Cyber Security - Notes 1
Cyber Security - Notes 1
The subject Cyber Security is very important in this digital era due to dependency on online
operations, social media practices, upcoming technologies like IoT, digitization and
pervasive nature of mobile devices. Secure online operations and safe handling of devices are
the need of the hour. One must understand the security challenges as well as the best
practices that are essential to protect one from becoming the victims of cybercrimes.
Fundamental knowledge in Cyber Security is very much required to understand the current
status of cyber world. It is imperative to safe-guard the individual, society, organization and
the government from the dangers of cyber frauds, scams, threats and attacks.
We are all living in the digital era. All our daily activities either partially or totally depend on
digital devices or Internet. Every Organization whether it is government or non-government
and individuals rely on the usage of computer networks, systems and related technologies.
Most of our daily routines, including both personal and professional activities, depend on
digital devices connected through public and private networks and the Internet.
Where do we operate, and which connects us? These are the major questions that most of
us raise when we think about the way we use Internet and other resources for
communication. The answer is : Cyber Space.
Cyber Space is the virtual space that connects all of us and enables the information
exchange, necessary to support interactions in the digital era. More specifically,
Cyberspace can be defined as,
Cyberspace refers to the virtual space that provides the infrastructure, electronic
medium and related elements necessary for online global communication.
Cybernauts are those People who are actively engaged in Cyberspace for all their social
experience.
The Origin of Cyberspace
The term cyberspace is derived from the word cybernetics which in turn is extracted from
ancient Greek word kubernētēs, that refers to steersman or to give direction. Recent
years have seen a wide proliferation of context-dependent suffixes applied to cyber.
The term cyberspace first came into existence in various contexts in visual arts and
science fiction during 1940, 1960 and 1984. However, the first reference was made by
the founder of Electronic Frontier Foundation, in the year 1990 and later in 1991 by Mr.
Benedict, which is close to the existing relationship of computer and telecommunication
systems.
Levels of Cyberspace
Since Cyberspace is a common domain where everyone can operate and no one can
own or govern, there are many trespassing happening. Therefore, it is necessary to
understand the levels of Cyberspace.
Components of Cyberspace
first of all, a device for him to send and for the other person to receive, a network for
connectivity, a software or protocol to facilitate the exchange, a space or a global
mechanism for seamless integration of all, the intermediate elements that do the smooth
transfer from one end to other end and finally what is being transferred that is - data
(message, picture, audio, video or a combination of all).
The components of Cyberspace can be arranged on different levels. The level on which
cyberspace operations are conducted is determined by three layers.
i Physical Layer
ii Logical Layer
iii Cyber Personal Layer
Logical Layer: Contains network elements that are associated with each other which
are distant from the physical network. It also indicates the structure of connection of the
physical components.
Cyber Personal Layer: Involves the people actually present on the network.
i. Connectivity
ii. Virtuality
iii. Expansion
iv. Ambiguity
v. Interactivity
Ultimately cyberspace provides collaborative and virtual space for a wide range of participants.
All the above five features make Cyberspace inherently uncertain and complex.
The factors that influence, or the driving forces of Cyberspace are time, space,
anonymity, asymmetry and efficiency.
The virtual library of information offers required information on any topic at any point of
time and cyberspace acts as the informational resource now-a-days. Entertainment and
social networking play a major role in cyberspace as the cyberspace has been evolving
as a great medium to connect people these days.
Generally, people confuse between Internet and Cyberspace. Are they one and the
same or different ?
What is Internet?
Therefore, Internet provides the technical platform for communication and actions
through well-defined standards of operations.
Often, the terms Internet and cyberspace are used interchangeably and considered to
be the same in the meaning and usage. However, there are certain key differences
between Internet and Cyberspace.
The Internet links smaller or larger networks of computers, servers and other personal
devices that exist within the scope of Internet.
