0% found this document useful (0 votes)
2 views

Cyber Security

Cybersecurity encompasses practices and technologies to protect computer systems, networks, and data from cyber threats, ensuring confidentiality, integrity, and availability. It is crucial for preventing data breaches, financial losses, and ensuring compliance with legal regulations. Key threats include malware, phishing, and DDoS attacks, while effective measures include firewalls, encryption, and multi-factor authentication.

Uploaded by

nishiijardar6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Cyber Security

Cybersecurity encompasses practices and technologies to protect computer systems, networks, and data from cyber threats, ensuring confidentiality, integrity, and availability. It is crucial for preventing data breaches, financial losses, and ensuring compliance with legal regulations. Key threats include malware, phishing, and DDoS attacks, while effective measures include firewalls, encryption, and multi-factor authentication.

Uploaded by

nishiijardar6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Notes Of Basics of

Information Security
(4360702)
Unit - 5 Cyber Security
1

Cyber Security

Introduction

Cybersecurity refers to the practices, technologies, and strategies used to protect


computer systems, networks, and data from cyber threats, unauthorized access, and
attacks. It ensures confidentiality, integrity, and availability of digital assets.
🔹
🔹 Confidentiality – Protects sensitive information from unauthorized access.​

🔹 Availability – Ensures data and systems are accessible when needed.


Integrity – Ensures data is accurate and not tampered with.​

Why is Cybersecurity Important?


✅ Prevents data breaches that expose personal and financial information.​



Protects businesses from financial loss due to cyberattacks.​
Ensures privacy for individuals and organizations.​

✅ Complies with legal regulations such as GDPR, HIPAA, and ISO 27001.
Prevents identity theft and fraud.​

Types of Cybersecurity Threats

1. Malware (Malicious Software)

●​ Includes viruses, worms, ransomware, spyware, trojans.


●​ Can steal, encrypt, or destroy data.

2. Phishing Attacks
2

●​ Attackers use fake emails and websites to trick users into revealing sensitive
information.
●​ Common in social engineering attacks.

3. Denial-of-Service (DoS) & Distributed Denial-of-Service (DDoS) Attacks

●​ Overloads a system with traffic, causing service disruptions.


●​ DDoS uses multiple devices (botnets) to amplify the attack.

4. Man-in-the-Middle (MITM) Attacks

●​ Hackers intercept and manipulate communication between two parties.


●​ Often occurs on public Wi-Fi networks.

5. SQL Injection & Code Injection Attacks

●​ Hackers exploit vulnerabilities in web applications to access databases.


●​ Can steal or modify sensitive information.

6. Zero-Day Exploits

●​ Attacks that target unknown vulnerabilities in software before a fix is


available.

7. Insider Threats

●​ Employees or trusted individuals misuse access to compromise security.

8. Ransomware Attacks

●​ Malicious software encrypts files and demands ransom for decryption.

Cybersecurity Measures and Best Practices


3

1. Firewalls & Network Security

●​ Protects networks from unauthorized access.


●​ Filters incoming and outgoing traffic.

2. Anti-Virus & Anti-Malware Software

●​ Detects and removes malicious software.

3. Data Encryption

●​ Protects sensitive data from unauthorized access.


●​ Common encryption standards: AES, RSA, SSL/TLS.

4. Multi-Factor Authentication (MFA)

●​ Requires multiple forms of verification (password + OTP).

5. Strong Password Policies

●​ Uses complex passwords and changes them regularly.


●​ Encourages password managers to store credentials securely.

6. Regular Software Updates & Patch Management

●​ Fixes security vulnerabilities in software and systems.

7. Secure Wi-Fi Networks & VPNs

●​ Encrypts internet traffic to protect data from hackers.

8. Security Awareness Training

●​ Educates employees on phishing, safe browsing, and cyber hygiene.

9. Backup & Disaster Recovery Plans


4

●​ Ensures data is backed up regularly to recover from attacks.

10. Intrusion Detection & Prevention Systems (IDS/IPS)

●​ Monitors network traffic for suspicious activity.

Cybersecurity Domains & Specializations

Domain Description

Network Security Protects networks from cyber threats.

Application Security Ensures software is free from vulnerabilities.

Cloud Security Protects cloud-based applications and data.

Endpoint Security Secures devices (laptops, smartphones).

Data Security Encrypts and protects sensitive information.

Identity & Access Management Manages user access rights.


(IAM)

Incident Response Detects, responds to, and mitigates cyber


incidents.
5

Comparison: Cybersecurity vs. Network Security

Aspect Cybersecurity Network Security

Scope Protects all digital assets (systems, Focuses on protecting networks


data, applications). and internet traffic.

Threats Malware, phishing, DDoS, insider Unauthorized access, DoS, traffic


threats. interception.

Example Anti-virus, encryption, MFA, cloud Firewalls, IDS/IPS, VPNs.


s security.

Applications of Cybersecurity

🔹
🔹 Banking & Finance – Prevents fraud and secures transactions.​

🔹
🔹
Healthcare (HIPAA Compliance) – Protects patient records and medical devices.​
Government & Military – Secures classified data from cyber espionage.​

🔹 Cloud Computing Security – Protects data stored in platforms like AWS, Google
E-commerce & Retail – Safeguards online payments and customer data.​

Cloud.

Exam Preparation Notes

Main Points to Remember

1.​ Cybersecurity – Protects systems, networks, and data from cyber threats.
6

2.​ Common Threats – Malware, Phishing, DDoS, MITM, SQL Injection,


Ransomware.
3.​ Security Measures – Firewalls, Encryption, MFA, IDS/IPS, Backup Plans.
4.​ Types of Cybersecurity – Network Security, Cloud Security, Endpoint Security.
5.​ Encryption Standards – AES, RSA, SSL/TLS.
6.​ Real-World Applications – Used in banking, healthcare, e-commerce,
government.

Short Notes for Quick Revision

●​ Cybersecurity – Protects digital assets from cyberattacks.


●​ Malware – Includes viruses, worms, ransomware.
●​ Phishing – Tricking users into revealing sensitive data.
●​ DDoS Attack – Overloading a network to disrupt services.
●​ MITM Attack – Intercepting and altering communications.
●​ Encryption – Converts data into unreadable formats for security.
●​ MFA – Adds an extra layer of authentication.
●​ Backup Plan – Essential for disaster recovery.
●​ Used in: Banking, healthcare, military, e-commerce.

Conclusion

Cybersecurity is critical for protecting data, networks, and systems from


ever-evolving cyber threats. Organizations and individuals must implement strong
security measures, continuous monitoring, and user awareness training to stay
secure in the digital world.

You might also like