Cyber Security: Mrs. V. Nikitha
Cyber Security: Mrs. V. Nikitha
Cyber Security: Mrs. V. Nikitha
Mrs. V. Nikitha
Course Objectives:
· To familiarize various types of cyber-attacks and cyber crimes
· To give an overview of the cyber laws
· To study the defensive techniques against these attacks
Course Outcomes:
• The students will be able to understand cyber-attacks, types of
cybercrimes,cyber laws and also how to protect them self and
ultimately the entire Internet community from such attacks.
UNIT 1
UNIT 1
TOPICS
What is Cyberspace?
• The interdependent network of information
technology infrastructures, which includes the
Internet, telecommunications networks, computer
systems, and embedded processors and controllers.
• First coined in William Gibson’s novel
“Neuromancer”, the term Cyberspace is used to
describe the range of information resources
available through computer networks.
1. Basic Cyber Security Concepts
The 7 layers of cybersecurity should center on the mission critical assets you are
seeking to protect.
1. Mission Critical Assets – This is the data you need to protect*
2. Data Security – Data security controls protect the storage and transfer of
data.
3. Application Security – Applications security controls protect access to an
application, an application’s access to your mission critical assets, and the
internal security of the application.
4. Endpoint Security – Endpoint security controls protect the connection
between devices and the network.
5. Network Security – Network security controls protect an organization’s
network and prevent unauthorized access of the network.
6. Perimeter Security – Perimeter security controls include both the physical
and digital security methodologies that protect the business overall.
7. The Human Layer – Humans are the weakest link in any cybersecurity
posture. Human security controls include phishing simulations and access
management controls that protect mission critical assets from a wide variety
of human threats, including cyber criminals, malicious insiders, and negligent
users.
3 Vulnerability
• Nonrepudiation:
“assurance the sender of data is provided
with proof of delivery and the recipient is
provided with proof of the sender’s identity, so
neither can later deny having processed the
data.”
8 CIA Triad
C: Confidentiality:
• Confidentiality as “assurance that information is not
disclosed to unauthorized individuals, processes, or
devices.”
• First, the information must have protections
capable of preventing some users from accessing it.
• Second, limitations must be in place to restrict
access to the information to only those who have
the authorization to view it.
• Third, an authentication system must be in place to
verify the identity of those with access to the data.
8 CIA Triad
• In information security, computer
security and network security, an asset is any data,
device, or other component of the environment
that supports information-related activities. Assets
generally include hardware (e.g. servers and
switches), software (e.g. mission critical
applications and support systems) and confidential
information. Assets should be protected from illicit
access, use, disclosure, alteration, destruction,
and/or theft, resulting in loss to the organization.
10 Motive of attackers
Two phases
Steps: Scanning
1. Port Scanning:
Identify open/close ports & services.
2. Network scanning:
Understand IP addresses & related information
about the computer network system.
3. Vulnerability scanning:
Understand the existing weaknesses in the system.
11. Active Attacks
1. Risk assessment:
The given cloud environment is analyzed to
identify potential vulnerabilities and shortcomings
that threats can exploit in the risk assessment stage.
The cloud consumers can ask the potential cloud
provider for statistics & other information about
past attacks ( both successful & unsuccessful)
carried out in its cloud.
The identified risks are quantified & qualified
according to the probability of occurrence & the
degree of impact.
20. Risk Management
1. Risk treatment:
Mitigation policies & plans are designed during the
risk treatment stage with the intent of successfully
treating the risks that were discovered.
Some risks are eliminated, some can be mitigated
while others can be dealt with by outsourcing or
even incorporated into insurance or operating loss
budgets.
The cloud provider itself may agree to assume
responsibility as part of its contractual obligations.
20. Risk Management
1. Risk control:
• Examples:
• Any of the most common methods of cyber misconduct,
including infecting a computer system with malware, holding it
hostage with ransomware, disabling it with a flood of messages
(also-called denial of service attack) or hacking data for the
purpose of espionage.
21 Cyber Threats-Cyber Warfare
More Definitions
• It is a crime committed using a computer &
internet to steal a persons identity.
• Crimes completed either on or with a computer
• Any illegal activity done through internet or on
the computer.
• All criminal activities done using internet,
cyberspace & www.
• Any criminal activity which uses network access
to commit a criminal act.
Types of Cybercrime
• 1. Hacking
• 2. Child pornography
• 3.Child grooming
• 4.Copyright infringement
• 5.Money laundering
• 6. Cyber-extortion
23 Cyber terrorism