0% found this document useful (0 votes)
100 views29 pages

Cyber Security - Notes 17-Apr-2022

Project

Uploaded by

Prabhakar Reddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
100 views29 pages

Cyber Security - Notes 17-Apr-2022

Project

Uploaded by

Prabhakar Reddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 29
1 Inttoduction bo Cyber Securit Cyber Security Gate gausd : (pit bon outl view OF Cyber COMNEKY, \ntev ret Governance, epallerge® ard Constraints ) Cyber threoks , Cyber Waxfor we! crime , cxyper tertonern , cyber ALspinag , reed a fot you secu ity policy need for Nodal authority, , ped FO" international convention 09 Cyber pace. sale cawnity Gafe d © ostess conti , qudit qurbenticoXiOn biometrics, cryptography, deception jeniol of usveys pilters, ethical hocking’, Fire wo, varrvsion adeveckion SPIER, threo FPOTAge rent, system aaministtabfon, oper apepe M4 Bien abet coh doko , week autretication, UNPIO ered” broad band connection P00" cyber seouni by awarTze’. nik 2: Seung web application, gervices and eervers » . / Basie cecsity f°! TIP applications and ceniices \e : j y oop gerviees, identity bosic hoe 4 gervices 5 authorization patierns, mand D . and crallergec. detection and prevention it thorized \ wept abuse oF previliges, unaut hon me mF side rnaluoe infection, Intrusion and prevertion ye chniqyues anti-malware geste § \P system , Netan, Neg iby yalidation: Qnik- 3 \nttus on; orcess b deleckion Sopbusoser types of ID & Cession analyeis syotem wn ne ceeene 5 Unit & Cryptodiaphy { Network Secu) by introduction _ to cryptography , Eypee OF APOE phy Semetric key, » ase noet tic Key, reesage autthenticaion code 1 digital signatures , appicalion~ of Creyptagr phy, Overview 0 of File walls, bypes OF ‘Firewalls, cecurit Protocole at application laye t, Hangpart lower, pekwork ‘oer PGP, S- me thi ; Unit-* (ybe Space | g Law & , Cyber Forenise, ¢ ce ity Ye ual yba quit 9 one’ tole OF Internaf?, Low, Cyber seuusiy Stoncloids, The Indian ee Space, Natonal ey ber security Policy mor! Olding), predin nu nore y nw H estictttion Cor 7 so vb - oll ee an’ gin, r WwesHouky np ‘informa ki 0 ) hid RY . a ee er akg Sonos 1, Ha in e ie . es NG qvoview_oF Taber Seauiiy 4 Definition ‘ Cyber Security ‘can be divided ints two parte - Cyber and aber '6 searity Cyber vefas ro the Yedhnology that Indludes systems, nebuworks, progvamns and “data. Ceauity is teated to the probection of ayskms, perworhs, applications ard information + Cydel seuity ie the application oF techno logiiec, ‘ovessee and control Tor protect the sqétems, pet woth, pros Tanne, devices and dara Som cuber aiatks. The Main aim of uyrer. Seantty to redute the rie’ rom cyber attatks and. -proteck aginst uongu.thorreed ‘brplolxation’ oF Systern, : networks and techndlegies: WOES cpare = tm orkonce of ‘Oyen Geourtly. a . Today we live ino digital ea where ‘oll aspects OF OW Vives depend on ous network, ©” cornpusa other electronic devices. » software applications - AW citical Infrastruckure, Guth ds banking’ Systeme, health core, Financial Institutions, Sovernance and manupadwing: industries Uses devices tha OF connected to! intereh Ob cy, tore past oF Her operations. Gore of thei! Inforrvakion “Guth | b> ‘cinandal, daka and peisonal sengtive For unauthorixed access data can be & : that coud hove %& negative, conseg uence. Typee OF Cyber Seauriby [/chatlenges In. Oy ber. Seay * eat ; ; Everq organisation assets are the Combincatig, OF uaniehy of different SyGleme. “hese 6qcleme