0% found this document useful (0 votes)
36 views20 pages

Towards Safe and Secure Cyberspace

The document discusses online security and privacy, highlighting the importance of password management, the risks of phishing attacks, and social media privacy. It also covers threats in the digital world, including data breaches and cyber attacks, and introduces blockchain technology and government initiatives in India to enhance cybersecurity. Additionally, it explores malware analysis and threat intelligence as essential components of a comprehensive cybersecurity strategy.

Uploaded by

sanyam gautam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views20 pages

Towards Safe and Secure Cyberspace

The document discusses online security and privacy, highlighting the importance of password management, the risks of phishing attacks, and social media privacy. It also covers threats in the digital world, including data breaches and cyber attacks, and introduces blockchain technology and government initiatives in India to enhance cybersecurity. Additionally, it explores malware analysis and threat intelligence as essential components of a comprehensive cybersecurity strategy.

Uploaded by

sanyam gautam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

Towards Safe and Secure

Cyberspace

Ramjas college
Submitted to : Mr. Harsh Jaiswal
Submitted by : Shipla Gautam
Learning Objectives
● Online security and privacy
● Threats in the digital world: Data breach and
Cyber Attacks
● Block chain Technology
● Security Initiatives by the Govt of India
Index
1.Online security and privacy 1
password management 2
phishing attack 3
social media privacy 4

2.threats in digital world: data breach and cyber attack 5


What is data breach? 5
Types of data breach 5
cyber attack and its types 6

3.Block chain technology


What is block chain tech? 7
types of block chain 7-8
4.Security initiative by government of India 9
national cyber security policy 9
national cyber coordination center 10
international collaboration 11

5.Malware and threat analysis 12


Types of Malware 12
Threat intelligence 13
Malware analysis Technique 14
1

ONLINE SECURITY AND PRIVACY

Online security and privacy are interconnected and


crucial for protecting personal and financial data,
communications, and preferences while connected to
the Internet
Password management 2

Password management is the practice of securely storing, accessing, managing,


and protecting passwords to enhance security and privacy across various online
accounts and services. With the increasing number of online services and accounts,
password management has become a crucial aspect of digital security

Key Features of Password Managers

1.Password Storage: Securely storing passwords in an encrypted vault,


accessible only with a master password or biometric authentication.
2.Auto fill: Automatically filling in login credentials for websites and
applications, eliminating the need to remember multiple passwords.
3.Password Generation: Generating strong, unique passwords for each
account, reducing the risk of password reuse and compromise.
4.Password Sharing: Securely sharing passwords with others, such as family
members or colleagues, while maintaining control over access.
5.Two-Factor Authentication: Supporting two-factor authentication (2FA) and
multi-factor authentication (MFA) for added security
3
Phishing attack
A phishing attack is a type of social engineering attack where
an attacker, masquerading as a trusted entity, attempts to
trick individuals into revealing sensitive information or login
credentials. This is often done through email spam, instant
messages, or text messages.

Types of Phishing Attacks

Bulk attacks: Unsolicited emails sent to a wide audience, often with


generic messages and links
Targeted attacks: Customized emails sent to specific individuals or
organizations, attempting to exploit their trust or familiarity with the
sender
4
Social media privacy
Social media platforms collect and store vast amounts of personal data,
including sensitive information such as location, contacts, and online
activities. This data can be vulnerable to privacy violations, breaches,
and misuse. Here are some key aspects of social media privacy:
Risks:
Data breaches: Social media companies may fail to protect user data,
leading to unauthorized access and exposure.
Unintended sharing: Private posts or information can be shared publicly
without users’ consent.

Protections:
Privacy settings: Most social media platforms offer privacy settings that
allow users to control who can see their content.
Data protection laws: Federal and state laws, such as the
Communications Decency Act (CDA) and the California Consumer
Privacy Act (CCPA), regulate data collection and use.
5
THREATS IN DIGITAL WORLD: DATA BREACH AND CYBER ATTACK

The digital world is increasingly vulnerable to various cyber threats, posing significant risks to
individuals, organizations, and governments

Data breach
A data breach, also known as data leakage, is "the unauthorized exposure, disclosure, or loss
of personal information"
Attackers have a variety of motives, from financial gain to political activism, political
repression, and espionage. There are several technical root causes of data breaches, including
accidental or intentional disclosure of information by insiders, loss or theft
of unencrypted devices, hacking into a system by exploiting software vulnerabilities, and social
engineering attacks such as phishing where insiders are tricked into disclosing information.
Although prevention efforts by the company holding the data can reduce the risk of data
breach, it cannot bring it to zero.

Types of data breach


Hacking or cyber attack: External parties use technical means to gain access to data and
systems. This can include phishing, malware, ransom ware, skimming, or other exploits.
Insider threat: A current or former employee or contractor misuses their legitimate access to
data systems. This can be for financial gain, revenge, or unintentional actions.
Human error: Mistakes made by employees or contractors, such as misconfigurations or
sending information to the wrong recipient
6
Cyber attack

A cyber attack is a malicious attempt to access or damage a computer or network


system. These attacks can lead to significant financial losses, theft of personal,
financial, and medical information, and damage to an organization’s reputation and
safety.

Types of Cyber Attacks


Cyber attacks can take various forms, including:
Malware attacks: Malicious software is used to compromise system security and steal
sensitive data.
Social engineering scams: Threat actors use psychological manipulation to trick
individuals into divulging sensitive information or performing certain actions.
Password theft: Hackers steal login credentials to gain unauthorized access to systems.
7
BLOCK CHAIN TECHNOLOGY
Block chain technology is an advanced database mechanism that enables transparent
information sharing within a business network. It stores data in blocks that are linked together
in a chain, ensuring chronological consistency. Any attempt to delete or modify the chain
requires consensus from the network, ensuring data integrity.

Key Characteristics:
Distributed Ledger: A block chain is a decentralized network of files chained together using
algorithms that create unique identifiers (hashes) for each block.
Immutable: Once a block is added to the chain, its contents cannot be altered or deleted
without consensus from the network.

Block chain technology has evolved to accommodate various needs and scenarios, giving rise to
different types of block chains. Here’s a breakdown of the four primary categories:
1. Public Block chain
Open networks accessible to anyone
Decentralized environment where participants can validate transactions and create new blocks
2. Private Block chain
Restricted to specific participants or organizations
Centralized control, with a single entity managing the network
8
3. Consortium Block chain
A combination of public and private block chain features
Limited to a group of organizations or entities, with shared control

4. Hybrid Block chain


Combines elements of public and private block chains
May offer varying levels of access and control

Understanding these types of block chain technology is essential for


selecting the right solution for specific needs, whether it’s for crypto
currency, enterprise applications, or industry-specific use cases
9
SECURITY INITIATIVE BY GOVERNMENT OF INDIA

The Government of India has launched several initiatives to enhance cyber security and protect
its citizens, organizations, and critical infrastructure from cyber threats. Some notable initiatives
include:

National cyber security policy


The National Cyber Security Policy (NCSP) is a comprehensive framework aimed at creating a
secure cyber ecosystem in India, generating adequate trust and confidence in Information
Technology (IT). The policy was first drafted in 2013 and has undergone revisions since then.

Objectives
Resilient Infrastructure: To ensure the security and integrity of critical information
infrastructure, including government, financial, and healthcare systems.
Individuals’ Rights: To protect personal information, financial and banking information, and
sovereign data of the country.

Features
Promotion of research and development in cyber security
Human Resource Development (HRD) to build capacity and foster education and training
programs
Creation of a secure cyber ecosystem through conformity assessment and assurance
frameworks
10
National cyber coordination center

National Cyber Coordination Centers (NCCCs) are government-established entities responsible


for coordinating cybersecurity efforts, promoting research and innovation, and enhancing
national cybersecurity capacities. These centers aim to improve the overall cyber security
posture of a country by fostering cooperation between public and private sectors, academia, and
research institutions.
Key Features:
Coordination: NCCCs serve as a central hub for coordinating cyber security-related activities,
initiatives, and policies across government agencies, industries, and academia.
Research and Innovation: They promote and support cybersecurity research, development, and
innovation, enabling the development of new technologies and solutions.

Examples of National Cyber Coordination Centers:


India: The National Cyber Coordination Centre (NCCC) is an operational cybersecurity and e-
surveillance agency responsible for screening communication metadata and coordinating
intelligence gathering activities.
Belgium: The National Cybersecurity Coordination Centre Belgium is part of the European
management framework, aiming to improve cooperation at the national and regional levels,
seize new investment opportunities, and strengthen the cyber ecosystem.
11
International collaboration

International cooperation is crucial in addressing the global cybersecurity threat landscape.


Various initiatives and agreements have been established to promote collaboration, information
sharing, and joint efforts among nations. Here are some notable examples:
Convention on Cybercrime (2001): The Council of Europe’s Convention on Cybercrime provides
a legal framework for international cooperation in combating cybercrime, including mutual legal
assistance and extradition.
Global Cybersecurity Agenda (GCA): The International Telecommunication Union (ITU) launched
the GCA in 2004, aiming to enhance confidence and security in the information society through
international cooperation.
International Cyber Engagement Strategy (ICES): Australia’s ICES (2016) promotes public-private
collaboration and cooperation with other countries, including partnerships with the ITU, ENISA,
OSCE, and NATO.
EU’s Cybersecurity Strategy: The European Union’s Cybersecurity Strategy (2013) prioritizes
international cooperation, including the development of common norms and standards, and the
establishment of a European Cybercrime Centre.
NATO’s Cyber Defense : NATO’s Cyber Defense initiative (2016) focuses on developing
capabilities for cyber defense , including information sharing and cooperation among member
states.
12
MALWARE AND THREAT ANALYSIS
Malware analysis is the process of understanding the behavior, purpose,
and potential impact of malicious software (malware). It involves
analyzing the code, structure, and functionality

Threat analysis is a broader concept that encompasses malware


analysis, focusing on the entire threat lifecycle

Types of Malware
Based on the provided search results, here is a comprehensive list of malware types:
1. Computer Viruses: Self-replicating malware that attaches to other programs and
spreads by copying itself to other areas of the system.
2. Worms: Malware that replicates itself and spreads to other computers without the
need for human interaction, often through network vulnerabilities.
3. Trojan Horses: Malware disguised as legitimate software, allowing attackers to gain
unauthorized access to a system.
4. Ransom ware: Malware that encrypts files and demands payment in exchange for
the decryption key.
5. Spyware: Malware designed to monitor and collect user data, often without their
knowledge or consent.
Threat intelligence 13

Threat intelligence refers to the knowledge and insights gained from analyzing and processing
threat data to understand existing or potential threats. It is a critical component of an
organization’s cybersecurity strategy, enabling proactive defense against cyber attacks.

Types of Threat Intelligence

Strategic Intelligence: Long-term, high-level insights into threat actors, tactics,


techniques, and procedures (TTPs), and their motivations.
Operational Intelligence: Real-time, detailed information on specific threats, including
indicators of compromise (IoCs), malware, and vulnerabilities.
Tactical Intelligence: Immediate, actionable information on ongoing attacks, including
threat actor identities, TTPs, and potential targets.

Benefits of Threat Intelligence


Improved Detection: Enhanced ability to identify and detect threats, reducing the
time to detect (TTD) and time to respond (TTR).
Increased Efficiency: Automation of threat analysis and response, freeing up security
teams to focus on high-priority tasks.
Malware Analysis Technique 14

Malware analysis involves examining malicious software to understand its behavior,


functionality, and potential impact on systems. There are two primary types of malware analysis
techniques: Static Analysis and Dynamic Analysis.

Static Analysis
Examines malware code without executing it
Involves analyzing the binary file, metadata, strings, resources, and code structure
Uses tools like hex editors, disassemblers, debuggers, and decompiles
Advantages : Faster and more efficient
Safer, as it doesn’t expose the analyst or system to risk of infection or damage
Limitations : More difficult and time-consuming to analyze
Prone to errors and false positives

Dynamic Analysis
Executes the malware in a simulated or isolated environment
Monitors the malware’s behavior and effects
Uses tools like virtual machines, sandboxes, emulators, debuggers, and network analyzers
Advantages : Easier and more intuitive to analyze
More accurate and precise, as it observes actual behavior and effects
Limitations : Slower and more resource-intensive
Riskier and more destructive, as it may infect or damage the system or network
15
Learning outcomes

• Understanding cyber threats


• Privacy awareness
• Technology proficiency
• Critical thinking
• Incident response of breaches
References

Google cyber security training


Cybersecurity and infrastructure security agency
Brave

You might also like