Cyber Security - Unit 3 Notes
Cyber Security - Unit 3 Notes
Table of Contents
1. Introduction to Cyber Security
2. Defining Cyberspace
3. Concept of Cyber Security
4. Issues and Challenges of Cyber Security
5. Classification of Cybercrimes
6. Common Cybercrimes
7. Legal Perspective: IT Act 2000
8. Cybercrime Offences and Penalties
9. Organizations Dealing with Cybercrime in India
10. Summary and Key Takeaways
As future business professionals, understanding cyber security is essential for making informed
decisions about organizational security, risk management, and compliance with regulations.
Characteristics of Cyberspace:
Global reach:Transcends geographical and political boundaries
Components of Cyberspace:
Internet infrastructure (routers, servers, data centers)
Telecommunications networks
Computer systems and devices
Software applications and platforms
Data stored, transmitted, or processed digitally
Users and their online interactions
Confidentiality
Ensuring that sensitive information is accessed only by authorized individuals and kept private.
Integrity
Maintaining the accuracy, consistency, and trustworthiness of data throughout its lifecycle.
Availability
Ensuring systems and data are accessible to authorized users when needed.
Artificial intelligence is being weaponized to create more sophisticated, targeted, and scalable
attacks that can adapt to defenses.
The proliferation of IoT devices, cloud services, and remote work has dramatically expanded the
potential entry points for attackers.
Skills Gap
Regulatory Complexity
Attacks on supply chain software affect thousands of downstream customers, as seen in the
SolarWinds and Log4j incidents.
Human Error
Despite technological advances, human factors remain a significant vulnerability, with social
engineering exploiting user mistakes.
Emerging Challenges
Quantum Computing Threats: Future quantum computers could break current encryption
methods
5. Classification of Cybercrimes
Cybercrimes can be classified in various ways based on targets, methods, perpetrators, and impact.
Understanding these classifications helps in developing appropriate defense strategies.
6. Common Cybercrimes
Understanding common cybercrimes helps individuals and organizations recognize threats and
implement appropriate preventive measures.
Hacking
Unauthorized access to computer systems or networks, often to steal data, plant malware, or
disrupt operations.
Types:
Prevention:
Phishing
Fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity in
electronic communication.
Types:
Email phishing
Spear phishing (targeted)
Whaling (targeting executives)
Smishing (SMS phishing)
Vishing (voice phishing)
Email filtering
User awareness training
Multi-factor authentication
Malware
Malicious software designed to harm or exploit computers, servers, or networks.
Types:
Prevention:
Antivirus/anti-malware software
Regular system updates
Careful downloading practices
Ransomware
Malware that encrypts victims' files and demands payment for decryption.
Impact:
Prevention:
Types:
Prevention:
Types:
Prevention:
Important Note
Most successful cyber attacks involve multiple techniques. For example, a phishing email might
deliver ransomware, or social engineering might be used to facilitate unauthorized access.
Key Features:
Legal Recognition of Electronic Records: Electronic records and communications are given
legal validity
Digital Signatures: Framework for authentication of electronic records
Offenses and Penalties: Defines various cybercrimes and prescribes punishments
Regulatory Framework: Establishes authorities to regulate and certify electronic transactions
Intermediary Liability: Defines the responsibilities of service providers
Prepared by: Mr. Sharookh, PIET
Privacy Protection: Provisions for protecting sensitive personal data
Extraterritorial Jurisdiction
Section 75 of the IT Act provides that the Act applies to offenses or contraventions committed
outside India by any person if the act involves a computer, computer system, or network
located in India.
Key Functions:
Key Functions:
Key Functions:
Key Functions:
Key Functions:
Examples:
Reporting Cybercrimes
Citizens can report cybercrimes through:
Cybercrime Classification
Can be classified by target (individuals, property, government)
Also classified by method, perpetrator, and impact
Understanding categories helps in developing defenses
Most attacks combine multiple techniques
Common Cybercrimes
Hacking: Unauthorized access to systems
Phishing: Deceptive attempts to steal sensitive information
Malware: Software designed to harm systems
Ransomware: Encrypts data and demands payment
Financial Frauds: Online scams for monetary gain
Prepared by: Mr. Sharookh, PIET
Social Engineering: Manipulating people to compromise security
Legal Framework
IT Act 2000 (amended 2008) is the primary legislation in India
Defines various cybercrimes and prescribes penalties
Covers digital signatures, electronic records, intermediary liability
Has extraterritorial jurisdiction for offenses affecting Indian systems