Howe ar stong) cybe seuarity apprdadh that Vequites w-otdinated efforts ree ae tee Sysiers. i We can cakesorixe cupber ceeutity, based on — dipferent domains “Hike 19! iz ' ie \s Netwoik 6 seauity 7 WW involves Triplementingn hard way a Software _ fo Geue a Cornpuer network From d helps, on authorixakion | to — ynauthorized acress an — protect te ances Against internal and” externa) ie damarelit aeeoied protecting the Gofhware and — devices From unwanted ‘tpreats! Yhis profection, can he dong. constantly “Updatingy the, opps 40 encwe ~ Epey . Ue: gecuied frofe ORES i — 3 logartation 3taaba, been \E Trwalves Iniplenoentfinar ay perea) Strong” matntatn the re and ; r = dake sroroge Mechanism to a Votes rei ty and patrey® ae b _ 4 \dent ity management: 7 © th deals With «the pee ae Foe — gexermining”,. he level of arcess that each Yd ide hos within: an aifaniedtion. - 5+ Mobile Seourity ty invalves Be auihg the organicakional and persone data erred on reabile deyices 4 inst yartous Malicious : . of” cupporixed — ALCes ous Uno « Thees ihleate ie OO eS , derite logit ors thiert a? 6 dowd seeurlty ' — in protecing the inforrpakion in the Oigital emironrnent for the gre? et . eigameabon Ib Uses NOTOUS cloud conti, providers gdh a2 OE googie eke FO enoure Geauitty aguinst muti ple Threatea-.,, f Operational) Gecurity: - \es proceasing and maXing’ \y invo on handling and senting’ data ousers: ders od Fundamental J cin scobele: ~ » con Fidentia Hy cla. , wrod cope _L = Med Weep . Availability Te main objacHve of cayber cecuritey 18 bo erste, gain “protection “1% cecut! bY community briangle oF 6 related prindpleé to protect the: dad from “eyber giack& called Ctr modes ov CIA iad: ape cin model is decignntd to guide polf des for wn oigariodH0ne Informa on co arity | inflashudwe. cay rand DOP & porte called confidentially integti ty auaibi ty Wlhew ang seeutily, breach are found one ov « Mow —o} the prind pits a} these has been violated. Gow jidenti aki ty) WW ve equilent to privacy that avald, Lanandhorl Red) dUheoe ‘Of Vnpdvrneation « I hea © trying to keep the identity of ‘Guthorl ded pereon who j in lear tner sand balding doko, privabe and v ) ALHAMIWAS ‘ volves fees a) Data Encryption bd Two Shep auttenticatlon cy Wiomebvic Verification Inbeovity sis vt Aon ~ ‘So ira a \t vefeis protecting information From belng modified by unautloatl xed, parties . This principe mses . Sle ay’ 4 ey that the data ie authentic acculdhe ard! daifé" culated by atnauthori xed modifieatton « 6 ce ee) Cry tographic che b) File permissions ¢) Data’ backups: ' Avalobiity 5 a Ayoilability IG raking sue that authored VBR Que able to teers Ebe informaon eben deeded eS a ere “ Ex" '0) Doo Rédundaney -° wt : BD Pekin up Mae ip ' * 0 Up data to encker ; me) Veripletne itp Firewals " gos vitere, , abouk tqpes of tuyber attacks: Ce ab ovck’ 19° On yet expl CH and networks Cae cyt? eee ea rmaligiouws tore 0 er Comp er COre, logre data udhiidn leads. 1g Oe cine ouch Ob Information thie ft cind era ae : , atta cks con be dividend into 2 cakebrie, in yee a This the attack which occu 09 welsite vatt bn The: coltowing are the gore wpe appli or “eb ‘paved 3 detache’ a O s oe Iniecklon tides: ia ome date’ will be So SS Ir is a akack ip yohich ‘S rection +0 mnaruplate vite geen 8 perch ete ‘nppormabion oa DNS Spore DNS Epeoring ip igo type compute! seuntidy poking? © dota io jntroduced voto oF Drs! “wane capture whe Damme OF saver ( TP oddiecs) atlacks can go on for \ mei apont me dur being detected a org. | yer ribs cur, ieoules caces , and esi? “ sacking TE cea ity atic on a "weer cppoton ovet my o ctedl rework: Web applica. to store the gtate ons croate cpokies and weer Sesoions Lo ee By stealing the Cookies an attacker can Dave access to all of the user data 04+ Phishing attack “! . It ig ao type oF attack which abt ‘Yo. satyo information Ke Wesel, etal on aes rete {rE occurs When ay, atlacker ig masquerading ob a Hust Worthy entity : on Brote Force attack ‘tte a bape of ;akback;, which” uses a ae Or ertot mMekhed thicr athack Gererakes a op ho: OF Pusses ang vakidates thers, ‘be obtain -ockual dota . ifr y og: Derial of Gerwhee. . te ig dn afiacR whith mean to Moke corvey oF network Fesowce unavailable “tor the users oH, Bigtlondikey Mate “Wis, Lape Of aktack Stored tne list commonly Used parowords’ and validaie thers to ger ovig to) poxrsword. it iu 06: URL llerpretalion 9, it ts o type sot oMack usbere we ean. change the witain part OF URL ahd one ‘wan make a web GUVer’ bo deiner yo 4 be ie woe alttorixed yas es Pe wee ‘ty ot y vor ID tbe _middle_altack apes type OF Otlack allows an attacker to tie COnDECHON between client and perver aiid ayiarect ee bridge th between trem: ath _y syekem 2 Aflac These ate the athacks wobich ae interdoyd » compromise a Conmpwer or } Connpeide net tooth. » Vitus ~ Vital , Information Resource tinder Stege I ig a *YPe oF malidous softwure prograno that epiead throughout - Cornpuder files without howled. of a Veer Ie. 1S O SOE Jeplécating malicious computer PrETOM thak replicates Sy Inge Engr copies nko Your compuser program. bo" Trojan Horse it io ca malidow program thak occule urespicted changes 40 computer setinge and) pues! activities. It appease +0 be a nottnal. application bu toben opened and erousted G0"e malicious COVE con tun in the background 0% Bats Te ae: & method oi process Woot Inlerodks Uith the other network services “Me bok Progvauy) Fung uohile others: onlty ence ate -coramnarde AutornakicouUley When ther yecbive eect mp Of Bak doors hs io o method "Yok byes tie Forval Suthetication proces? _— ah Worn : >» Ik ie a type OF ralware - pvimqug | fauion 6 FO" replicate THANE PP to uninfected compubels: Ve ltd Vike Sides mgil Bhachroents that Reet WN WOse om @ mate FA ae Fy ero a trusted , genkers:,. a + Benefits of Cuber uusity 4+ Business probe dion against cyber Aatl< ar) dota breaches: ‘ >. Protetfion’ For data and ipekiorks |" 23. Preventios’ of unduthorixed arcess 04. trprove ‘recovery. time: after” dakar breach. - Of: Proledion for ord: User § ‘end’ point devices” 06. Improved “ConFidepce 1" the Companies reputation and rusk For deweloperc, ernployerc _ Pfogrammers , Customers, users eke! * + Cybex Tnéats Definition srtnn N threat in a uy ber Security eae a modhidous adkivity by “an Individual oF ordantcation “Fo Crrupk or clea data, ain cusene $6 a PebtHOrk oF oerupts Aigvtal life in gererols Threake CON be caleforized al? Graumetances that coneprises CA, ed Ss an acset: aa a nor Cybet thteaks Me Geasrity Incidents, usith the porentio! to have Nedathve ontcorne for Your a ret work or Other: “management systins, threak rep recent potential : canity harms 49. an 966 woe have been caitied out the Follouilag Noha wales ail flee if Passive Tr make use Of infor mation frorn the gem without affecting Sysiern Tegources. — AGANe Age ir aliers opie ‘Yegousces g- Insider ‘ —Tntioked by an et inde’ the organieation he Outside! Tatas by an entity auketde, 1 organisation “fhe Fonswing? agra