This document provides an introduction to cyber security, including definitions and key concepts. It describes cyber security as protecting internet-connected systems from malicious attacks. The document then outlines different types of cyber security such as network security, application security, information security, identity management, cloud security, mobile security, endpoint security, and IoT security. It discusses the importance of cyber security and its goals of ensuring data protection, confidentiality, integrity, and availability. Finally, it defines common cyber security terminology.
The document provides an overview of network security concepts. It begins by defining various types of malware like viruses, worms, spyware, ransomware, and trojans. It then discusses security policies, information security, aspects of information security including threats and vulnerabilities. It defines network security and its goals of confidentiality, integrity and availability. It describes aspects of network security including privacy, message integrity, authentication and non-repudiation. It then discusses cyber security and its main categories. It defines the different levels of impact from security breaches and types of attacks like passive, active, interruption, fabrication and modification. Finally, it provides an overview of networking devices and protocols at different layers of the OSI model as well as firewall
The document discusses computer security and common cyber attack vectors. It defines key terms like attack surface, attack vectors, and security breaches. It then describes 8 common attack vectors: compromised credentials, weak/stolen credentials, malicious insiders, missing/poor encryption, misconfiguration, ransomware, phishing, and trust relationships. Typical symptoms of an attack are also listed, such as slow performance, strange files/programs, and automatic messages. The consequences of a successful attack compromise the goals of computer security - confidentiality, integrity and availability.
Lec 1- Intro to cyber security and recommendationsBilalMehmood44
?
This document provides an overview of cyber security. It defines security, cyber security, and computer security. It discusses why security is important for businesses and lists common cyber security domains like network security, endpoint security, cloud security, and mobile security. It also covers ethical hacking, skills required to be an ethical hacker, common vulnerabilities they identify, and examples of famous ethical and malicious hackers like Kevin Mitnick. Finally, it briefly summarizes some major cyber security incidents like attacks on Iran and the largest DDoS attack.
Cyber security.pptxelectronic systems, networks, and data from maliciousBhimNathTiwari1
?
description of cyber security
Prospects of Cybersecurity in Smart Cities
Cyber security refers to any technologies, practices and policies for preventing?cyber attacks?or mitigating their impact.
Cyber security aims to protect computer systems, applications, devices, data, financial assets and people against?ransomware?and other?malware,?phishing?scams, data theft and other cyber threats.
Cybersecurity is important because it:?
Protects against unauthorized access to data and networks.
Improves recovery time after a breach.
Ensures regulatory compliance, and supports business continuity.
“Cybersecurity?is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.”
This document discusses cyber security and provides information on various cyber security domains and threats. It begins with an introduction to cyber security and defines what cyber security is. It then outlines five main cyber security domains: 1) critical infrastructure security, 2) network security, 3) application security and cloud security & information security, 4) storage security & mobile security, and 5) information security. For each domain, it provides details on what they involve and examples. The document also discusses common cyber threats, dangerous cyber security myths, and provides dos and don'ts for cyber security.
The document discusses cyber security. It begins by explaining how computer usage has grown significantly since the 1970s but also made computers prone to various threats. Cyber security aims to protect computers and networks from issues like theft, damage, disruption or unauthorized access. While the definition of cyber security seems simple, protecting various modern technologies like smartphones, websites and IoT devices requires complex systems. The document then outlines different elements of cyber security like data, application, mobile, network, endpoint, cloud, database and infrastructure security. It stresses that cyber security is important to prevent damages, data abuse, and protect sensitive information. The document concludes by describing common cyber threats like phishing, malware and denial of service attacks and providing tips to build strong cyber security
The document discusses cyber security. It begins by explaining how computer usage has grown significantly since the 1970s and how cyber security systems aim to protect computers and networks from threats like theft, damage, disruption and information disclosure. It then describes several key elements of cyber security including data security, application security, mobile security, network security, endpoint security, cloud security, database/infrastructure security and business continuity/disaster recovery. The document emphasizes that cyber threats can cause damages and data issues, so cyber security is important to implement. It provides examples of common cyber threats like phishing, malware attacks and backdoors. Finally, it offers tips for building effective cyber security systems and strategies.