However, Cyberspace is a symbolic and figurative space that exists within the Internet
and supports a multitude of business, government and social interactions through
information exchange.
The design of the Internet results in a cyberspace that is built out of components and
provides services designed to form more complex services.
Data exchanged in Cyberspace can be in the form of text, audio, video and image.
Internet is a 50-year-old technology. Starting with the military applications, it was widely
used as a tool by the academicians and researchers to exchange data easily.
Therefore, Cyberspace and Internet vary in terms of their meaning, definition and
operations.
The term cyberspace has led to the introduction of other words like, cyber security,
cybercrime, Cyberwarfare, cyber terrorism and cyber espionage.
Cyber Security also refers to the measures taken against data thefts or protect the
computer systems from damages such as hardware, software or information, as well as
from interruption or deception of various computer services.
Cyber Security includes techniques that protect computers, networks, programs and
data from illegal access or outbreaks that may be misused.
Cyber Security involves a wide range of practices in protecting the integrity of networks,
programs and data from various attacks, harm or unintended access.
• It endeavors to safeguard that the security properties are realized and maintained by
the Organization.
• User’s assets are protected against various cyber security risks and remain intact.
• The importance of ensuring protection from attacks, damage and authorized access on
networks, computers and programs is equivalent to daily routine operations of an
organization.
• Helping to understand the current trends in IT and develop effective solutions.
• Reducing vulnerability in information and ICT systems and networks.
• Enforcing integrity, confidentiality and availability.
With the understanding based on the discussions made so far, the Common tools used
for cyber security may be listed as:
• Passwords
• Anti-virus/Anti-malware Software
• Software patches
• Firewalls
• Two-factor Authentication
• Encryption
i. Application Security
ii. Information Security
iii. Network Security
iv. Disaster Recovery
v. Operational Security and
vi. End-User Education
Application Security
Application security covers procedures or actions that can be taken care of throughout
various stages in the development life-cycle process of an application. This is to ensure
that the application is protected from threats and vulnerabilities that arises through faults
in the development of applications like, design, deployment, up-gradation or
preservation. Some of the basic techniques involved in ensuring security in applications
are:
Information Security
The fortification of information from illegal access or information theft thereby preserving
the privacy is referred to as the Information Security. Some of the common practices that
provides Information security are:
• Identification, validation and authorization of users
• Cryptography.
Network Security
The process of ensuring the usability, consistency, truthfulness and security of the
network is referred to as the Network security. Large number of threats are recognized
and stopped from further spreading or entering into the network system through an
Effective network security strategy. Network security compromises of the following
components:
Disaster Recovery
A development process that is used to assess various types of risks and establish
different priorities thereby evolving disaster recover strategies is known as Disaster
recovery. Every organizations must develop proper disaster recovery strategies to
protect their business-related activities from damage. Rather, they should take pro-active
measures to handle disasters because information is a major asset of an Organization.
Operational Security
Very stubborn or stringent measures must be taken as far as operational level security is
concerned especially in a complete automated environment. Of all the risks, it is really
difficult to fix the operational risks in an organization when data leakages or security
breaches happen.
End-User Education
The most essential and viable solution is end user education. Most of the security
incidents happen only because of lack of knowledge on the handling side of the users.
Many incidents happen without realizing the significance of certain activities.
Of all the above, end-user education is very important for an organization to avoid
unnecessary incidents against security.
The third question addresses the object’s security assurance from threatening factors
through measures and procedures of implementation.
Cyber security has a significant importance in the current world of digital technologies as
most people make use of Internet for their daily activities. This replaces the mechanical
process with the use of software. The global usage of Internet has also authorized
individuals to unleash unique levels of innovation, creativity, and has also created new
markets unruling old ones. As Internet is used world-wide it suffers from various security
challenges and issues of which most of them help in improving the emergence of cyber
security practices. The major challenge that exists in cyberspace is the anonymity, as it
creates security breaches and complexity between individuals and government
legislations.