dye OF cyber nae : the class “fication [eyber ‘cpieage [oqbar tiveads | | Jegbe upoufate | __4 | cyber "Jerroriem™ | fi b Cube Jeworigno ‘hy Cimple tungtrackured threat o. Aditanted Structured “threat 3. Complex (0+oldindalkd — threat 2. Gy ber Crime \ ‘tacking » 2» boftovue Piracy 8+ .OpooFing’, and Phishing. ae Cyber Wlaifare : 1 Economie. Diobt Aption 2+ Ouiprice Cyber attack 3! Propaiands 4 Electical Tower Giéde Pr DOG (Ding! of Service’) 4s Cuba Espionage —Wihtabettle thle, 2* Zero doy emplodies j 3 Inoide actors | Insider odlack > Advance qu cicknt Wie fk In\rite a Shot hole on Cyber latfare Cyber watfore involves‘ Yhevdction ov GETS of attacks by a ndkion | erate OF Inlernakional fuclore bo atta Os or attempt taanmngs 01 destroying astruckwe Of hation'e | Computer 04 informnabign jenn through vorlous Cyber adarks. cyper warfare uyuady Aefines aw a tor crime ottocks that taigep, inf oye SOL os nf thaltani .. yi nk nati one Dporm w oye aed ere. Th wir come of ty et WO. Fat ue ct ac ke 0 - ra Esplonace 5 Ik refers to moinkoring ot spying - to Steal their oh anothe count '€S ; : Seaets. \h Cyber warfale thic attacks jo compdomises Eensitive computer 54° on pefore extracting sensitive Information Government orcanisation must determine information and the risk ig it ig Compiom wed 0. cee on cabot ace can be Used for Many reasons ranging Erom > sienple disturbance oF government service to enkrauton and spying oenerate "FO depnonds for, vy . : by enemy gover pment 3+ Qpeviah_or_ service aliac Dos attack. prevenr usrs from P ‘ oe aceessing website by Flocdings it. with a Futh og fhe uxbsile te handle the request attacks We 10 distub the fems and block tO Attess d others Yequeck Pan ford Tepam mails) “These "YP of aitica) operalions the aye gensitive ‘infor makion by GEL ZEPS on 4s Propaganda. attack vk atenapts to contro) minds and thouohks of people living jn of Fighting for a tower Coe scent Propadunde can be used im eqcposed embarassing Hhougnt opreacs lies to make people loss trust on there country - - Economic _diotiibul ubfon, Economie ae qe perated by cwmpaicts atackers can tarde! that comp! wlers of 1 onotaic echnlatighment gudh a6 GFORS Faiket, pay rent system and banks to Steal money funds People for accessing Funds they needed S- Lorprised attack These ue the cyber equalent of atlack, ; Ih or Bloc re Qn on mumbai the point io cartied a massive atlads that He enemy is DoF ectpected, enabli oP 4 atlackers fO Weaken their defences h T Reaiical Power Grid. Attacking the power grid allows atlay | to disable critical system, distrapr infrastrucury and potentially result io death causes ap \Wlrite a short note on Cyber Grime. Cyber aime is ako refed as Computer cing ase of coompule an naiyemens Futana) ends Sach commenting. Frauds intellectual Pidperriy, Stealing idenbties, voilobing polides, bra fFidog ip Child ° pronogvaphy + The vere — ayber rine iC used to destiibe a unlawful athivity in which cornputine devices Guth a laptops, sroark phones , persona} ° digital assistance jetc. whic are stands alone as a past OF nekwork used Ab O too! Fo. attacking on inforreation systems. Cyber Cima 16a findnd ackvity | thot Forget either & Computer of computer betworkigg, devices cornmitted by cyber crienindd or hackers who wants bo make qvllck and easy mony. “The Following are the toa main types of cyber animes: Ole Criminad) activity that barge ts Computer which Involves Malwates: oo- Giminal activity that wes computes. To uwrmmt other ofme the