Cyber Security Module 1 Notes
Cyber Security Module 1 Notes
1. Defining Cyberspace
The term Cyberspace was first coined by William Gibson in the year 1984.
Cyberspace is the virtual and dynamic space created by the machine clones.
Cyberspace mainly refers to the computer which is a virtual network and is a
medium electronically designed to help online communications to occur.
The primary purpose of creating cyberspace is to share information and
communicate across the globe.
Cyberspace is that space in which users share information, interact with each
other; engage in discussions or social media platforms, and many other activities.
The whole Cyberspace is composed of large computer networks which have
many sub- networks. These follow the TCP or IP protocol.
Computer and web technology are integral parts of our modern world, shaping how we
communicate, work, learn, and entertain ourselves.
Computer Technology:
1
CYBER SECURITY
3. Networking: Computers can connect to each other and the internet via wired
(e.g., Ethernet) or wireless (e.g., Wi-Fi) networks. Networking enables data
sharing, communication, and remote access.
4. Security: Computer security is crucial to protect data and systems from threats
like viruses, malware, and hackers. Antivirus software, firewalls, and encryption
are common security measures.
5. Processing Power: Moore's Law predicts that the processing power of computers
doubles approximately every two years. This constant improvement drives
innovations in various fields, including artificial intelligence, scientific research,
and data analysis
Web Technology:
1. World Wide Web (WWW): The World Wide Web, commonly referred to as the
web, is a global system of interconnected documents and resources linked through
hyperlinks. It is accessed via web browsers.
2. Web Browsers: Web browsers like Google Chrome, Mozilla Firefox, and Microsoft
Edge allow users to access and interact with web content.
3. Web Development: Web development involves creating and maintaining websites
and web applications.
4. Web Servers: Web servers store and deliver web content to users' browsers upon
request. Popular web server software includes Apache, Microsoft IIS.
5. Web Security: Ensuring web security is critical to protect data and user privacy.
Measures include SSL/TLS encryption, secure authentication, and regular security
audits.
6. Web Standards: Organizations like the World Wide Web Consortium (W3C)
establish web standards to ensure compatibility and accessibility across different
devices and browsers.
3. Architecture of cyberspace
There isn't a single, specific architecture for cyberspace, as it encompasses a wide range of
technologies, protocols, and platforms. Some key components and concepts related to the architecture
of cyberspace are:
2
CYBER SECURITY
3
CYBER SECURITY
4
CYBER SECURITY
6. Mobile Web: Mobile web technology focuses on optimizing websites and applications
for mobile devices, ensuring a seamless user experience on smartphones and tablets.
5. Internet
The word Internet is derived from the word internetwork, or the connecting together
two or more computer networks.
The Internet started in the 1960s as a way for government researchers to share
information.
Computers in the '60s were large and immobile and in order to make use of information
stored in any one computer, one had to either travel to the site of the computer or have
magnetic computer tapes sent through the conventional postal system.
January 1, 1983 is considered the official birthday of the Internet. Prior to this, the
various computer networks did not have a standard way to communicate with each
other.
A new communications protocol was established called Transfer Control
Protocol/Internetwork Protocol (TCP/IP). This allowed different kinds of computers on
different networks to "talk" to each other.
Transmission Control Protocol/Internet Protocol (TCP/IP)
TCP/IP is a suite of communication protocols used to interconnect network devices on
the Internet.
TCP establishes the connections between sending and receiving computers, and makes
sure that packets sent by one computer are received in the same sequence by the other,
without any packets missing.
IP provides the Internet’s addressing scheme and is responsible for the actual delivery
of the packets.
TCP/IP is divided into four separate layers, with each layer handling a different aspect
of the communication problem.
5
CYBER SECURITY
These websites contain text pages, digital images, audios, videos, etc. Users can access
the content of these sites from any part of the world over the internet using their devices
such as computers, laptops, cell phones, etc.
The WWW, along with the internet, enables the retrieval and display of text and media
to your device.
The building blocks of the Web are web pages which are formatted in HTML and
connected by links called "hypertext" or hyperlinks and accessed by HTTP.
7. Advent of internet
The Internet started off with research into what was then known as packet switching as
early as the 1960s.
ARPANET is considered the first known group of interconnected computers aka the
internet. This system was used to transfer confidential data between the Military.
This data-sharing technology was then opened to educational institutes in the United
States to allow them to access to government’s supercomputer, first at 56 kbit/s, then at
1.5 Mbit/s, and then at 45 Mbit/s.
Internet service providers began to arise in the late 1980s and the internet was fully
commercialized in the US by 1995.
The history of the Internet can be segmented into three phases
1. Innovation Phase
2. Institutionalization Phase
3. Commercialization Phase
6
CYBER SECURITY
Foundation (NSF) provided funding and legitimization for the fledging Internet.
Commercialization Phase (1995 to the present)
The U.S. government encouraged private corporations to take over and expand the Internet
backbone as well as local service beyond military installations and college campuses to the rest
of the population around the world.
7
CYBER SECURITY
Data Privacy Regulations: Compliance with laws like GDPR (in Europe), CCPA (in
California), and HIPAA (for healthcare data).
Data Retention Policies: Guidelines for storing and managing data for specific periods.
Data Access Controls: Systems to restrict and monitor who can access and modify data.
Data Encryption: Ensuring data at rest and in transit is properly encrypted to protect
against unauthorized access.
5. Cyber security
Robust security measures, including firewalls, intrusion detection systems, and regular
security audits, are essential to protect data during transfer.
6. Internet Governance Bodies
Organizations like ICANN (Internet Corporation for Assigned Names and Numbers)
oversee domain name system management and policy.
Multistakeholder governance models involve various stakeholders, including
governments, businesses, and civil society, in shaping internet governance.
7. Content Delivery Networks (CDNs)
CDNs like Akamai and Cloud flare optimize data delivery by caching content at various
locations worldwide, reducing latency.
8. Quality of Service (QoS)
Ensuring data transfer meets performance requirements, especially for applications like
video conferencing and online gaming.
9. International Collaboration
Cooperation among nations is essential to establish international norms and agreements
related to data transfer and governance.
10. Data Transfer Agreements
Agreements like Privacy Shield and Standard Contractual Clauses facilitate the lawful
transfer of data across borders.
9. Internet society
Internet Society (ISOC) A professional membership society that promotes the use and
future development of the Internet. It has individual and organization members all over
the world and is governed by an elected board of trustees. ISOC coordinates various
groups responsible for Internet infrastructure.
These include
8
CYBER SECURITY
9
CYBER SECURITY
Web-based attacks: These are the attacks which occur on a website or web
applications. Some of the important. Web-based attacks are as follows-
1. Injection attacks: It is the attack in which some data will be injected into a web
application to manipulate the application and fetch the required information.
2. Session Hijacking: It is a security attack on a user session over a protected network.
10
CYBER SECURITY
Web applications create cookies to store the state and user sessions. By stealing the
cookies, an attacker can have access to all of the user data.
3. Phishing: Phishing is a type of attack which attempts to steal sensitive information like
user login credentials and credit card number. It occurs when an attacker is
masquerading as a trustworthy entity in electronic communication.
4. Denial of Service: It is an attack which meant to make a server or network resource
unavailable to the users. It accomplishes this by flooding the target with traffic or
sending it information that triggers a crash.
System-based attacks: These are the attacks which are intended to compromise a
computer or a computer network. Some of the important system-based attacks are as
follows:
1. Virus: It is a type of malicious software program that spread throughout the computer
files without the knowledge of a user. It is a self-replicating malicious computer
program that replicates by inserting copies of itself into other computer programs when
executed. It can also execute instructions that cause harm to the system.
2. Worm: It is a type of malware whose primary function is to replicate itself to spread to
uninfected computers. It works same as the computer virus. Worms often originate from
email attachments that appear to be from trusted senders.
3. Trojan horse: it is a malicious program that occurs unexpected changes to computer
setting and unusual activity, even when the computer should be idle. It misleads the
user of its true intent. It appears to be a normal application but when opened/executed
some malicious code will run in the background.
Cyber Threat
• A Cyber threat is any malicious act that attempts to gain access to a computer network
without authorization or permission from the owners.
• It refers to the wide range of malicious activities that can damage or disrupt a computer
system, a network or the information it contains.
11
CYBER SECURITY
12
CYBER SECURITY
access and privileges, can be particularly challenging to detect and prevent. This
includes employees, contractors, or partners who intentionally or unintentionally
compromise security.
6. Lack of Cybersecurity Awareness: Many individuals and employees lack awareness
of cybersecurity best practices, making them susceptible to social engineering attacks
and other cyber threats.
7. Resource Constraints: Smaller organizations and even some larger ones may lack the
resources and expertise needed to implement robust cybersecurity measures. This can
leave them vulnerable to attacks.
8. Ransomware: Ransomware attacks have surged in recent years, with cybercriminals
encrypting data and demanding a ransom for decryption keys. These attacks can disrupt
critical operations and result in significant financial losses.
13