Week-1-Intro-Introduction To Cyber Security200611040406063737
Week-1-Intro-Introduction To Cyber Security200611040406063737
.com 9486772744
We are all living in the digital era. All our daily activities either partially or
totally depend on digital devices or Internet. Every Organization whether it is
government or non- government and individuals rely on the usage of
computer networks, systems and related technologies. Most of our daily
routines, including both personal and professional activities, depend on
digital devices connected through public and private networks and the
Internet.
Where do we operate, and which connects us? These are the major questions
that most of us raise when we think about the way we use Internet and other
resources for communication. The answer is: Cyber Space. Cyber Space is
the virtual space that connects all of us and enables the information
exchange, necessary to support interactions in the digital era. More
Definition
The term cyberspace is derived from the word cybernetics which in turn is
extracted from ancient Greek word kubernētēs, that refers to steersman or to
give direction. Recent years have seen a wide proliferation of context-
dependent suffixes applied to cyber.
The term cyberspace first came into existence in various contexts in visual
arts and science fiction during 1940, 1960 and 1984. However, the first
reference was made by the founder of Electronic Frontier Foundation, in the
year 1990 and later in 1991 by Mr. Benedict, which is close to the existing
relationship of computer and telecommunication systems.
Core Cyberspace
Extended Cyberspace
Networks
Intermediaries
Network of Networks
Logical Layer
Physical Layer
The factors that influence, or the driving forces of Cyberspace are time, space,
anonymity, asymmetry and efficiency. Figure 1.5 shows the driving forces, the
key factors.
Efficiency
Time Space
The key
Vital and Interlinked efficiency
irreplaceab with time element
erspace inis
le into a simultaneou
cyb s
Action, complex actions in differ
preparation, tapestry dimensionalities
realization takes The Initiation are
time of Cyber- performed by the
In cyberspace, attack is operators
Asymmetry Anonymity
Opponent's weak Cyberspace and
point exploitation its operations are
by claiming to be identified
competitive
advantage in the Difficulty to
most optimal way detonate the
location of the
Asymmetrical operator with
warfare their identity
opportunities are
It makes use of the TCP/IP protocol suite for data transmission and exchange
(Source: Webster Online Dictionary)
Definition 2
Definition 3
Definition 1
Definition 2
CYBER SECURITY Week-1 E-Text
Cyber Security is a technology framework that consists of various
procedures and operations intended to defend networks, computers,
programs and data from outbreak, damage or illegal access.
Definition 3
Definition 4
With the understanding based on the discussions made so far, the Common
tools used for cyber security may be listed as:
Passwords
Anti-virus/Anti-malware Software
Software patches
Firewalls
Two-factor Authentication
Encryption
CYBER SECURITY Week-1 E-Text
Figure 1.6 shows the common tools used
Passwords
Anti-Virus/ Anti-Malware
Software
Software Patches
Common
Firewalls
tools used to
prevent Authentication
Data
Encryption
Leakage
The most essential and viable solution is end user education. Most of the
security incidents happen only because of lack of knowledge on the handling
side of the users. Many incidents happen without realizing the significance of
certain activities.
Of all the above, end-user education is very important for an organization to
avoid unnecessary incidents against security.
Why Cyber Security is a challenge in Today’s Digital era?
Dependence on technology is more and the dependency has made it more
vulnerable to compromise. Cyber Security problems are identified in
technologies provoking cyber- attacks easier and more dangerous. The main
problem addressed are being ignorant about the role of cyber security and
the complex situations imbibing various past and current technologies.
What are the cyber security questions?
The questions to be addressed on securing the operations in cyberspace are
i. From what to protect?
ii. What to protect?
iii. How to protect?
The main focus is on the first question. The main concern on this aspect is on
Deciding on what or from what, to mainly protect, and how to operate
strongly during system failures.
Addressing the second question is on the possible threats and the threats are
analysed for further detection in future.
The third question addresses the object’s security assurance from
threatening factors through measures and procedures of implementation.
Cyber security has a significant importance in the current world of digital
technologies as most people make use of Internet for their daily activities.
This replaces the mechanical process with the use of software. The global
usage of Internet has also authorized individuals to unleash unique levels of
innovation, creativity, and has also created new markets unruling old ones.