attacker uses the ile ki to Spread ao 0 Spier WUWAlES, je emp Plead matwaes, illegal infotmation ar WME . > Classification OF: Cyber ‘Gine. \+ Insider atlack \ Ab atta ck : to the network 01 to the computer System by GOme person with author! zed sygiem access 1S known ab an insider attack tis eves aly peraimed by unhappy | dissatisfied emplocpes ar wsere Ene Motive @ a. insider attack coud be revere n is comparatively easy for an insider to perform a ? he 1 well avowre. of’ policies process cube atin Ck 8 i : : oprastractu'e and infortation system. More over the att Crets haye attess to the network 2. Exkana) octhack. aes When the attacker is hited by an ingider or external entity to the orwanisction is knovon as external ic a victim oF cyber atiack atta. uk The organisation which i net only faces but alss the |0s9 of 1epuiation,. 3 Unctractwed attack: “These attacks are generally pesporrned by pumakeres tives to peuforn ‘the no do not have any ye-deprred nwo ae if Yo teat a tool which I cyber akkack they just a gaini able over the inkesnet: g structured _adtack (pei ‘e These type of attacks axe performed by bigh Skilled ond ex porinted pereons and motives of this atlacks Ceat jp their Minds - They have access 10 otis Sofigticated a od technologies bo onin atcess tO other net cuorks without beta notice ' be thei Syston. {nudes monitarg climes and’ as ewet) av Gime wlth reccutts in de merge per ex me cee 0N- monte Yo person, Computers or governments Y le Child Prongoraphy ( child sexsually Abusive “+ Method i i / to magkertal Ol Taimen setuad images Ty ang form Of @ child “tito 16" absérd: 64 B af the if act Gtales that it % publishing a} Transmitting of “ in the seaually explie CoAM yefels Under se a punishable for mateial depicting? GUte = 2+ Cybe rloomin Lyber_ grooming. Cyber grooming relationenip wlth another perso oy ber inte doing a children is when a person build an n ard bricks or Sexual ack: online pressure hin 3: Online_job F104 i Saline 0b Fraud ig attempt +o defraud the ment by Sving Online \ compe who ae in need of employ a ae rope oF Promise of & beter employnmn ro : My bsgudes gd : ‘ : ae a Niching_ fraudster try bo ie ig an abtempr where See pusona) infor mation through & Coll phone 5. Smishin oe type of Frauds, Hhak uses mobile ck the \ittims? ipFe message to atlia plone year J oh i back oO” Fradulent phone number \ight ro a i Jeonoading voalicions fadwert websites or AON oadi ng ow | : atains ee y vt credit Crad frond - Ve anes The oukTarixed use of anokhes vrpormatien for te purpose ol cord deta! * te : ad a9 Funds from it Udt _ > Reasons {or Cyber Crime h 1 Money People ale ‘motivated Your de comm ling Cay ber giiack *9 Ho, Make “sq wich and eqs monty: 2° Reve Ov Sone People Vig Vo lake levende with olber gon Ole Serie by de vay ite Yeputab ion 1K y Ol physical loss ; g- Fun. The anmateuus 40 Uyber clime for fun. ' gs Amory my Many ; Limes The anonyonity aut au bet Space ‘motivate the pereon ko Vomit fy RY crime ows oo it \6 ae me it 6 consideued as mide if siitndcd’ hark he highly eweuted mebwork like ; phd on ’ 7 Se Cgber terianiem # [Alte a Short nok ov Cyber terroriem: HF can’ be explained ab pd Jolernek ferro vem tHe also defined o§ intentional A OF computer, network and public interntky cause distraction and Haren, for personal objectives SS Cakeooties of ber evfoitem: 1. Ungtractired simple ct — atacke “Includtog te consists oF “basic toals that aie hocking of Mdividual syst using’ <= al) leas ae by Others. o oY 2° Advance | shuthured Be They ove wore sophisicaked WACK. > Tolved otha cking ] hacking noulti ple Sysiems One} nekusor ks 7 = a Comples_/ f-ordinated “These are co-ordinated atincks that can howe 9 lowe Scale oF inmpack and make Use of a Sophie ictbed tools. # Vite a Short role Go Cyber Tensrist. Cybe teforist Te a Uimingl Whe - ice compuky Aedhndlagy and internet eperially 0 couse detruplion oF information. > Meth of (gba Terroisy Ano, » Phusical adhoc. 