Introduction to Cyber Security Cyber space :Virtual space created by computer networks in which people can communicate Cyber security: Technologies and processes used to protect computers, data and networks from unauthorised access of data Cyber crime: Any crime carried out by using computers or the internet Cyber attack: Unauthorised access of private or confidential information contained on computer network or system
Cyber forensics: The application of scientifically proven methods to collect,interprets,process and uses digital evidences to provide a conclusive description of cyber crime activities Cyber law: Cyber law or IT law is referred to as “LAW OF THE INTERNET”.It is a legal system designed to deal with internet-related legal issues.
CYBER + SECURITY Protecting systems,networks,applications and information Technology that includes networks and data
Why is Cyber Security important? Safety of data and information Data breaching Saves networks from intruders Prevent damages and threats to businesses
Objectives of cyber security Protect confidentiality of data Preserve the integrity of data Promote the availability of data to authorised users CIA Model: I C A
1.Confidentiality Cryptography Two factor authentication Biometric verification Security token(portable devices)
2. Integrity: Refers to protecting data from being modified by unauthorized parties. If occured recover quickly from such event 3. Availability: Ensures availability to authorised persons
Types of Cyber Security Network security Application security Information or data security Mobile security Cloud Security Operational security Identity management
Cyber security vs information security Cyber security is often confused with information security. Cyber security focuses on protecting computer systems from unauthorised access or being otherwise damaged or made inaccessible. Information security is a broader category that protects all information assets, whether in hard copy or digital form.
Internet Governance Internet governance refers to the rules, policies, standards and practices that coordinate and shape global cyberspace. The Internet is a vast network of independently-managed networks, woven together by globally standardized data communication protocols (primarily, Internet Protocol, TCP, UDP, DNS and BGP).
The challenges of Internet governance Cyber Threats Cyberwarfare
Cyber threats A cyber or cyber security threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include computer viruses, data breaches, Denial of Service (DoS) attacks, and other attack vectors.
Cyberwarfare Cyberwarfare is the use of cyber attacks against a nation-state, causing it significant harm, up to and including physical warfare, disruption of vital computer systems and loss of life.
Types of cyberwarfare attacks Destabilization In recent years, cybercriminals have been attacking governments through critical infrastructure, including such entities as transportation systems, banking systems, power grids, water supplies, dams and hospitals. The adoption of the internet of things makes the manufacturing industry increasingly susceptible to outside threats. From a national security perspective, destabilizing critical digital infrastructure inflicts damage on vital modern services or processes. For example, an attack on the energy grid could have massive consequences for the industrial, commercial and private sectors.
Sabotage Cyber attacks that sabotage government computer systems can be used to support conventional warfare efforts. Such attacks can block official government communications, contaminate digital systems, enable the theft of vital intelligence and threaten national security. State-sponsored or military-sponsored attacks, for example, may target military databases to get information on troop locations, weapons and equipment being used.
Data theft Cybercriminals hack computer systems to steal data that can be used for intelligence, held for ransom, sold, used to incite scandals and chaos, or even destroyed.
Cyber Crime The crime that involves and uses computer devices and Internet, is known as cybercrime. Cybercrime can be committed against an individual or a group; it can also be committed against government and private organizations. It may be intended to harm someone‘s reputation, physical harm, or even mental harm. Cybercrime can cause direct harm or indirect harm to whoever the victim is. However, the largest threat of cybercrime is on the financial security of an individual as well as the government.
Types of Cybercrime Hacking It is an illegal practice by which a hacker breaches the computer‘s security system of someone for personal interest. Unwarranted mass-surveillance Mass surveillance means surveillance of a substantial fraction of a group of people by the authority especially for the security purpose, but if someone does it for personal interest, it is considered as cybercrime.
Child grooming It is the practice of establishing an emotional connection with a child especially for the purpose of child-trafficking and child prostitution. Copyright infringement If someone infringes someone‘s protected copyright without permission and publishes that with his own name, is known as copyright infringement.
Money laundering Illegal possession of money by an individual or an organization is known as money laundering. It typically involves transfers of money through foreign banks and/or legitimate business. In other words, it is the practice of transforming illegitimately earned money into the legitimate financial system.
Cyber terrorism Cyber terrorism can be explained as internet terrorism. With the advent of the internet, individuals and groups are misusing the anonymity to threaten individuals, certain groups,religions, ethnicities or beliefs. Cyberterrorism can be broadly categorized under three major categories: Simple: This consists of basic attacks including the hacking of an individual system. Advanced: These are more sophisticated attacks and can involve hacking multiple systems and/or networks. Complex: These are coordinated attacks that can have a large-scale impact and make use of sophisticated tools.