Sem - 6 Cyber Security
Sem - 6 Cyber Security
The best way to define Cyberspace is the virtual and dynamic space created by the machine clones.
According to the Cyberspace definition, it is a web consisting of consumer computers, electronics and communication networks by which
the consumer is connected to the world.
Cyberspace History
The word Cyberspace first made its appearance in Wiliam Gibson’s Science fiction book Necromancer. The book described an online
world filled with computers and associated societal elements. In that book, the author described Cyberspace as a 3D virtual landscape
created by a network of computers. Although it looks like a physical space, it is generated by a computer, representing abstract data.
After the publication of the book, the word Cyberspace became a mainstay in many English dictionaries. The New Oxford Dictionary of
English provides Cyberspace definition as the notional environment used by the people to communicate over networks of the computer.
As per the Cyberspace meaning, Cyberspace is a virtual space with no mass, gravity or boundaries. It is the interconnected space
between networks of computer systems.
Bits and Bytes- Zeroes and ones are used to define Cyberspace. It is a dynamic environment where these values change continuously. It
can also be defined as the imaginary location where two parties can converse.
Cyberspace
Cyberspace mainly refers to the computer which is a virtual network and is a medium electronically designed to help online
communications to occur. This facilitates easy and accessible communications to occur across the world. The whole
Cyberspace is composed of large computer networks which have many sub-networks. These follow the TCP or IP protocol.
The TCP (Transmission Control Protocol) is a standard for communications that allows the application programs and other
computing devices to exchange data and messages over a Cyber network. These are designed to send data across the
internet which then makes sure that the sent data are successfully delivered over the networks. It is the standards that are
mostly used to define the rules of the internet and are defined by the Internet Engineering Task Force or IETF. It is a very
commonly used protocol and it ensures that there is an end-to-end delivery of data.
On the other hand, Internet Protocol or IP is the protocol or method that involves sending data from one device to another using
the internet. Each and every device has an IP address that is unique to it and this gives it its identity. The IP address enables
communication and exchange of data to other devices across the internet. It defines how devices and their applications will
exchange packages of data with each other and connected networks. All the transfer occurs through either of the Internet
Protocol Suite or protocols i.e. either TCP or IP.
Cyberspace is that space in which users share information, interact with each other; engage in discussions or social media
platforms, and many other activities. This concept was introduced by William Gibson in his book ‘Neuromancer’ which was
done in 1894. Thus, this term is still widely used among everyone as it is rapidly growing and used for various purposes by an
individual.
What is a Digital Identity?
A digital identity is typically defined as a one-to-one relationship between a human and their digital presence. A digital presence can consist
of multiple accounts, credentials, and entitlements associated with an individual.
Frequently, digital identity notes the presence of an individual or entity within applications, networks, on-premises systems, or cloud
environments. This may be a person, organization, application, or device used for authentication, authorization, automation, and even
impersonation during runtime. Digital identity may also be interchangeable with “digital entity” or simply “identity” depending on the
context.
Digital Identity vs. User
A user is different from a digital identity, Instead, a user refers to the actual person operating a resource to whom the digital identity is
assigned, and whose identity is associated with subsequent activities. Users and digital identities possess a one-to-many relationship
regarding accounts. Identity theft or compromise can have serious implications for individuals and organizations. A compromised identity
can potentially allow a criminal to gain data, systems, and other access available to the victim.
Digital privacy is also an important concept to note. Digital privacy refers to the desire and/or right to have one’s identity, and sensitive data
related to one’s identity, concealed and only authorized to access or know by those authorized by the identity. Data privacy and digital
privacy protections are important for protecting identities. Many regulations, such as EU GDPR, HIPAA, etc. have explicit mandates around
how data is collected, transmitted, and handled to protect identities and privacy.
In this post, we will further define what digital identities are, use cases, identity attack vectors and threats, best practices for safeguarding
Identity vs. Digital Identity
Here’s how the Collins English Dictionary defines identity:
1. Your identity is who you are.
2. The identity of a person or place is the characteristics that distinguish them from others.
How is “identity” used differently in the digital world?
In computing, the concept of “identity” is used as a standardized representation of an individual. An identity in cyberspace is a literal
projection of an individual and their interactions within a computer resource.
Identity is typically used to illustrate a one-to-one relationship between a human being and their digital presence. This presence, however,
can have multiple accounts, multiple credentials, and an infinite number of entitlements in its electronic format. For example, consider the
accounts associated with a user’s enterprise identity.
An identity can represent a defined resource, an asset, or even an automated robot process. There may not be a human individual associated
to a digital identity. This extended definition allows for complete computerized systems taking a life of their own and, thus, can be assigned
an identity — even though they do not “think.”
Digital identity and identity may be used interchangeably in cyberspace and digital realms, though the correct terminology will depend on
the context. Identity might be a reference to indicate a broader, all-encompassing definition of a human or non-human object’s presence.
However, it may also be used synonymously with a narrowly-defined digital identity — such as an account, a password, or another
designated user identifier.
Common Types of Digital Identities
While there are many types of identities, they may be broadly organized across the following three categories:
Human digital identities allow human users to be assigned access or privileges within a network. Human identities can be
further broken down into employee identities, partner identities, vendor identities, and customer identities.
Machine identities (non-human / non-person identities) are a mechanism allowing any non-human entity, including applications,
software robots, endpoints (server, desktop, IoT, etc.), to be authenticated within systems.
Cloud Identities are used to access resources in the cloud. These identities and accounts can be highly dynamic, and may often
have some form of privileged access.
What is Cyber Security?
What is Cyber Security? Read about cyber security today, learn about the top known cyber attacks and find out how to protect
your home or business network from cyber threats.
Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from
malicious attacks. It's also known as information technology security or electronic information security. The term applies in a
variety of contexts, from business to mobile computing, and can be divided into a few common categories.
·
Network security is the practice of securing a computer network from intruders, whether targeted attackers or opportunistic
malware.
Application security focuses on keeping software and devices free of threats. A compromised application could provide access to
the data its designed to protect. Successful security begins in the design stage, well before a program or device is deployed.\
Information security protects the integrity and privacy of data, both in storage and in transit.
Operational security includes the processes and decisions for handling and protecting data assets. The permissions users have
when accessing a network and the procedures that determine how and where data may be stored or shared all fall under this
umbrella.
Disaster recovery and business continuity define how an organization responds to a cyber-security incident or any other event
that causes the loss of operations or data. Disaster recovery policies dictate how the organization restores its operations and
information to return to the same operating capacity as before the event. Business continuity is the plan the organization falls back
on while trying to operate without certain resources.
End-user education addresses the most unpredictable cyber-security factor: people. Anyone can accidentally introduce a virus to
an otherwise secure system by failing to follow good security practices. Teaching users to delete suspicious email attachments, not
plug in unidentified USB drives, and various other important lessons is vital for the security of any organization.
History of cyber attacks
https://www.monroecollege.edu/news/cybers
ecurity-history-hacking-data-breaches#:~:text
=Technically%2C%20the%20very%20first%2
0cyberattack,that%20things%20got%20really
%20interesting.
https://www.techtarget.com/searchsecurity/p
ost/Cybersecurity-governance-A-path-to-cyb
er-maturity#:~:text=Identify%20and%20priori
tize%20critical%20data,solely%20as%20a%
20technical%20issue.
https://sprinto.com/blog/importance-of-cyber-
security/
Objectives of I4C