tools are the modes of attack. the overall threat as big and rising. Second,
And the malware are used for the totality of psychological research has shown that risk
these tools. Examples are viruses and worms. perception is highly dependent on intuition and
Computer programs that reproduce the emotions, as well as the perceptions of experts
functional copies of themselves with varying (Gregory and Mendelsohn 1993). Cyber-risks,
effects ranging from emphasize and especially in their more extreme form, fit the
inconvenience to compromise of the risk profile of so-called „dread risks‟, which
confidentiality or integrity of information, and appear uncontrollable, catastrophic, fatal, and
Trojan horses, destructive programs that unknown. There is an inclination to be afraid of
pretense as benign applications but set up a low probability risks, which translates into
back door so that the hacker can return later pressure for serving an action with all sorts of
and enter the system. Often system intrusion is willingness to bear high costs of uncertain
the main goal of system intrusion is more benefit. Only the system attacks sufficiently
advanced attacks. If the intruder gains full destructive or disruptive need the attention of
system control, or „root‟ access, he has the traditional national security apparatus.
unrestricted access to the inner workings of the Attacks that interrupt the services or that cost
system. Due to the characteristics of digitally mainly a nuisance to the computer.
stored information the person with criminal
intent will delay, disrupt, corrupt, exploit,
destroy, steal, and modify information. The
value of the information or the importance of
REDUCING CYBER – IN –
the application will be depended, which the SECURITY :
information are required and that such actions
will have different effect with varying degrees of The three different debates have been taken
gravity. over the many concepts and counter measures
have been produced with their focus. The
computer network which owns a entities have a
common practice to take a responsible for
THE LEVEL OF CYBER RISK : protecting it.
However, there are some assets considered so
There are some additional reasons for that
crucial in the private sector to the functioning
threat is overrated. First, as combating cyber-
of society and governments have to take
threats has become a highly politicized issue,
additional measures to ensure the level of
official statements about the level of threat
protection. These efforts are usually included
must also be seen in the context of different
under the label of critical (information).
bureaucratic entities that compete against
Information assurance is guide for the
each other for resources and influence. This is
infrastructure protection and to the
management of risk, which is essentially about
accepting that one is (or remains) insecure: the
level of risk can never be reduced to zero. This
means that minor and probably also major
cyber-incidents are bound to happen because
they simply cannot be avoided even with
perfect risk management.
CONCLUSION :
Depending on their (potential) severity,
however, disruptive incidents in the future will
continue to fuel the military discourse, and with
it fears of strategic cyber-war. Certainly,
thinking about (and planning for) worst-case
scenarios is a legitimate task of the national
security apparatus. However, for the favor of
more plausible and more likely problems they
should not to get more attention Therefore,
there is no way to study the „actual‟ level of
cyber-risk in any sound way because it only
exists in and through the representations of
various actors in the political domain.
REFERENCES :
1. www.google.com
2. https://www.researchgate.net/publica
tion/329678338