CS Unit 1
CS Unit 1
CS Unit 1
Course Objectives:
To familiarize with network security, network security threats,
security services, and counter measures.
To be aware of computer security and Internet security.
To study the defensive techniques against these attacks
OR
“Cyber security is the protection of internet –
connected systems,including hardware ,software and
data from attacks.
It is made up of two words cyber and security
“cyber –systems,network,data”.
“security-system security ,network security, data
security, application security.”
Why is cyber security important?
• Cyber attacks can be extremely expensive for
businesses to endure.
• In addition to financial damage suffered by the
business, a data breach can also inflict untold
reputational damage.
• Cyber-attacks these days are becoming progressively
destructive. Cybercriminals are using sophisticated
ways to initiate cyber attacks.
• Regulations such as GDPR are forcing organizations
into taking better care of the personal data they hold.
GDPR
• EU General Data Protection Regulation or GDPR, and
is aimed at guiding and regulating the way companies
across the world will handle their customers' personal
information and creating strengthened and unified
data protection for all individuals within the EU
• Because of the above reasons, cyber security has
become an important part of the business and the
focus now is on developing appropriate response
plans that minimize the damage in the event of a
cyber attack.
History of the GDPR
• The General Data Protection Regulation (GDPR) is
the toughest privacy and security law in the world.
• Though it was drafted and passed by the European
Union (EU), it imposes obligations onto
organizations anywhere, so long as they target or
collect data related to people in the EU.
• The regulation was put into effect on May 25,
2018. The GDPR will levy harsh fines against those
who violate its privacy and security standards,
with penalties reaching into the tens of millions of
euros.
EU
• The right to privacy is part of the 1950
European Convention on Human Rights, which states,
“Everyone has the right to respect for his private and family
life, his home and his correspondence.”
• From this basis, the European Union has sought to ensure
the protection of this right through legislation.
• As technology progressed and the Internet was invented, the
EU recognized the need for modern protections.
• So in 1995 it passed the European Data Protection Directive,
establishing minimum data privacy and security standards,
upon which each member state based its own implementing
law.
Fundamental Objectives of Cyber
security
• Confidentiality, integrity, and availability, also known
as the CIA triad, is a model designed to guide companies
and organizations to form their security policies.
• Technically, cyber security means protecting information
from unauthorized access, unauthorized modification,
and unauthorized deletion in order to
provide confidentiality, integrity, and availability.
• Let’s explore these components and some of the
information security measures which are designed to
assure the safety of each component.
The CIA Triad
Confidentiality
• Confidentiality is about preventing the disclosure of data
to unauthorized parties.
• It also means trying to keep the identity of authorized
parties involved in sharing and holding data private and
anonymous.
• Standard measures to establish confidentiality include:
Data encryption
Two-factor authentication
Biometric verification
Security tokens
Integrity
• 1 . Encryption
• 2 . Software Controls
• 3 . Hardware Controls
• 4 . Overlapping Controls
• 5 . Periodic Review
1 . Encryption
• Encryption provides secrecy for data .
Additionally , encryption can be used to
achieve integrity , since data that cannot be
read generally also cannot be changed .
Furthermore , encryption is important in
protocols .
2 . Software Controls
• Program controls include the following kinds
of things:
. Development controls -a program is designed
coded , tested , and maintained.
3 . Hardware Controls
• The term hardware security also refers to the
protection of physical systems from harm.
4 . Overlapping Controls
• For example , security for a microcomputer
application may be provided by a combination
of controls on program access to the data , on
physical access to the microcomputer and
storage media , and even by file locking to
control access to the processing programs.
5 . Periodic Review
• Few controls are permanently effective .
• Just when the security specialist finds a way to
secure assets against attacks , the opposition
doubles its efforts in an effort to defeat the
security mechanism .
• Thus , judging the effectiveness of a control is
an ongoing task .
Security Models