Cyber Security 1
Cyber Security 1
Syllabus:
Module-I: Cyber Security Basics, Security Principles, Cyber Attacks and their Classification, Vulnerability Assessment, Intrusion
Detection and Intrusion Prevention Systems, User Authentication Methods, Bio-metric Authentication Methods
Module II: Standard Security Models: Information Security, Network Security, Operating System Security ; Web Security:mail Security,
Mobile Device Security, Cloud Security
Module III: IoT Security: Cyber Physical System Security, Social Media Security; Virtual Currency: Block Chain Technology, Security
Auditing
Module IV:
Cyber Crimes- Types-Data Frauds, Analysis of Crimes-Human Behavior- Stylometry-Incident Handling, Investigation Methods-Criminal
Profiling- Cyber Trails, Digital Forensics-History- Challenges-Branches of Digital Forensics, Digital Forensic Investigation Methods-
ReportingManagement of Evidence
Module V: Cyber Law-Basics-Information Technology Act 2000-Amendments, Evidentiary value of Emails/SMS, Cyber crimes and
Offences dealt with IPC-RBI Act-IPR in India, Jurisdiction of Cyber Crime, Creating awareness and Healthy practices
• Text Book:
• 1. Lester Evans, Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk
Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare, Kindle Edition
• 2. K. Jaishankar. Cyber Criminology: Exploring Internet Crimes and Criminal Behavior, CRC Press
Cyber Security
Cyber:
-It is a prefix derived from the word cybernetics.
-It is often used to describe things related to or involving Internet, digital systems, computers,
technology, application and virtual environments.
Security: Protection
- Protection of system, n/w, application, information etc..
Cyber security refers to the body of technologies, processes, and practices designed to protect
networks, devices, programs, and data from attack, damage, or unauthorized access.
Importance of Cyber Security
Protection of Sensitive Information:
Cybersecurity safeguards sensitive information, such as personal data, financial records, trade secrets, and
government intelligence, from unauthorized access, theft, and exploitation.
Data breaches can result in significant financial losses, reputational damage, and legal consequences. Adequate
cybersecurity measures help prevent unauthorized individuals or entities from gaining access to sensitive data.
Protection of Critical Infrastructure:
Industries such as energy, transportation, healthcare, and finance heavily rely on interconnected systems. A
cyberattack on critical infrastructure can have devastating consequences, including disrupting essential services,
endangering public safety, and causing widespread chaos.
Contd….
Global Interconnectivity:
The global nature of the internet means that cyber threats can originate from anywhere in the world.
Cybersecurity measures are necessary to defend against international cybercriminals and state-sponsored hacking
activities.
• Cybercrime: This encompasses criminal activities that involve computers or digital devices.
Example: hacking, identity theft, and online fraud.
• Cyberbullying: Refers to the use of digital communication tools to harass, intimidate, or threaten individuals.
Some common cyberbullying behaviors include:
Cybernetics: The study of communication and control in living organisms and machines, and how they interact
and influence each other.
Cyber-Physical Systems: Systems that integrate digital computing and communication with physical processes
and machinery, often seen in areas like industrial automation and smart cities.
Example: Robots, intelligent buildings, implantable medical devices, cars that drive themselves.
Motivations for Acquiring Cybersecurity
Knowledge
Personal Data Protection:
Acquiring cybersecurity knowledge empowers individuals to shield their personal information from cyber threats, such
as identity theft and online fraud.
Enhanced Employability: IT professional with cyber security applications are highly in demand.
Ethical Hacking and Penetration Testing: Mastery of cybersecurity facilitates ethical hacking and
penetration testing, identifying system vulnerabilities before malicious actors exploit them, thus enhancing digital
safety.
- Penetration testers use the same tools, techniques, and processes as attackers to find and demonstrate the business
impacts of weaknesses in a system.
Security Principles(CIA Triad)
The main objective of cyber security is to ensure data protection.
The security community provides a triangle of three related principles to protect the data from cyber-
attacks.
This principle is called the CIA triad.
The CIA triad is a common model that forms the basis for the development of security systems.
Confidentiality: Protecting information from unauthorized access and
disclosure.
Example:
• Criminal steals customers’ usernames, passwords, or credit card Information
Threats: A Threat is a possible security risk that might exploit the vulnerability of a system or asset, organization, or
individual.
Attack:
An attack, on the other hand, is the actual act of exploiting the information security system's weaknesses.
Hacking:
It is the act of compromising digital devices and networks through unauthorized access to an account or computer system.
Fraud:
It occurs when someone intentionally misrepresents the truth, or withholds or conceals important information, resulting
in harm, such as monetary loss.
Types of Cyber Security Threats
Malware
-Malware means malicious software, which is the most common cyber attacking tool.
- It is used by the cybercriminal or hacker to disrupt or damage a legitimate user's system.
The following are the important types of malware created by the hacker:
• Virus:
✓ It is a malicious piece of code that spreads by attaching itself to other software.
✓ It can clean files and spreads throughout a computer system, infecting files, stoles information, or damage device.
✓ Ex:Melissa, Mydoom
• Spyware:
✓ It is a software that secretly records information about user activities on their system.
For example, spyware could capture credit card details that can be used by the cybercriminals for unauthorized shopping,
money withdrawing, etc.
• Trojans:
✓ It is a type of malware or code that appears as legitimate software or file to fool us into downloading and running.
✓ Its primary purpose is to corrupt or steal data from our device or do other harmful activities on our network.
• Ransomware:
✓ Normally loaded onto a computer via a download/attachment/link from an email or website.
✓ Will either lock the screen or encrypt your data.
✓ Once Ransomware is uploaded on your computer/tablet/phone it is very difficult to remove without
removing all of the data
• Botnets:
✓ It is a collection of internet-connected malware-infected devices that allow cybercriminals to control them.
✓ The term botnet is derived from the words robot and network.
✓ A bot, in this case, is a device infected by malicious code, which then becomes part of a network, or net, of infected
machines all controlled by a single attacker or attack group.
✓ Infected devices are controlled remotely by threat actors.
✓ The objective for creating a botnet is to infect as many connected devices as possible.
✓ Botnets are commonly used to send spam emails, engage in click fraud campaigns.
Phishing
• Phishing is a type of cybercrime in which a sender seems to come from a genuine
organization like PayPal, eBay, financial institutions, or friends and co-workers.
• They contact a target or targets via email, phone, or text message with a link to
persuade them to click on that links.
• This link will redirect them to fraudulent websites to provide sensitive data such as
personal information, banking and credit card information, social security numbers,
usernames, and passwords.
• Clicking on the link will also install malware on the target devices that allow hackers
to control devices remotely.
How to tackle the problem
• Here the requests come from several IP addresses that can make the system unusable, overload their servers,
slowing down significantly or temporarily taking them offline, or preventing an organization from carrying out
its vital functions.
Brute Force
• A brute force attack is a cryptographic hack that uses a trial-and-error method to guess all possible
combinations until the correct information is discovered.
• Cybercriminals usually use this attack to obtain personal information about targeted passwords, login info,
encryption keys, and Personal Identification Numbers (PINS).
Man-in-the-middle (MITM) attack
• A man-in-the-middle attack is a type of cyber threat (a form of eavesdropping attack) in which a
cybercriminal intercepts a conversation or data transfer between two individuals.
• Once the cybercriminal places themselves in the middle of a two-party communication, they seem like genuine
participants and can get sensitive information and return different responses.
• The main objective of this type of attack is to gain access to our business or customer data.
For example, a cybercriminal could intercept data passing between the target device and the network on an
unprotected Wi-Fi network.
-Assignment…..