The document summarizes a seminar presentation on cyber security. It begins with an introduction explaining the need for cyber security due to increasing cyber attacks. It then defines cyber security and discusses the different types including network, application, information and operational security. It also defines cyber attacks and common types such as injection attacks, DNS spoofing, and denial of service attacks. The document outlines different types of hackers and why cyber security is important for protection of data and systems. It concludes with some cyber security tips.
information security (network security methods)Zara Nawaz
?
This document provides an overview of information security concepts. It discusses basic security principles like how no system is completely secure but security measures can reduce risks. It then summarizes key aspects of network security such as protecting systems through configuration, detection of issues, and rapid response. Common network security methods are outlined like access control, anti-malware tools, and firewalls. Goals of security like confidentiality, integrity and availability are defined in relation to the CIA triad model. Threats to these goals are also summarized.
Cyber security is important to protect computers, networks, and data from theft, damage, or unauthorized access. It covers various types of security like data security, application security, mobile security, network security, endpoint security, cloud security, database security, and disaster recovery plans. Cyber threats can take the form of cybercrime, cyber-attacks, or cyber-terrorism, and may use methods like phishing, malware, SQL injection, backdoors, denial-of-service attacks, and spoofing. It is important for individuals and organizations to implement strong passwords, updates, backups, employee training, authentication, and security technologies to protect against cyber threats.
Cyber security is important to protect computers, networks, programs, and data from threats such as theft, damage, and unauthorized access or disclosure. As technology has advanced and more devices are connected, the threats have also increased and become more sophisticated. Cyber security involves various elements like data security, network security, cloud security, and disaster recovery plans. Common cyber threats include phishing, malware, SQL injection, and denial of service attacks. It is important for individuals and organizations to implement cyber security best practices such as strong passwords, updates, backups, access control, and employee training to protect against cybercrime and attacks.
Network security involves protecting computer networks from unauthorized access and system damage. It ensures only authorized users can access network resources and data through authentication methods like usernames and passwords. Network security is needed because increased Internet usage has led to more hackers and attacks, putting networking systems and stored data at risk of viruses, delays, modifications or identity theft. Various security measures can help, such as antivirus software to detect malware, data loss prevention to restrict data sharing, email security to filter viruses and information leaks, and mobile security like antivirus to safeguard devices.
This document discusses cyber security and provides an overview of its key elements. It begins by explaining how computer usage has grown significantly since the 1970s and how cyber security systems aim to protect computers and networks from threats like theft, damage, and information disclosure. It then outlines several types of cyber security that cover areas like data security, application security, mobile security, network security, and more. The document also discusses common cyber threat methods such as phishing, malware, and backdoors. It concludes by providing tips for building an effective cyber security system, including using strong passwords, multi-factor authentication, backup systems, and cyber security software.
sec.This includes policy settings that prevent unauthorized peopleJuliusECatipon
?
Information security protects sensitive information from unauthorized activities, including inspection, modification, recording, and any disruption or destruction. The goal is to ensure the safety and privacy of critical data such as customer account details, financial data or intellectual property.
The document discusses cyber security. It begins by explaining how computer usage has grown significantly since the 1970s but also made computers prone to various threats. As technology advanced, cyber security emerged to protect computers and networks from issues like data theft, damage, and information disclosure. Cyber security covers different areas like data, application, mobile, network, endpoint, cloud, database, and infrastructure security. The document emphasizes that cyber security is important to prevent damages, data abuse, and protect sensitive information. It then discusses common cyber threats like phishing, malware, and denial-of-service attacks. Finally, it provides tips for building cyber security systems like regularly updating passwords, using secure backups, and educating staff.
