0% found this document useful (0 votes)
18 views5 pages

Cyber Security

Uploaded by

Neel Patel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views5 pages

Cyber Security

Uploaded by

Neel Patel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Cyber Security

Introduction

 Overview of Cybersecurity
1. Definition and Importance: Cybersecurity is the practice of
protecting systems, networks, and data from digital attacks,
unauthorized access, or damage. It is crucial because:
 Increasing Threats: With more sophisticated and frequent
cyber-attacks, maintaining security is essential to protect
sensitive information and maintain trust.
 Regulatory Compliance: Many industries are governed by
regulations requiring robust cybersecurity measures.
 Business Continuity: Effective cybersecurity ensures that
business operations are not disrupted by security incidents.
2. Historical Context:
 Early Threats: Early viruses like the Creeper virus (1970s) were
simple and often experimental.
 Modern Threats: Evolved to include ransomware, advanced
persistent threats (APTs), and sophisticated phishing schemes.
 Major Incidents: Highlight notable breaches like the Equifax
breach (2017) or the Solar Winds attack (2020) to show the
evolution and impact of cyber threats.
3. Current Trends and Future Directions:
 AI and Machine Learning: Increasing use of AI to detect and
respond to threats.
 Zero Trust Architecture: Moving from traditional perimeter-
based security to a model where no entity is trusted by
default.
 Cybersecurity Skills Gap: Growing demand for skilled
professionals in the field.

 Cybersecurity Fundamentals
1. Confidentiality, Integrity, and Availability (CIA Triad):
 Confidentiality: Ensures data is accessible only to those
authorized to view it. Techniques include encryption and access
controls.

 Integrity: Ensures data is accurate and unaltered. Techniques


include hashing and checksums.
 Availability: Ensures systems and data are available when
needed. Techniques include redundancy and backups.

 Authentication and Authorization:


 Authentication: Verifying the identity of a user or system.
Methods include passwords, biometrics, and multi-factor
authentication (MFA).
 Authorization: Determining what an authenticated user or
system is allowed to do. Managed through permissions and
access control lists (ACLs).
 Non-Repudiation:
 Definition: Ensures that someone cannot deny the validity of
their actions.
 Techniques: Digital signatures and audit trails provide non-
repudiation by recording and verifying transactions and
communications.
Chapter 1

Understanding Cyber Threats

 Types of Cyber Threats:-

o Malware:
 Viruses: Malicious code that attaches to legitimate programs
and spreads. Example: The ILOVEYOU virus (2000).
 Worms: Self-replicating malware that spreads across networks.
Example: The Wanna Cry ransomware (2017).
 Trojans: Malware disguised as legitimate software. Example:
Emotet Trojan.
 Ransomware: Encrypts files and demands payment for
decryption. Example: Crypto Locker.
o Phishing and Social Engineering:
 Phishing: Fraudulent attempts to obtain sensitive
information by pretending to be a trustworthy entity.
Methods include email phishing and spear-phishing.
 Social Engineering: Manipulating individuals into
divulging confidential information. Techniques include
pretexting and baiting.
o Denial-of-Service (DoS) and Distributed Denial-of-Service
(DDoS) Attacks:
 DoS: Overwhelms a system or network with traffic to make it
unavailable. Example: The 2016 DDoS attack on Dyn.
 DDoS: Uses multiple systems to launch a coordinated attack,
amplifying the effect. Example: Mirai Botnet attack.
o Threat Actors and Motives
 Hacktivists: Individuals or groups using hacking to promote
political agendas or social causes. Example: Anonymous group.
 Cybercriminals: Actors seeking financial gain through illegal
activities such as data theft or fraud. Example: Ransomware
gangs.
 Nation-States: Governments conducting cyber-espionage or
cyber-warfare for political or economic advantage. Example:
APT28 (Fancy Bear).
 Insider Threats: Employees or contractors who misuse their
access for malicious purposes or through negligence. Example:
Edward Snowden's NSA leaks.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy