Module 3 Cyber security
Module 3 Cyber security
Module 3
Cyber Security
• Cybersecurity refers to the practice of protecting computer systems,
networks, and digital assets from unauthorized access, cyberattacks,
data breaches, and other security threats.
• It involves a combination of technologies, processes, and practices
designed to safeguard information, maintain the confidentiality,
integrity, and availability of data, and mitigate risks associated with
the use of technology.
Key Features of Cyber Security
• Risk Management
Identifying, assessing, and prioritizing risks to the organization's information
assets and implementing controls to mitigate these risks effectively.
• Security Architecture
Designing and implementing security measures, including network architecture,
access controls, encryption, and authentication mechanisms, to protect against
cyber threats.
• Vulnerability Management
Identifying and remediating security vulnerabilities in software, systems, and
infrastructure through regular vulnerability assessments, patch management, and
secure coding practices.
• Security Monitoring and Analytics
Continuously monitoring networks, systems, and applications for suspicious
activities, anomalies, and potential security breaches.
Leveraging security analytics and threat intelligence to detect emerging threats and
proactively respond to security incidents.
• Cloud Security
Securing cloud-based infrastructure, platforms, and services by implementing
appropriate security controls, encryption, and access management measures to
protect data stored and processed in the cloud.
Layers of Cyber Security
• The concept of the "7 layers of cybersecurity" typically refers to the layers of
defense in a security strategy that aim to protect computer systems, networks,
and data from various threats.
• These layers are often associated with the OSI (Open Systems Interconnection)
model, which is a conceptual framework used to understand how different parts
of a network interact. Here are the seven layers of cybersecurity:
• 1. Physical Security: This layer involves physical measures to protect the
physical assets of an organization, such as data centers, servers, networking
equipment, and other hardware. Physical security measures may include locks,
access control systems, surveillance cameras, and security guards.
• 2. Perimeter Security: Also known as network security, this layer involves
securing the boundaries of the network to prevent unauthorized access from
external sources. Perimeter security measures may include firewalls, intrusion
detection/prevention systems (IDS/IPS), and virtual private networks (VPNs).
• 3. Endpoint Security:
• This layer focuses on securing individual devices, such as computers, laptops,
smartphones, and tablets, that connect to the network. Endpoint security measures may
include antivirus software, anti-malware solutions, host-based firewalls, and device
encryption.
• 4. Identity and Access Management (IAM): This layer involves managing and controlling
user access to network resources based on their identities and roles within the
organization. IAM solutions include user authentication mechanisms (e.g., passwords,
biometrics), access control policies, multi-factor authentication (MFA), and single sign-on
(SSO) solutions.
• 5. Data Security: This layer focuses on protecting data from unauthorized access,
disclosure, alteration, or destruction throughout its lifecycle. Data security measures
may include encryption, data loss prevention (DLP) solutions, data classification, backup
and recovery strategies, and secure data disposal practices.
• 6. Application Security: This layer involves securing the applications and software
systems used within an organization, including web applications, mobile apps, and
enterprise software. Application security measures may include secure coding practices,
vulnerability scanning, penetration testing, and application firewalls.
• 7. Security Operations Center (SOC): This layer involves the people, processes, and
technologies responsible for monitoring, detecting, analyzing, and responding to
cybersecurity threats and incidents. A SOC typically includes security analysts, incident
responders, threat hunters, and security automation tools such as SIEM (Security
Information and Event Management) systems.
Online Security
• Online security refers to the protection of data and information transmitted
over the internet from unauthorized access, theft, or damage.
• It encompasses various measures and practices aimed at safeguarding users'
privacy, preventing identity theft, securing financial transactions, and
protecting against cyber threats such as malware, phishing, and hacking.
• Here are some key aspects of online security:
• 1. Strong Passwords: Creating complex and unique passwords for each online
account can help prevent unauthorized access. Passwords should ideally be
long, containing a mix of letters, numbers, and special characters.
• 2. Two-Factor Authentication (2FA): Enabling 2FA adds an extra layer of
security by requiring users to provide a second form of verification, such as a
code sent to their mobile device, in addition to their password
3. Regular Software Updates: Keeping operating systems, applications, and
antivirus software up to date helps patch vulnerabilities and protect against
known security threats.
4. Secure Browsing: Using HTTPS-enabled websites ensures that data
transmitted between your browser and the website is encrypted, reducing the
risk of interception by malicious actors.
5. Public Wi-Fi Awareness: Avoiding sensitive transactions or accessing
personal accounts on public Wi-Fi networks can prevent potential interception
of data by cybercriminals.
6. Phishing Awareness: Being cautious of unsolicited emails, messages, or
phone calls requesting personal information or credentials can help prevent
falling victim to phishing attacks
7. Firewalls and Security Software: Installing firewalls and reputable
antivirus/antimalware software can help detect and block malicious activities
on your devices.