Ethical Hacking Concepts and Scopes, Threats and Attack Vectors, Information Assurance, Threat Modelling
Enterprise Information Security Architecture, Vulnerability
Assessment and Penetration Testing
Types of Social Engineering, Insider Attack, Preventing Insider
Threats, Social Engineering Targets and Defence Strategies
ETHICAL HACKING AND SOCIAL ENGINEERING
Topics Covered: Ethical Hacking Concepts and Scopes, Threats and Attack Vectors, Information Assurance, Threat Modelling, Enterprise Information Security Architecture, Vulnerability, Assessment and Penetration Testing, Types of Social Engineering, Insider Attack, Preventing Insider Threats, Social Engineering Targets and Defence Strategies
There are three core principles of data security: confidentiality, integrity, and availability. Confidentiality means that sensitive data should not be accessed by unauthorized individuals. Integrity refers to ensuring data is not modified without permission. Availability means information must be accessible on demand. Data security controls aim to protect data from threats like unauthorized access, alteration, and destruction. Common threats include malware, hacking, and data loss from system failures. Organizations implement measures like encryption, firewalls, and monitoring to prevent threats and ensure the security of their data and IT systems.
In present world, where computers/laptops and smart phone made it possible to extract other's secrets, a need has been imminent to handle such problems by Cyber Security Regime, which not only be launched by individuls(IT Expert) of organizations but the governments of the country should also play a vital role.
The document discusses cyber security. It begins by explaining how computer usage has grown significantly since the 1970s but also made computers prone to various threats. Cyber security aims to protect computers and networks from issues like theft, damage, disruption or unauthorized access. While the definition of cyber security seems simple, protecting various modern technologies like smartphones, websites and IoT devices requires complex systems. The document then outlines different elements of cyber security like data, application, mobile, network, endpoint, cloud, database and infrastructure security. It stresses that cyber security is important to prevent damages, data abuse, and protect sensitive information. The document concludes by describing common cyber threats like phishing, malware and denial of service attacks and providing tips to build strong cyber security
The document discusses cyber security. It begins by explaining how computer usage has grown significantly since the 1970s and how cyber security systems aim to protect computers and networks from threats like theft, damage, disruption and information disclosure. It then describes several key elements of cyber security including data security, application security, mobile security, network security, endpoint security, cloud security, database/infrastructure security and business continuity/disaster recovery. The document emphasizes that cyber threats can cause damages and data issues, so cyber security is important to implement. It provides examples of common cyber threats like phishing, malware attacks and backdoors. Finally, it offers tips for building effective cyber security systems and strategies.
The document summarizes a seminar presentation on cyber security. It begins with an introduction explaining the need for cyber security due to increasing cyber attacks. It then defines cyber security and discusses the different types including network, application, information and operational security. It also defines cyber attacks and common types such as injection attacks, DNS spoofing, and denial of service attacks. The document outlines different types of hackers and why cyber security is important for protection of data and systems. It concludes with some cyber security tips.
information security (network security methods)Zara Nawaz
?
This document provides an overview of information security concepts. It discusses basic security principles like how no system is completely secure but security measures can reduce risks. It then summarizes key aspects of network security such as protecting systems through configuration, detection of issues, and rapid response. Common network security methods are outlined like access control, anti-malware tools, and firewalls. Goals of security like confidentiality, integrity and availability are defined in relation to the CIA triad model. Threats to these goals are also summarized.
Cyber security is important to protect computers, networks, and data from theft, damage, or unauthorized access. It covers various types of security like data security, application security, mobile security, network security, endpoint security, cloud security, database security, and disaster recovery plans. Cyber threats can take the form of cybercrime, cyber-attacks, or cyber-terrorism, and may use methods like phishing, malware, SQL injection, backdoors, denial-of-service attacks, and spoofing. It is important for individuals and organizations to implement strong passwords, updates, backups, employee training, authentication, and security technologies to protect against cyber threats.
Cyber security is important to protect computers, networks, programs, and data from threats such as theft, damage, and unauthorized access or disclosure. As technology has advanced and more devices are connected, the threats have also increased and become more sophisticated. Cyber security involves various elements like data security, network security, cloud security, and disaster recovery plans. Common cyber threats include phishing, malware, SQL injection, and denial of service attacks. It is important for individuals and organizations to implement cyber security best practices such as strong passwords, updates, backups, access control, and employee training to protect against cybercrime and attacks.
Network security involves protecting computer networks from unauthorized access and system damage. It ensures only authorized users can access network resources and data through authentication methods like usernames and passwords. Network security is needed because increased Internet usage has led to more hackers and attacks, putting networking systems and stored data at risk of viruses, delays, modifications or identity theft. Various security measures can help, such as antivirus software to detect malware, data loss prevention to restrict data sharing, email security to filter viruses and information leaks, and mobile security like antivirus to safeguard devices.