1 areomplished by use oF conventional vxapone +0 destroy { Injure Commputets ond their tami pass. Ex'~Tranemesion Unes. 2+ Electronic okio.oK. OMNI The Use oF power of ee eeta— magnetic ereigiy’ * or Pluses to over load coraputer CEroutany , Exc~ Nip Voltgse.. - 3+ Gompule_wetwork vaitace , °°”! . fin aac: uses Slolen inforthalon ty erter into a Nehtiched “eompule Aeli 7 take on advantage F cof tiyare ’ yetem ie ‘ (oy f Ware AKaRness. > hu y+ Volk for cyber lertatigrn- ; }, Viras - A © ia : rapuker virus Ic a program votiten yo enter Tato a Computer and damage ] apser / repdcate oul data files. ii. Worms. They aie malicious ptograms thak rakes copy of themself again and again on \ocal Arive, nerWworks , etc- iw Trojan _harse wit te & digttackl ve It le not a Virus yoorarm that looks like a genuine application: rien horee Opens & back door entrg be Your yohies gives malicious Program aKcece a) and personal compute J suystern Blowing confidenti % \nausion —— . TA oe ese types of ablacks Gre Cortied oct uith te pupae of Suining? tees oF penakrating? Into Compute systems and rerworks to gek or modify information. ¥ Distraction Tic orgthod of atlack ts cused fo ‘intrued into Computer system and networks with the main pulpose of ingleckingy severe damage ° destroying them % Dig information. “hes Pale method ic used tO Spread rumors or infor matton that can hove o& Severe impact toa parca targek- » —_—e % Defacement of Inlebsites, 9 oO - Vis type of dtlach jc baoeled to deg g Vhe ebsites “Op bbe VvicHnnsy The websites can either be changed co maplete hy * +o Include Me ssa from ey be Lertorich« oe / aS * falvite a Short note 9b Cyber. Espionage. The Cyber eepionage te ‘an ahack: oF cube, In which an authorized Usel atkrnpt to aececs Cancitie, classified , Jniellectua) prope! Fy data Fo economic Sain cormperitive: advantage, 2! political TRONS : Ney V “the goo) js ‘“Eypicallt} +o acquire intellectual propalty rot Foyerpment Gecer tes AlACKS, can be! motivated by prot oF greed ancl” canbe used. iy Conjunuion with a rill Forrey ‘operations OF, Ob a ack OF terrontm, aa —> Cyber Esplaraee reasons] targets. (Research § peveloproent data and activity “a. Militorg — Intelegenoy 3+ Academic research data Lys Intellectual properties Golaries & other Seneitive 4rF ormadion organisational finances 6. elent or customers Nick and parynoent Politica) clalegies offikiatides 6 co raneunication, ge. Businese Goals, Elrosegic plane marketing technig ues: w 1 equudiy ghructues > x Inteinck_COVEIManve ard _Uhaljence’s Ie veecis the v1 _. ‘ eet ve vales , policies, standards and practices {hat co-orclinales and share a. tobe cba pee it ts a development ard application, by Boerne ok, private Sectors, emi | society in thelr respective roles lind Shared prioriges, detishon waking Procedures, noise § prgerams thal shapes the. evoluation and Usage of interne » 2003. — 8005 world Guroeit on the ipforraton enditly (WSIS) offically placed the issue of ME vale inieinet Governance on a lornatic agenda's where multiple ackols Involved in the