CS Unit 1
CS Unit 1
In short, cybersecurity keeps your world safe and secure. It ensures that
sensitive information remains confidential, intact and accessible only to
authorized users. Whether its securing personal information, financial
transaction or corporation database
CS unit 1 1
Risk Management – Identifies, assesses, and mitigates security threats to
protect information systems.
Auditing & Monitoring – Tracks and logs activities to detect and respond to
security incidents.
Security Policy
A Security policy in cyber security is a document that outlines the rules,
expectations, and overall approach an organization uses to maintain the
confidentiality, integrity, and availability of its data.
These policies cover various aspects of security and are designed to address
different areas of concern.
Email Security Policy: This policy provides guidance on how to protect the
company’s sensitive information through email security measures.
CS unit 1 2
Data Retention Policy: This policy defines which data the company
collects and processes, where, how, and for how long it should be stored.
It impacts several areas, including security, privacy, and compliance.
Data Encryption Policy: This policy outlines how the organization handles
the secure storage and transmission of data.
Security Goals
1. Confidentiality – Ensures that sensitive information is not accessed by
unauthorized users. Techniques like encryption and access control help
protect data.
2. Integrity – Ensures that data remains accurate, unmodified, and reliable. Hash
functions and digital signatures are used to maintain integrity.
Security Mechanisms
1. Encryption – Converts data into an unreadable format using cryptographic
algorithms (e.g., AES, RSA) to ensure confidentiality.
CS unit 1 3
3. Intrusion Detection Systems (IDS) – Monitors network traffic and detects
suspicious activities or potential attacks.
4. Access Control – Regulates who can access what resources using techniques
like Mandatory Access Control (MAC) and Discretionary Access Control
(DAC).
2. Analyze Threats
3. Assess Vulnerabilities
Examine weak points in the network where threats could gain access.
4. Assess Risk
CS unit 1 4
5. Apply Countermeasures
5. Firewall – A security system that monitors and controls incoming and outgoing
network traffic based on security rules.
CS unit 1 5
10. Denial of Service (DoS) Attack – An attack that overwhelms a network or
system, making it unavailable to users.
11. Distributed Denial of Service (DDoS) Attack – A DoS attack carried out using
multiple compromised devices to amplify the effect.
For example, a phishing attack is a threat where attackers trick users into
revealing sensitive information like passwords.
Threats can lead to financial loss, data breaches, and reputational damage.
CS unit 1 6
Protection of data, systems, and Control over personal data and
Definition networks from unauthorized ensuring it is not shared without
access, attacks, or damage. consent.
Cyber Attack
A cyber attack is a deliberate attempt by hackers or malicious entities to
compromise, damage, or gain unauthorized access to computer systems,
networks, or data.
CS unit 1 7
1. Malware Attack – Malicious software like viruses, worms, Trojans, and
ransomware infects systems to steal or destroy data.
Example: Ransomware encrypts files and demands payment for decryption.
2. Phishing Attack – Attackers trick users into revealing sensitive information via
fake emails or websites.
Active Attacks
Active attacks are unauthorized actions that alter the system or data.
In an active attack, the attacker will directly interfere with the target to damage
or gain unauthorized access to computer systems and networks.
This may include the injection of hostile code into communications, alteration
of data, and masquerading as another person to get unauthorized access.
CS unit 1 8
Passive Attacks
A Passive attack attempts to learn or make use of information from the system
but does not affect system resources.
CS unit 1 9
CS unit 1 10