This document discusses cyber security and provides an overview of its key elements. It begins by explaining how computer usage has grown significantly since the 1970s and how cyber security systems aim to protect computers and networks from threats like theft, damage, and information disclosure. It then outlines several types of cyber security that cover areas like data security, application security, mobile security, network security, and more. The document also discusses common cyber threat methods such as phishing, malware, and backdoors. It concludes by providing tips for building an effective cyber security system, including using strong passwords, multi-factor authentication, backup systems, and cyber security software.
sec.This includes policy settings that prevent unauthorized peopleJuliusECatipon
?
Information security protects sensitive information from unauthorized activities, including inspection, modification, recording, and any disruption or destruction. The goal is to ensure the safety and privacy of critical data such as customer account details, financial data or intellectual property.
The document discusses cyber security. It begins by explaining how computer usage has grown significantly since the 1970s but also made computers prone to various threats. As technology advanced, cyber security emerged to protect computers and networks from issues like data theft, damage, and information disclosure. Cyber security covers different areas like data, application, mobile, network, endpoint, cloud, database, and infrastructure security. The document emphasizes that cyber security is important to prevent damages, data abuse, and protect sensitive information. It then discusses common cyber threats like phishing, malware, and denial-of-service attacks. Finally, it provides tips for building cyber security systems like regularly updating passwords, using secure backups, and educating staff.
Ethical Hacking Concepts and Scopes, Threats and Attack Vectors, Information Assurance, Threat Modelling
Enterprise Information Security Architecture, Vulnerability
Assessment and Penetration Testing
Types of Social Engineering, Insider Attack, Preventing Insider
Threats, Social Engineering Targets and Defence Strategies
ETHICAL HACKING AND SOCIAL ENGINEERING
Topics Covered: Ethical Hacking Concepts and Scopes, Threats and Attack Vectors, Information Assurance, Threat Modelling, Enterprise Information Security Architecture, Vulnerability, Assessment and Penetration Testing, Types of Social Engineering, Insider Attack, Preventing Insider Threats, Social Engineering Targets and Defence Strategies
There are three core principles of data security: confidentiality, integrity, and availability. Confidentiality means that sensitive data should not be accessed by unauthorized individuals. Integrity refers to ensuring data is not modified without permission. Availability means information must be accessible on demand. Data security controls aim to protect data from threats like unauthorized access, alteration, and destruction. Common threats include malware, hacking, and data loss from system failures. Organizations implement measures like encryption, firewalls, and monitoring to prevent threats and ensure the security of their data and IT systems.
In present world, where computers/laptops and smart phone made it possible to extract other's secrets, a need has been imminent to handle such problems by Cyber Security Regime, which not only be launched by individuls(IT Expert) of organizations but the governments of the country should also play a vital role.
Microtek Household Wires – Safe & Durable Wires for Your Homemicrotekindia00
?
Microtek provides top-quality household wires in India to keep your home safe and powered. Our wires are strong, long-lasting, and made with the best materials to prevent overheating and electrical issues.
Read More: https://www.microtek.in/product/electricals/household-wires
2025年新版毕业证书加拿大文凭不列颠哥伦比亚大学成绩单?【q薇1954292140】复刻成绩单加拿大不列颠哥伦比亚大学毕业证(UBC毕业证书)毕业证办理 不列颠哥伦比亚大学毕业证办理,文凭购买加拿大不列颠哥伦比亚大学文凭办理,加拿大不列颠哥伦比亚大学成绩单办理和真实留信认证、留服认证、不列颠哥伦比亚大学学历认证。学院文凭定制,不列颠哥伦比亚大学原版文凭补办,扫描件文凭定做,100%文凭复刻。【q薇1954292140】Buy The University of British Columbia Diploma购买美国毕业证,购买英国毕业证,购买澳洲毕业证,购买加拿大毕业证,以及德国毕业证,购买法国毕业证(q薇1954292140)购买荷兰毕业证、购买瑞士毕业证、购买日本毕业证、购买韩国毕业证、购买新西兰毕业证、购买新加坡毕业证、购买西班牙毕业证、购买马来西亚毕业证等。包括了本科毕业证,硕士毕业证。
如果您在英、加、美、澳、欧洲等留学过程中或回国后:
1、在校期间因各种原因未能顺利毕业《UBC成绩单工艺详解》【Q/WeChat:1954292140】《Buy The University of British Columbia Transcript快速办理不列颠哥伦比亚大学教育部学历认证书毕业文凭证书》,拿不到官方毕业证;
2、面对父母的压力,希望尽快拿到;
3、不清楚认证流程以及材料该如何准备;
4、回国时间很长,忘记办理;
5、回国马上就要找工作《正式成绩单不列颠哥伦比亚大学真实可查学历认证》【q薇1954292140】《毕业证购买UBC成绩单温感光标》办给用人单位看;
6、企事业单位必须要求办理的;
7、需要报考公务员、购买免税车、落转户口、申请留学生创业基金。
加拿大文凭不列颠哥伦比亚大学成绩单,UBC毕业证【q薇1954292140】办理加拿大不列颠哥伦比亚大学毕业证(UBC毕业证书)【q薇1954292140】毕业证书不见了怎么办不列颠哥伦比亚大学offer/学位证哪里可以办在线制作本科文凭、留信官方学历认证(永久存档真实可查)采用学校原版纸张、特殊工艺完全按照原版一比一制作。帮你解决不列颠哥伦比亚大学学历学位认证难题。
加拿大文凭购买,加拿大文凭定制,加拿大文凭补办。专业在线定制加拿大大学文凭,定做加拿大本科文凭,【q薇1954292140】复制加拿大The University of British Columbia completion letter。在线快速补办加拿大本科毕业证、硕士文凭证书,购买加拿大学位证、不列颠哥伦比亚大学Offer,加拿大大学文凭在线购买。高仿真还原加拿大文凭证书和外壳,定制加拿大不列颠哥伦比亚大学成绩单和信封。复刻一套文凭多少米UBC毕业证【q薇1954292140】办理加拿大不列颠哥伦比亚大学毕业证(UBC毕业证书)【q薇1954292140】毕业证书影本不列颠哥伦比亚大学offer/学位证定制学历文凭、留信官方学历认证(永久存档真实可查)采用学校原版纸张、特殊工艺完全按照原版一比一制作。帮你解决不列颠哥伦比亚大学学历学位认证难题。
特殊原因导致无法毕业,也可以联系我们帮您办理相关材料:
1:在不列颠哥伦比亚大学挂科了,不想读了,成绩不理想怎么办???
2:打算回国了,找工作的时候,需要提供认证《UBC成绩单购买办理不列颠哥伦比亚大学毕业证书范本》【Q/WeChat:1954292140】Buy The University of British Columbia Diploma《正式成绩单论文没过》有文凭却得不到认证。又该怎么办???加拿大毕业证购买,加拿大文凭购买,
3:回国了找工作没有不列颠哥伦比亚大学文凭怎么办?有本科却要求硕士又怎么办?
帮您解决在加拿大不列颠哥伦比亚大学未毕业难题(The University of British Columbia)文凭购买、毕业证购买、大学文凭购买、大学毕业证购买、买文凭、日韩文凭、英国大学文凭、美国大学文凭、澳洲大学文凭、加拿大大学文凭(q薇1954292140)新加坡大学文凭、新西兰大学文凭、爱尔兰文凭、西班牙文凭、德国文凭、教育部认证,买毕业证,毕业证购买,买大学文凭,购买日韩毕业证、英国大学毕业证、美国大学毕业证、澳洲大学毕业证、加拿大大学毕业证(q薇1954292140)新加坡大学毕业证、新西兰大学毕业证、爱尔兰毕业证、西班牙毕业证、德国毕业证,回国证明,留信网认证,留信认证办理,学历认证。从而完成就业。
主营项目:
1、真实教育部国外学历学位认证《加拿大毕业文凭证书快速办理不列颠哥伦比亚大学学位证书购买》【q薇1954292140】《论文没过不列颠哥伦比亚大学正式成绩单》,教育部存档,教育部留服网站100%可查.