As Internet is used world-wide it suffers from various security challenges and
CYBER SECURITY Week-1 E-Text
issues of which most of them help in improving the emergence of cyber
Lack of
Awareness
Insecure
Information
Systems
Wide-open Internet
Network Traffic
access
Hackin Jammin
g g
Information
Systems
spammin
g
Malware
s
Clonin
g
Phishin
Identity g
theft
Figure 1.9 Major threats to Information Systems
1.19 Security Requirements for Information Systems
The security principle for information system is a triad which will be discussed in
future. In addition to this triad, there are principles for maintaining and
securing the information systems. They are:
Accountability
Authorization
Data Integrity
Confidentiality
Integrit
Authenticati
on
Security Principles
of Information Non-
Repudiation
Access
Availabilit Control
y
Figure 1.11 Security Principles of Information Security
A B
I am A
C
Original Message
A
B
Modified Message
C
Sender cannot disprove the claim of transferring the message. During some
circumstances the user may send the message and he may negate the same
1.20.5 Access Control
later.
The security principle of access control is to decide who has to access what.
The access rights and permissions are monitored by this. Access Control
specifies who can access what and the permissions are maintained in Access
1.20.6 Availability
Control List (ACL).
A B
message.
Figure 1.15 Interruption of a message
In the above figure, user A sends a message to user B. An intermediary who
is present in-between this communication may purposely interrupt the
process thereby preventing the flow of message from reaching its specific
genuine user. Similarly, here the user C may delay the communication
process or restrict the message by making it unavailable to user B at a vital
time.
The OSI Standards for Security Model defines the security principles in seven
layers. they are as follows,
Authentication
Authentication
Access Control
Non-repudiation
Data Integrity
Confidentiality
Assurance or Availability
Notarization or Signature
Installation of
Newest OS and Cyber Security
Principles
Use of
Strong
Checking of
Sharing
Protecting
organizations from
Visiting
malicious Careless download
of software, free
downloads
Some of the main terms in cyber security are: vulnerability, threat, attack and risk.
Vulnerability: any weakness in the system, product or process that
compromise the basic security principles. Thereby, the system becomes
susceptible to attacks.
Threat: when there is a possibility for violation of security, due to
circumstance or capability or action or event, it may cause harm.
Threat is a possible danger to assets that might exploit vulnerability.
Attack: is a deliberate attempt to evade security services and violate the
security policy of a system.
Risk: The possibility of suffering a loss. Risk is a fundamental part of operations. It
is not something to fear, but something to manage.
But, any risk unnoticed or unobserved in the system may lead to vulnerability
and subsequently to attacks.
Figure 1.20 shows the interdependency of vulnerability, threat and risk.
Vulnerability
Risk
Cyber Threat
Actor Motivation
There are a number of ways with the actor or adversary attempting to gain
access to a system. Threats try to gain access to a network through
malicious attempts to compromise or disrupt a computer network or system.
The types of threats are increasing in its landscape by two technology trends
i. IoT (Internet of Things) and ii. Data Proliferation.
The very fundamental concept in security is CIA triad referring to
Confidentiality, Integrity and Availability. One or more facets of the triad are
protected by the security methods. The asset can be exploited by threats to
compromise the triad. The threats which are either intentional or accidental
fall under three categories based on the triad principles.
Figure 1.21 shows the CIA triad.
Confidentiality
CIA TRIAD
Integrity Availability
Social Engineering
Phishing
Unpatched Software
Protect
Develop
understanding Detect
Develop
Manag
systems and
, assets, Respond
e safeguard Identify the
implement
data and occurrence Recover
capabilitie s
of cyber Take action
s Ensure security on the
delivery detected Resilience
cyber Restoratio
Protecting the devices used for communication is the first and foremost step
in the security process. Today devices like Smartphone’s, laptops and
tablets are connected to the Internet and are used for personal and official
operations. They must be protected with the latest or updated versions of
software and hardware security solutions. The state-of-the-art security
CYBER SECURITY Week-1 E-Text
solutions are available now-a-days and they are server centric.
Fraud
Extortion
Consequences Spying
Corruption and loss
Risks
Risks
Phishing
Cloud-based servers
Social
Online theft
Engineering
Unsecure networks,
Metadata loss
Consequences
Consequences
Fraud
Permanenet
Theft
loss Fraud
Reputational
risk ID theft
services.
Figure 1.26 Risks and Consequences in Email and Backup Services
The four fundamental solutions apply technological advancements and every
day activities are built on a Cyber eco-system reducing the loss of
information.
The risks associated are substantially reduced in all aspects of life, personal
and professional, virtual and real.
1.31 Other essentials in securing the Computers
Some more essentials are also available in the literature. Let us see some of
them.
1.31.1 Physical Security
There is no security without physical security. So servers and other
important resources must be stored in a secure place with controlled
access.
It is ideal to keep all the resources in a locked room.
o This is very important today. Even very famous operating systems are
prone to threats. Sometimes, the vulnerabilities introduced by these
operating systems create unacceptable risks. In such a case upgrade
the OS as soon as possible.
o Use a secure file system.
o Apply security updates as needed.
o Stay informed about new updates for operating systems by
subscribing to the Security Notification Services to receive the latest
security notifications.