8. Data Encryption: Encrypting sensitive data before transmitting it over the
internet adds another layer of protection, making it unreadable to anyone
without the decryption key.
9. Data Backup: Regularly backing up important files and data to secure
locations helps mitigate the impact of ransomware attacks or data breaches.
10. Security Awareness Training: Educating users about online security best
practices, common threats, and how to recognize potential risks can
significantly reduce the likelihood of falling victim to cyberattacks
Online Security and Privacy
• Online security and privacy are fundamental aspects of cybersecurity,
encompassing measures and practices aimed at protecting individuals,
organizations, and systems from unauthorized access, data breaches, and privacy
violations in the digital realm.
• How online security and privacy fit into the broader field of
cybersecurity:
Confidentiality
Both security and privacy efforts aim to maintain the confidentiality of sensitive
information. This includes personal data, financial records, intellectual property, and any
other information that should only be accessible to authorized individuals or entities.
Integrity
Security measures ensure the integrity of data by protecting it from unauthorized
modification, tampering, or corruption. Privacy efforts also contribute to data integrity by
preventing unauthorized access that could lead to data manipulation.
Availability
Cybersecurity measures, including those related to online security and privacy, work to
ensure the availability of resources and services. This involves safeguarding against
disruptions caused by cyberattacks, system failures, or other incidents that could impact
the availability of information and services.
Data Protection
Online security measures such as encryption, access controls, and authentication
mechanisms help protect data from unauthorized access or interception. Privacy efforts
focus on minimizing the collection, storage, and sharing of personally identifiable
information (PII) to reduce the risk of privacy breaches.
Regulatory Compliance
Both security and privacy efforts are influenced by regulatory requirements and
compliance standards aimed at protecting individuals' rights and enforcing data
protection laws. Organizations must adhere to various regulations such as the General
Data Protection Regulation (GDPR), Health Insurance Portability and Accountability Act
(HIPAA), and others, which often have specific requirements related to security and
privacy.
Risk Management
Cybersecurity encompasses risk management strategies aimed at identifying, assessing,
and mitigating risks related to online security threats and privacy concerns. This involves
conducting risk assessments, implementing appropriate controls, and monitoring for
emerging threats to mitigate potential impacts on security and privacy
User Awareness and Education
Both security and privacy efforts rely on user awareness and education to promote
responsible online behavior, enhance security hygiene, and protect against social
engineering attacks, phishing attempts, and other tactics used by cybercriminals to
exploit vulnerabilities.
Incident Response
In the event of security breaches or privacy incidents, effective incident response
plans and procedures are essential for detecting, containing, and mitigating the
impact of the incident.
This involves timely response, investigation, and communication to affected parties to
minimize damage and restore trust.
Importance and Benefits of
Cyber Security
• Cybersecurity is of paramount importance in today's digital age for several
reasons, and it offers numerous benefits to individuals, businesses, and
society as a whole.
• Here are some key points highlighting the importance and benefits of
cybersecurity: 1.
Protection of Sensitive Data
Cybersecurity measures help safeguard sensitive information such as personal data,
financial records, intellectual property, and confidential business data from
unauthorized access, theft, or misuse.
• Endpoint Security
Endpoint security involves protecting individual devices such as computers, laptops,
smartphones, and tablets from malware, ransomware, and other cyber threats. This
includes installing antivirus/antimalware software, endpoint detection and response (EDR)
solutions, and device encryption to secure endpoints and prevent unauthorized access.
• Cloud Security
Cloud security focuses on securing data, applications, and infrastructure hosted in cloud
environments. This includes implementing access controls, encryption, and security
monitoring to protect against data breaches, account compromises, and other cloud-related
threats.
• Application Security
Application security aims to protect software applications from vulnerabilities, exploits,
and attacks throughout the software development lifecycle (SDLC). This includes
conducting code reviews, vulnerability assessments, and penetration testing to identify and
remediate security flaws in applications.
• Data Security
Data security involves protecting sensitive data from unauthorized access, disclosure,
alteration, and destruction. This includes implementing encryption, data loss prevention
(DLP) solutions, access controls, and data masking to safeguard data at rest, in transit, and
in use.
• These are just a few examples of the types of cybersecurity measures and practices used to
protect digital assets and mitigate cyber risks.
• In practice, cybersecurity often involves a combination of these types to create a layered
defense approach tailored to the specific needs and risk profile of an organization.
Cyber Security Threats
• Cybersecurity threats are constantly evolving and encompass a wide range of tactics and
techniques used by malicious actors to compromise digital systems, networks, and data.
• Here are some common types of cybersecurity threats:
• Malware
Malware, short for malicious software, refers to software programs designed to infiltrate, damage, or
gain unauthorized access to computer systems. Common types of malware include viruses, worms,
Trojans, ransomware, spyware, and adware.
