Towards Safe and Secure Cyberspace
Towards Safe and Secure Cyberspace
Cyberspace
Ramjas college
Submitted to : Mr. Harsh Jaiswal
Submitted by : Shipla Gautam
Learning Objectives
● Online security and privacy
● Threats in the digital world: Data breach and
Cyber Attacks
● Block chain Technology
● Security Initiatives by the Govt of India
Index
1.Online security and privacy 1
password management 2
phishing attack 3
social media privacy 4
Protections:
Privacy settings: Most social media platforms offer privacy settings that
allow users to control who can see their content.
Data protection laws: Federal and state laws, such as the
Communications Decency Act (CDA) and the California Consumer
Privacy Act (CCPA), regulate data collection and use.
5
THREATS IN DIGITAL WORLD: DATA BREACH AND CYBER ATTACK
The digital world is increasingly vulnerable to various cyber threats, posing significant risks to
individuals, organizations, and governments
Data breach
A data breach, also known as data leakage, is "the unauthorized exposure, disclosure, or loss
of personal information"
Attackers have a variety of motives, from financial gain to political activism, political
repression, and espionage. There are several technical root causes of data breaches, including
accidental or intentional disclosure of information by insiders, loss or theft
of unencrypted devices, hacking into a system by exploiting software vulnerabilities, and social
engineering attacks such as phishing where insiders are tricked into disclosing information.
Although prevention efforts by the company holding the data can reduce the risk of data
breach, it cannot bring it to zero.
Key Characteristics:
Distributed Ledger: A block chain is a decentralized network of files chained together using
algorithms that create unique identifiers (hashes) for each block.
Immutable: Once a block is added to the chain, its contents cannot be altered or deleted
without consensus from the network.
Block chain technology has evolved to accommodate various needs and scenarios, giving rise to
different types of block chains. Here’s a breakdown of the four primary categories:
1. Public Block chain
Open networks accessible to anyone
Decentralized environment where participants can validate transactions and create new blocks
2. Private Block chain
Restricted to specific participants or organizations
Centralized control, with a single entity managing the network
8
3. Consortium Block chain
A combination of public and private block chain features
Limited to a group of organizations or entities, with shared control
The Government of India has launched several initiatives to enhance cyber security and protect
its citizens, organizations, and critical infrastructure from cyber threats. Some notable initiatives
include:
Objectives
Resilient Infrastructure: To ensure the security and integrity of critical information
infrastructure, including government, financial, and healthcare systems.
Individuals’ Rights: To protect personal information, financial and banking information, and
sovereign data of the country.
Features
Promotion of research and development in cyber security
Human Resource Development (HRD) to build capacity and foster education and training
programs
Creation of a secure cyber ecosystem through conformity assessment and assurance
frameworks
10
National cyber coordination center
Types of Malware
Based on the provided search results, here is a comprehensive list of malware types:
1. Computer Viruses: Self-replicating malware that attaches to other programs and
spreads by copying itself to other areas of the system.
2. Worms: Malware that replicates itself and spreads to other computers without the
need for human interaction, often through network vulnerabilities.
3. Trojan Horses: Malware disguised as legitimate software, allowing attackers to gain
unauthorized access to a system.
4. Ransom ware: Malware that encrypts files and demands payment in exchange for
the decryption key.
5. Spyware: Malware designed to monitor and collect user data, often without their
knowledge or consent.
Threat intelligence 13
Threat intelligence refers to the knowledge and insights gained from analyzing and processing
threat data to understand existing or potential threats. It is a critical component of an
organization’s cybersecurity strategy, enabling proactive defense against cyber attacks.
Static Analysis
Examines malware code without executing it
Involves analyzing the binary file, metadata, strings, resources, and code structure
Uses tools like hex editors, disassemblers, debuggers, and decompiles
Advantages : Faster and more efficient
Safer, as it doesn’t expose the analyst or system to risk of infection or damage
Limitations : More difficult and time-consuming to analyze
Prone to errors and false positives
Dynamic Analysis
Executes the malware in a simulated or isolated environment
Monitors the malware’s behavior and effects
Uses tools like virtual machines, sandboxes, emulators, debuggers, and network analyzers
Advantages : Easier and more intuitive to analyze
More accurate and precise, as it observes actual behavior and effects
Limitations : Slower and more resource-intensive
Riskier and more destructive, as it may infect or damage the system or network
15
Learning outcomes