2、办理UBC毕业证,改成绩单《UBC毕业证明办理不列颠哥伦比亚大学在线办理文凭》【Q/WeChat:1954292140】Buy The University of British Columbia Certificates《正式成绩单论文没过》,不列颠哥伦比亚大学Offer、在读证明、学生卡、信封、证明信等全套材料,从防伪到印刷,从水印到钢印烫金,高精仿度跟学校原版100%相同.
3、真实使馆认证(即留学人员回国证明),使馆存档可通过大使馆查询确认.
4、留信网认证,国家专业人才认证中心颁发入库证书,留信网存档可查.
《不列颠哥伦比亚大学文凭在线制作加拿大毕业证书办理UBC毕业证和学位证的区别》【q薇1954292140】学位证1:1完美还原海外各大学毕业材料上的工艺:水印,阴影底纹,钢印LOGO烫金烫银,LOGO烫金烫银复合重叠。文字图案浮雕、激光镭射、紫外荧光、温感、复印防伪等防伪工艺。
【q薇1954292140】办理不列颠哥伦比亚大学毕业证(UBC毕业证书)办密封成绩单申请学校【q薇1954292140】不列颠哥伦比亚大学offer/学位证、留信官方学历认证(永久存档真实可查)采用学校原版纸张、特殊工艺完全按照原版一比一制作加拿大不列颠哥伦比亚大学毕业证(UBC毕业证书)成绩单影本
留信认证的作用:
1. 身份认证:留信认证可以证明你的留学经历是真实的,且你获得的学历或学位是正规且经过认证的。这对于一些用人单位来说,尤其是对留学经历有高度要求的公司(如跨国公司或国内高端公司),这是非常重要的一个凭证。
专业评定:留信认证不仅认证你的学位证书,还会对你的所学专业进行评定。这有助于展示你的学术背景,特别是对于国内公司而言,能够清楚了解你所学专业的水平和价值。
国家人才库入库:认证后,你的信息将被纳入国家人才库,并且可以在国家人才网等平台上展示,供包括500强公司等大型公司挑选和聘用人才。这对于回国找工作特别是进入大公司,具有非常积极的作用。
Buy Jumbo UPS in India – Microtek’s Powerful & Reliable Solutionsmicrotekindia00
?
Looking for a strong and reliable UPS for big power needs? Microtek offers the best Jumbo UPS in India. Perfect for homes, offices, and industries, it gives long backup and protects your devices.
Microtek Home UPS – Best Power Backup Solutions in Indiamicrotekindia00
?
Microtek provides top-quality Home UPS in India, keeping your home powered during outages. With advanced technology and reliable performance, Microtek Home UPS ensures a smooth power supply for all your needs.
Read More:https://www.microtek.in/product/power-backup-solutions/home-inverters
Most Trusted Home Automation Company in India- Jasmine Smart Homessanskar01021985
?
Jasmine Smart Homes specializes in providing state-of-the-art smart home solutions that enhance comfort, security, and energy efficiency. Our products include smart lighting systems, automated thermostats, security cameras, and a virtual home assistant for seamless control of your home environment.
https://jasminesmarthomes.com/
https://pcpronew.com/dn/
Imagine transforming your workflow with a tool designed for unmatched office crack download excellence and robust crack office 365 ..
Microsoft Office 365 Crack Latest Version 2025?crackstore786
?
https://crackedtech.net/after-verification-click-go-to-download-page/
Microsoft 365 (Office) is a powerful application designed to centralize all of your commonly used Office and Microsoft 365 applications in one ...
Microsoft Office 365 Crack Latest Version 2025?crackstore786
?
Cyber Sequrity.pptx is life of cyber security
1. What is Cyber Security?
? The technique of protecting internet-connected systems such as
computers, servers, mobile devices, electronic systems,
networks, and data from malicious attacks is known as
cybersecurity
2. Cyber security Fundamentals
i.e. CIA
? Confidentiality: Confidentiality is about preventing the disclosure of data to
unauthorized parties.
It includes:
? Data encryption
? Two-factor authentication
? Biometric verification
? Security tokens
3. Cyber security Fundamentals
Integrity:
Integrity refers to protecting information from being modified by unauthorized
parties. It includes:
? Cryptographic checksums
? Using file permissions
? Uninterrupted power supplies
? Data backups
Availability:
Availability is making sure that authorized parties are able to access the information
when needed.
It includes:
? Backing up data to external drives
? Implementing firewalls
? Having backup power supplies
? Data redundancy
4. Types of Cyber Security
? Network Security: It involves implementing the hardware and software
to secure a computer network from unauthorized access. This security
helps an organization to protect its assets against external and internal
threats.
? Application Security: It involves protecting the software and devices
from unwanted threats. This protection can be done by constantly
updating the apps to ensure they are secure from attacks.
? Information or Data Security: It involves implementing a strong data
storage mechanism to maintain the integrity and privacy of data, both in
storage and in transit.
? Identity management: It deals with the procedure for determining the
level of access that each individual has within an organization.
? Operational Security: It involves processing and making decisions on
handling and securing data assets.
5. Types of Cyber Security
? Mobile Security: It involves securing the organizational and personal data
stored on mobile devices such as cell phones, computers, tablets, and other
similar devices against various malicious threats. These threats are
unauthorized access, device loss or theft, malware, etc.
? Cloud Security: It involves in protecting the information stored in the digital
environment or cloud architectures for the organization. It uses various cloud
service providers such as AWS, Azure, Google, etc., to ensure security
against multiple threats.
? Disaster Recovery and Business Continuity Planning: It deals with the
processes, monitoring, alerts, and plans to how an organization responds
when any malicious activity is causing the loss of operations or data. Its
policies dictate resuming the lost operations after any disaster happens to the
same operating capacity as before the event.
? User Education: It deals with the processes, monitoring, alerts, and plans to
how an organization responds when any malicious activity is causing the loss
of operations or data. Its policies dictate resuming the lost operations after
any disaster happens to the same operating capacity as before the event.
6. Types of Cyber Security Threats:
A threat in cybersecurity is a malicious activity by an individual or
organization to corrupt or steal data, gain access to a network, or disrupts
digital life in general.
7. Malware
Malware means malicious software which is used by the cybercriminal or
hacker to damage a user's system.
? Virus: It is a malicious piece of code that spreads from one device to
another. It can clean files and spreads throughout a computer system,
infecting files, stoles information, or damage device.
? Spyware: It is a software that secretly records information about user
activities on their system. For example, spyware could capture credit
card details.
? Trojans: It is a type of malware or code that appears as legitimate(valid)
software or file to fool us into downloading and running. Its primary
purpose is to corrupt or steal data from our device or do other harmful
activities on our network.
? Worms: It is a piece of software that spreads copies of itself from device
to device without human interaction.
? Botnets: It enables cybercriminals to get credentials leaks,
unauthorized access, and data theft without the user's permission.
8. .
? Phishing
? Phishing is a type of cybercrime in which a sender seems to come from
a genuine organization like financial institutions. They contact a target
or targets via email, phone, or text message with a link to persuade them
to click on that links. This link will redirect them to fraudulent websites to
provide sensitive data such as personal information, usernames, and
passwords. Clicking on the link will also install malware on the target
devices that allow hackers to control devices remotely.
? Man-in-the-middle (MITM) attack
? The main objective of this type of attack is to gain access to our business
or customer data. For example, a cybercriminal could intercept data
passing between the target device and the network on an unprotected
Wi-Fi network.
? Distributed denial of service (DDoS)
? It is a type of cyber threat where the requests come from several IP
addresses that can make the system unusable, overload their servers,
slowing down significantly or temporarily taking them offline, or
9. .
? Brute Force
? A brute force attack is a cryptographic hack that uses a trial-and-error
method to guess all possible combinations until the correct information is
discovered.
? SQL Injection (SQLI)
? Once the attack is successful, the malicious actor can view, change, or
delete sensitive company data, user lists, or private customer details
stored in the SQL database.
? Domain Name System (DNS) attack
? It is a severe cybersecurity risk because the DNS system is an essential
element of the internet infrastructure.
10. SECURITY VULNERABILITIES, THREATS AND ATTACKS
Categories of vulnerabilities
? Corrupted (Loss of integrity)
? Leaky (Loss of confidentiality)
? Unavailable or very slow (Loss of availability)
Threats represent potential security harm to an asset when vulnerabilities are
exploited
Attacks are threats that have been carried out
? Passive – Make use of information from the system without affecting system
resources
? Active – Alter system resources or affect operation
? Insider – Initiated by an entity inside the organization
? Outsider – Initiated from outside the perimeter
11. Cyber Safety Tips
? Conduct cybersecurity training and awareness
? Update software and operating system
? Use anti-virus software
? Perform periodic security reviews
? Use strong passwords
? Do not open email attachments from unknown senders
? Avoid using unsecured Wi-Fi networks in public places
? Backup data
12. Security Policies
? : Security policies are a formal set of rules which is issued by an organization
to ensure that the user who are authorized to access company technology and
information assets comply with rules and guidelines related to the security of
information. A security policy also considered to be a "living document" which
means that the document is never finished, but it is continuously updated as
requirements of the technology and employee changes. We use security
policies to manage our network security. Most types of security policies are
automatically created during the installation. We can also customize policies
to suit our specific environment. Need of Security policies1) It increases
efficiency. 2) It upholds discipline and accountability 3) It can make or break a
business deal 4) It helps to educate employees on security literacy
13. REGULATIONS
? There are five predominant laws to cover when it comes to cybersecurity: Information Technology
Act, 2000 The Indian cyber laws are governed by the Information Technology Act, penned down back
in 2000. The principal impetus of this Act is to offer reliable legal inclusiveness to eCommerce,
facilitating registration of real-time records with the Government. But with the cyber attackers
getting sneakier, topped by the human tendency to misuse technology, a series of amendments
followed. The ITA, enacted by the Parliament of India, highlights the grievous punishments and
penalties safeguarding the e-governance, e-banking, and e-commerce sectors. Now, the scope of ITA
has been enhanced to encompass all the latest communication devices. The IT Act is the salient one,
guiding the entire Indian legislation to govern cybercrimes rigorously:
? Section 43 - Applicable to people who damage the computer systems without permission from the
owner. The owner can fully claim compensation for the entire damage in such cases.
? Section 66 - Applicable in case a person is found to dishonestly or fraudulently committing any act
referred to in section 43. The imprisonment term in such instances can mount up to three years or a
fine of up to Rs. 5 lakh.
? Section 66B - Incorporates the punishments for fraudulently receiving stolen communication devices
or computers, which confirms a probable three years imprisonment. This term can also be topped by
Rs. 1 lakh fine, depending upon the severity.
? Section 66C - This section scrutinizes the identity thefts related to imposter digital signatures,
hacking passwords, or other distinctive identification features. If proven guilty, imprisonment of
three years might also be backed by Rs.1 lakh fine.
14. REGULATIONS
? Section 66 D - This section was inserted on-demand, focusing on punishing cheaters doing impersonation using
computer resources.
? Indian Penal Code (IPC) 1980 Identity thefts and associated cyber frauds are embodied in the Indian Penal
Code (IPC), 1860 - invoked along with the Information Technology Act of 2000.
? The primary relevant section of the IPC covers cyber frauds: Forgery (Section 464)
? Forgery pre-planned for cheating (Section 468)
? False documentation (Section 465)
? Presenting a forged document as genuine (Section 471)
? Reputation damage (Section 469)
? Companies Act of 2013
? The corporate stakeholders refer to the Companies Act of 2013 as the legal obligation necessary for the
refinement of daily operations. The directives of this Act cements all the required techno-legal compliances,
putting the less compliant companies in a legal fix.
? The Companies Act 2013 vested powers in the hands of the SFIO (Serious Frauds Investigation Office) to
prosecute Indian companies and their directors. Also, post the notification of the Companies Inspection,
Investment, and Inquiry Rules, 2014, SFIOs has become even more proactive and stern in this regard. The
legislature ensured that all the regulatory compliances are well-covered, including cyber forensics, e-discovery,
and cybersecurity diligence. The Companies (Management and Administration) Rules, 2014 prescribes strict
guidelines confirming the cybersecurity obligations and responsibilities upon the company directors and
leaders.