• Phishing
Phishing is a social engineering tactic used to trick individuals into disclosing sensitive information
such as usernames, passwords, credit card numbers, or other personal data.
Phishing attacks typically involve fraudulent emails, text messages, or websites designed to
impersonate legitimate entities or organizations.
• Ransomware:
Ransomware is a type of malware that encrypts files or locks users out of their systems, demanding
payment (usually in cryptocurrency) for the decryption key or to restore access.
Ransomware attacks can have devastating consequences for individuals and organizations, causing
data loss, financial damage, and operational disruptions
• Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks:
DoS and DDoS attacks aim to disrupt the availability of services or networks by flooding
them with a large volume of traffic or overwhelming their resources. These attacks can
render websites inaccessible, disrupt online services, and cause financial losses for
businesses.
• Insider Threats
Insider threats occur when individuals within an organization misuse their access
privileges to steal data, sabotage systems, or conduct unauthorized activities. Insider
threats can be malicious or unintentional and may involve employees, contractors, or
business partners.
• Zero-Day Exploits
Zero-day exploits target vulnerabilities in software or hardware that are unknown to the
vendor or have not yet been patched. Cybercriminals exploit these vulnerabilities to launch
attacks before a patch or fix is available, making them particularly dangerous and difficult
to defend against.
• Supply Chain Attacks
Supply chain attacks target the software supply chain, compromising trusted
vendors or suppliers to infiltrate their products and distribute malware to
unsuspecting customers. These attacks can have widespread implications, affecting
numerous organizations and individuals that rely on compromised software or
services.
• Data Breaches
Data breaches involve unauthorized access to sensitive information, resulting in the
exposure or theft of personal data, financial records, intellectual property, or other
confidential information. Data breaches can occur through various means, including
hacking, insider threats, or accidental exposure of data.
• Password Managers
These apps securely store passwords and generate strong, unique passwords for each
service.
• LastPass (Windows, macOS, Android, iOS): Allows password storage, secure notes, and autofill
features, with multi-device synchronization.
• 1Password (Windows, macOS, Android, iOS): Offers encrypted password storage, two-factor
authentication, and secure sharing options.
• Dashlane (Windows, macOS, Android, iOS): Provides password storage, breach alerts, and a VPN
for secure browsing.
• Bitwarden (Windows, macOS, Android, iOS): Open-source password manager with strong
encryption and cross-device syncing.
• Encryption and Secure Communication Apps
These apps help encrypt messages, files, and other data to protect from unauthorized
access.
• Signal Private Messenger (Android, iOS): End-to-end encrypted messaging and calling for
secure communication.
• Telegram (Windows, macOS, Android, iOS): Offers encrypted secret chats, file sharing, and
the ability to self-destruct messages.
• ProtonMail (Web, Android, iOS):End-to-end encrypted email service focused on privacy and
security.
• VeraCrypt (Windows, macOS, Linux): Open-source encryption software for creating
encrypted file volumes and protecting sensitive data.
• These apps help individuals and businesses protect their data, devices, and
online identities from various cybersecurity threats.
Cyber Security Initiatives by
Govt of India
• The Government of India has undertaken several cybersecurity initiatives to
protect its digital infrastructure, ensure data privacy, and build a secure
cyberspace.
• These initiatives address both national security concerns and the protection of
citizens and businesses from cyber threats.
• Here are some key cybersecurity initiatives by the Indian government:
1. National Cyber Security Policy (NCSP) - 2013
• Objective: To protect information, such as personal information, financial and
banking information, and sovereign data, from cyber threats.
• Components:
• Creating a secure cyber ecosystem.
• Developing indigenous cybersecurity technologies.
• Encouraging public-private partnerships.
• Building cybersecurity awareness and training programs.
2. National Cyber Coordination Centre (NCCC) - 2017
• Objective: To scan the country's web traffic and detect real-time cyber
threats, thereby enhancing India's capability to counter cyber-attacks.
• Function: It acts as an early warning system and improves coordination
between various cybersecurity agencies.
3. Indian Computer Emergency Response Team (CERT-In)- 2004
• Established under the Ministry of Electronics and Information Technology
(MeitY), CERT-In acts as the national agency for responding to cyber
incidents.
• Key Activities:
• Issue advisories on latest cyber threats and vulnerabilities.
• Handle cybersecurity incidents like malware infections, phishing attacks, etc.
• Collaborate with international cybersecurity agencies and domestic organizations
to enhance cybersecurity posture.
4. Cyber Surakshit Bharat Initiative - 2018
• Objective: To raise cybersecurity awareness in India, especially among
government officials.
• Features:
• Training programs for Chief Information Security Officers (CISOs).
• Focus on cybersecurity hygiene, and best practices for e-Governance.
Mamata Pandey