Introduction_to_CyberSecurity and Applications.pdf
ranapoonam1
59 views
40 slides
Sep 16, 2024
Slide 1 of 40
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
About This Presentation
Introduction to Cybersecurity
Size: 1.95 MB
Language: en
Added: Sep 16, 2024
Slides: 40 pages
Slide Content
Introduction to
Cyber Security
By:
Prof. (Dr.) Poonam Panwar
University School of Computing
What is Cyber Security?
The technique of protecting internet-connected systems such as computers,
servers, mobile devices, electronic systems, networks, and data from
malicious attacks is known as cybersecurity. We can divide cybersecurity into
two parts one is cyber, and the other is security. Cyber refers to the
technology that includes systems, networks, programs, and data. And
security is concerned with the protection of systems, networks, applications,
and information. In some cases, it is also calledelectronic information
securityorinformation technology security.
04/09/24 Prof.(Dr.) Poonam Panwar2
Some other definitions of
cybersecurity
"CyberSecurityisthebodyoftechnologies,processes,andpractices
designedtoprotectnetworks,devices,programs,anddatafromattack,
theft,damage,modificationorunauthorizedaccess.”
"CyberSecurityisthesetofprinciplesandpracticesdesignedtoprotect
ourcomputingresourcesandonlineinformationagainstthreats."
04/09/24 Prof.(Dr.) Poonam Panwar3
Cyber Security Goals
Cyber Security'smainobjective is to ensure data protection. The
security community provides a triangle of three related principles to
protect the data from cyber-attacks. This principle is called theCIA
triad. The CIA model is designed to guide policies for an organization's
information security infrastructure. When any security breaches are
found, one or more of these principles has been violated.
04/09/24 Prof.(Dr.) Poonam Panwar11
CIA triad
We can break theCIA model into three parts: Confidentiality, Integrity,
and Availability. It is actually a security model that helps people to think
about various parts of IT security. Let us discuss each part in detail.
04/09/24 Prof.(Dr.) Poonam Panwar12
Integrity
This principle ensures that the data is authentic, accurate, and
safeguarded from unauthorized modification by threat actors or
accidental user modification. If any modifications occur, certain
measures should be taken to protect the sensitive data from corruption
or loss and speedily recover from such an event. In addition, it indicates
to make the source of information genuine.
04/09/24 Prof.(Dr.) Poonam Panwar15
Availability
This principle makes the information to be available and useful for its
authorized people always. It ensures that these accesses are not
hindered by system malfunction or cyber-attacks.
04/09/24 Prof.(Dr.) Poonam Panwar16
Malware
Malware means malicious software, which is the most common cyber attacking
tool. It is used by the cybercriminal or hacker to disrupt or damage a legitimate
user's system. The following are the important types of malware created by the
hacker:
•Virus:Itisamaliciouspieceofcodethatspreadsfromonedevicetoanother.It
cancleanfilesandspreadsthroughoutacomputersystem,infectingfiles,stoles
information,ordamagedevice.
•Spyware:Itisasoftwarethatsecretlyrecordsinformationaboutuseractivitieson
theirsystem.Forexample,spywarecouldcapturecreditcarddetailsthatcanbe
usedbythecybercriminalsforunauthorizedshopping,moneywithdrawing,etc.
•Trojans:Itisatypeofmalwareorcodethatappearsaslegitimatesoftwareorfile
tofoolusintodownloadingandrunning.Itsprimarypurposeistocorruptorsteal
datafromourdeviceordootherharmfulactivitiesonournetwork.
04/09/24 Prof.(Dr.) Poonam Panwar18
Systems that can be affected by
security breaches and attacks:
•Communication:Cyberattackerscanusephonecalls,emails,textmessages,and
messagingappsforcyberattacks.
•Finance:Thissystemdealswiththeriskoffinancialinformationlikebankandcredit
carddetail.Thisinformationisnaturallyaprimarytargetforcyberattackers.
•Governments:Thecybercriminalgenerallytargetsthegovernmentinstitutionsto
getconfidentialpublicdataorprivatecitizeninformation.
•Transportation:Inthissystem,cybercriminalsgenerallytargetconnectedcars,
trafficcontrolsystems,andsmartroadinfrastructure.
•Healthcare:Acybercriminaltargetsthehealthcaresystemtogettheinformation
storedatalocalclinictocriticalcaresystemsatanationalhospital.
•Education:Acybercriminalstargeteducationalinstitutionstogettheirconfidential
researchdataandinformationofstudentsandemployees.
04/09/24 Prof.(Dr.) Poonam Panwar32
The 7 Industries Most Vulnerable to
Cyberattacks
04/09/24 Prof.(Dr.) Poonam Panwar33