Yovernance of jngernee In duFFREeNF -voays coWled as Internet Governance eogysiem > . ’ WO CAL gy pee by dts _y 9 challencts of Internet Gowetnance. « js The pace and changing nakuie OF ‘tnkexnet 2. The internal Ob part of digitalisakion- 3. The concentabion..0F distal power 4. Digital fio- police, Fs os fe Shoping the digital Fue : 6 the future oF regu.aton st. Musil Loteralisn . « setane MOKIND: 8+ Portidpation 19 geciglone MSIE) to Gyber Seuuity Polides, YY wewity policy ig a forma) cet of Tes. Which ig issued by an organisation to CDEWE tha, ie users who are authorised arcess COntpan technolavice and informatfon apsets with rule ¢ and oridetines which are telaled ko Seuuitty WFO Vn, Cyber Sean ty policies are more spor bant Ie . Cyber attacks, wyber crimes and data breachee an polenicity costiy “Whe uyber seunty policy is g cs df Standased prackiees and procedure Seb ioyp4 to protect oa business network From sy ber ackivity. —7 Need for a Cyber Seaurity Policy, Ve Ab Tncreage: + appicengy, ; 2) 1 uploads upholds discipline “G accountability 3: \t helps to educate employees on Seal ty Wieraey. —7 The Ecope of cyber Sewuily policy An organisation seanity policy descibes the whole organicalions Seutity objectives and its Commitment to information Security, a Susie sewrity Ppolides Fousses on the Tofermoation Seatity policies of particulou Systews. 3B The ‘iscue Specific sunity poltey providee Guideliness for Parador thieate and Catego rises threap threake ~> How to desig o tyber Ceausity pobiay. y Establish password 1equirersents, That io outlines procedures on pascwod eeakion, updation and Storage Wlonitor physical ond finoncia) Process of the projecte ‘induding’ quality oF works: oe Adpinele Uae onl earnponent To NKA toatl aeploy aia parla gerMmees af ocside Agu Ces: © Functione op ICERT Vv Reporting r % Junctions on a ypodal point of report tines all The relotde of Hivlory of Ineidents that occu Yn the lervitory 04 lodia. » >. \dentification: \mit les (he exiglence, delermines the nature oy the Yeldend and ensures the protection of evidence 3: Prevention Analyse ¢ {be ‘patterns of incidents and, Lakes prog’ eccive meaguies bo prevent Future atlacks 4 Recover) piredoA toate yy Nokes Skeps, ‘and _ provides aegistance avdev to tectore boreal © operartfone: he Gortainnent' Controls the ope oF the Incident and tries to minimize the, damage. made to comprtler oystene 6 Eradistion. HE removes avid —netaralise the ceuunse of incident vy » the Need = . A jor any \nlernabional ¢ : Cyber paren s ANVeNMOr on tte 0 y COME . ¢ ‘ \dee 9) Inparpation aud caraimunical May, jeclrnrolag ies Voge thar uth Variety ger mibeat Gi know eee ay Cah Cpe | pate. paticies oe (eaied upriver ool and Waneyrat on He nerd bo Croake giobal fame wos uit and abitigation o} the econo ait Social a to ebsate the effective caper (pate for advance roel Of OM pespre® ; t main Gtads haldeve in the Cyper Epace a “re fom \ Groner neopets gq. Pxte WROees s Acadenie i Cece gq Ail Socielt : Governments - ee “hey Pave eee iceponcibitey fet Cyber apace paicies including cyber security and application of tytel rechndog ro" one governance ghjectivies - There ge }WO pioad eae ee govevomenk have kaker lead “a 5} ein _GOeueny ie pIsaALsolNe and ag g's ene fo 120 ms: fol {development - cay bet opace - an ie sings Je's for X10" ec ornarnc’ be) + Buginesces: itr have soy impact oP how cgovernments how) Ley approach Fovulate cou ya nationallty globally on wybet jeoueS wa _ TH Plays a key role im teceqich @ development; mndvation and he Canceptuaisation of Wroriec * \egudine cyber ames Cardi nel 4 ' pate to give eM a global) j crag Academia indladi ng cyber okills § value throug eduratton bac become mare significant ip Cheah, . . °, oO egsential building blocks Of awareness about cyber Space - + GY} Sodety tt fouiges on, tbe impact of the AUivitiees of governments, businesses § academia 19 Cyber Spare with Q Special -focus on human dinenston . * Cyber Seautty Vulnerability: Definition Cyber. Seuuity in a syskrm thot “Y Vulnerabilities ate Weakness Hes threats Ee oppor tutte, to compritolse assets: All Gysterns have Nulner abilities, Yulnerabitities are pen | because of hardware, coptware and procedural ‘vulnerabilities | 1. Hardwoe Vulnerabilities. tp je a weakness which © Can use tO attack She syskr Hardware bhroagh physi cally oY remo lly p qcledec- Fx. unpalocted Storage , Linercr ypted dewicce, Older Vercia 6f Syskms [devices | | | ee - a» Softwwe Nulnerabilities. A sofkwae elt nu ol happens in d ,, } ., > e ry configuration euch as the execution of seep ol violate the se cut EY poli cys cortware can gen Unverified -uploadle plack of npul uoss. Sl tenon : site Seu ipl Ng : unenciypted dala: validation » 3 Netwotk \ulberabilities. A weakness happens in pete be hardware 01 Software : Ex Unprotected carnmounicaion, malicioas poy teenie riss configured fre wale tral ware & pork which, can Ae Procedural \ulnerabilities- A weakress appens in On organieakion oyerokions) roethods procedure aration procedayej. ” a Password sp Whok Conve’ the Nutlnerability - the different causes oF “the Following ave quiner abi bi Hee: we Comapee Ve WMNUEAKs unintended ance SS 2- Connedivi 4 mine connected devices OF yabi\) ERs - 3. Poot Pasow00d Wana gerrent rear § reused passoordé can \ead preach to Sever - GyekmM: Ane probability mie orf, guration \hnone une from ore Aor} 4+ So tuvare baoy ‘ 7 ' P bane e canden) at) Promammers ‘Can Gane hinve ac Sally : } ry in the 6G t ware. leave an explotiable bug 4 2 5 Unchecked user Inpat If softuome oy G uxbsile assumes dak ayy wpats are Safe. We Mary Tun Akniniended SOL puts IMjection ee 6. People i ; Social engt neering is’ He bigrsest Weak | io the mayor ‘OF rIPanISations SO that human CAN one of the bigwest cance OF; Vulnerab tity. ¥ Internet OH boewatyiy 1 It 4s FON of wate and adaa ‘isare Yan can be Inetalled auto matically On Computers. —— Factors of \ulnevabilities. t+ Existence. . The stake sof Aiitgig, : i. ® 9 orfamcations Geyser, Component Or: oe Cort ea, R. Perec | Poss ibil Vultnes abi tity 3 Eouplaite The Components And the SYSEM can make fu) oF mis usage. tei A TOF gaining of Ak esciNG 40 the ° ° PlograMm™s of a Uce OF | take Ad vantag > Cyber Seanty \Judne abil Hee. Vhese are Vargelled by hathovs or akacker » rove eopocralle compuler Of {ware uiudncrabs libiess MWe Comparter SOF Ewase Vodunet Ab Utiex ave’, \« Cysiew MiIGdonfiauration ysiem miconfigatation § gaps that can bo er ploy ied & Out of dake [ Unpatebed Cof Lwate 3. Missing or URak awhori dation Credentials. 4. Mahidow weida theats, h. Mies ne ot foo! dala encryption - \nter cepring cormmunicakion between the Syee cubs tand Wy Find From the authority: 6 Xero ory Nulnerability » The Vulneraby ity is Known to the backer 61 attacker but mat Known to organication ie ic the rest dangerous attack always monibortng the suelo ie \portanh for Vhie type oF vulnciabrtiog —7 Nubnrrabilities in Software:

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy