0% found this document useful (0 votes)
31 views27 pages

Cyber Security

The document provides an overview of IT fundamentals and the critical role of cybersecurity in protecting data and systems from increasing cyber threats. It discusses essential components of IT infrastructure, challenges faced in the IT landscape, and future trends in technology. The importance of cybersecurity measures, data protection, and various cyber threats and terminology are also highlighted, emphasizing the need for robust security practices in modern IT environments.

Uploaded by

Namrata Gawande
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views27 pages

Cyber Security

The document provides an overview of IT fundamentals and the critical role of cybersecurity in protecting data and systems from increasing cyber threats. It discusses essential components of IT infrastructure, challenges faced in the IT landscape, and future trends in technology. The importance of cybersecurity measures, data protection, and various cyber threats and terminology are also highlighted, emphasizing the need for robust security practices in modern IT environments.

Uploaded by

Namrata Gawande
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

Course: IT Fundamentals of

Cyber Security

Project: Cyber Security 4 ALL(CS4ALL)


CHAPTER I

Introduction to Information
Technology and Cyber Security
Content
✓ Overview of IT fundamentals
✓ Essential components of Information Technology
✓ Core Components of IT Infrastructure and IT System
Architecture
✓ Challenges and Future trends in IT
✓ Importance of cybersecurity in modern IT environments
✓ Importance in Protecting data and system
✓ Growing prevalence of Cyber threats
✓ Role in Ensuring Policy and confidentiality
✓ Basic concepts and terminology in cybersecurity
✓ Cyber Security Concepts
✓ Importance of protecting digital information
✓ Cyber Security Threats , Measures and Terminology
Overview of IT fundamentals

✓ Definition of Cybersecurity:

Cybersecurity encompasses any technology, measure, or practice

aimed at preventing or mitigating cyber threats.

✓ Purpose of Cybersecurity:

The primary goal of cybersecurity is to protect individuals' and

organizations' systems, applications, and computing devices.

✓ Protection of Sensitive Data:

Cybersecurity safeguards sensitive data and financial assets

against threats such as computer viruses and sophisticated

attacks.
Essential components of Information
Technology
People: The most important part as they make end users
more productive

Procedure: Refer to rules or guidelines people follow


when using software, hardware, and data

Software: It is the term for programs or sets of computer


instructions written in a special computer language that
enables a computer to accomplish a given task

Hardware: Refers to physical, touchable pieces or


equipment.

Data: Raw, unprocessed facts including text, numbers,


images and sounds
IT Infrastructure and Architecture
Core Components of IT Infrastructure and IT System Architecture

Hardware:
Includes personal computers, servers, routers, and other physical
devices essential for IT operations.

Software:
Comprises applications used by an organization, web servers, and
operating systems that facilitate business functions.

Networking:
Ensures smooth network operations and communication between
different IT components.
Challenges in Information Technology
❖ Workload

Managing Increasing Workloads is a key challenge in IT


❖ Cyber Security
Ensuring robust cyber security measures is critical to protect data and system
❖ Skills Gap
There is s Notable gap in necessary skills among IT Professionals
❖ Digital Transformation
Organizations face challenges in effectively implementing digital transformation strategies
❖ Cloud Computing
Navigating the Complexities of cloud computing can be challenging for IT teams
Challenges in Information Technology
❖ Hiring
Recruiting the right talent remains a significant obstacle in the IT landscape.
❖ Budget
Limited budgets often hinder the ability to address various IT challenges.
❖ Leadership Support in prioritizing New Skill Development
Effective leadership support is essential for prioritizing new skills development within
teams.
❖ Analytics and Data Management
Managing and analyzing data effectively poses a challenge for many organizations.
❖ Automation
Integrating automation tools and processes can be complex and requires careful
planning
Future Trends in IT
Top Eight Future Technology Trends

01 02 03 04 05 06 07 08

Artificial Internet of Genomics: Xenobots: Blockchain Extended Quantum Energy


Intelligence: Things Technology: Reality: Computers: Storing
Advancemen Living robots
A significant The created from A An umbrella Next- Bricks
ts in
trend that will interconnecti genomics are frog cells, decentralized term for generation Innovative
continue to on of revolutionize with potential digital ledger augmented computers bricks that
evolve and everyday ng applications that enhances reality, virtual that can store
impact various devices healthcare in medicine security and reality, and leverage energy,
sectors. through the and and transparency in mixed reality quantum contributing
internet, personalized environmenta transactions. experiences.. mechanics to
enhancing medicine. l cleanup. for vastly sustainable
data improved energy
exchange. processing solutions.
power.
Importance of Cybersecurity
Importance of Cybersecurity in Modern IT Environment

01 02
Data Protection Data Assets

Data protection is the All forms of data are


process of safeguarding considered valuable
data from corruption, assets for an
loss, or unauthorized organization or
access, making it an institution, highlighting
essential practice in the need for robust
cybersecurity. cybersecurity measures.
Data Protection Significance

01 Fundamental 02 03
Builds Trust Branding
Right

Incorporating
Data protection Effective data data protection
is a fundamental protection into your
right that is measures help branding
safeguarded by to establish and strategy
law. build trust with enhances your
customers. organization's
reputation.

04 Prevention of 05
Fraud Cost-Effective

Data protection Implementing


plays a crucial data protection
role in can save
preventing organizations
fraud and time and money
cybercrimes. in the long run.
Growing prevalence of Cyber
Threats
Role in Ensuring Policy and
confidentiality
Ensuring
SecuritySecurity
Policy:and Confidentiality in IT Systems
A security policy is a statement designed to guide employees’
behavior regarding the security of company information and IT
systems.

Confidentiality:
Confidentiality is a core component of security policies, ensuring
that sensitive information is protected from unauthorized access.

Tools for Confidentiality:


Various tools and practices are implemented to maintain
confidentiality and safeguard company data.
Tools for Confidentiality

Encryption: Access Control: Authentication:


Utilizing cryptographic Implementing measures to Verifying the identity of
01 methods to protect data 02 restrict access to sensitive 03 users before granting
confidentiality. information. access to systems.

Authorization: Physical Security: Integrity:


Determining what Protecting physical assets Ensuring the accuracy and
04 resources a user can access 05 and locations from 06 reliability of data
after authentication. unauthorized access. throughout its lifecycle.
Cyber Security Goals
Cybersecurity can be measured by at least
one of three goals-

➢ Protect the confidentiality of data.


➢ Preserve the integrity of data.
➢ Promote the availability of data for
authorized users.
Basic Cybersecurity Concepts
Basic concepts and terminology in cybersecurity

• Abuse • Threat
The improper use of a system or A potential cause of an unwanted
resource that can lead to harm or incident that may result in harm
damage. to a system or organization.

04 01

03 02

• Attack •Vulnerability
An intentional act that aims to A weakness in a system that can be
cause damage or disruption to as exploited by threats to gain
System or network. unauthorized access or cause harm.
Protecting Digital Information
Importance of protecting Digital Information

Data Protection For Data Protection for


businesses
Individuals
◆ Trust and Reputation
◆ Personal Privacy
◆ Legal and Financial
◆ Avoiding Financial Loss
Consequences
◆ Identity Protection
◆ Intellectual Property Protection
◆ Protection from Cyberbullying
◆ Competitive Advantage
◆ Preserving Digital Legacy
Cybersecurity Threats, Measures and
Terminology
Threat
A threat is any incident that could negatively affect
an asset – for example, if it’s lost, knocked offline or
accessed by an unauthorized party.
Malware
Malware is a software that is designed to attack, control and
damage a device’s security and infrastructure systems

Types of Malware
❑ Ransomware : A type of malware that prevents or limits users
from accessing their system
❑ Fileless Malware : Malicious code that works directly within a
computer's memory instead of the hard drive
❑ Mobile Malware : Malicious software specifically designed to
target mobile devices
❑ Wiper Malware : Deletes or destroys an organization's access to
files and data.
❑ Hybrid Malware : Combination of two or more different types of
attacks
❑ Cryptojacking : Type of cybercrime that involves the unauthorized
use of people's devices
MITM and Real-life Instances

Definition of MITM Real-life Instances of


Nature of MITM Attacks
Attack MITM Attacks

A man-in-the-middle (MITM) MITM attacks can involve There are numerous real-

attack is a form of cyber- various methods to world examples

attack where a malicious intercept or alter demonstrating the impact


individual introduces communications between and execution of MITM
themselves into a meeting the involved parties without attacks, highlighting the

between two parties. their knowledge. importance of cybersecurity

awareness.
Denial of Service and SQL Injection

01 02 03 04

Denial of Service (DoS) Consequences of SQL


DoS is a cyber-attack Impact of DoS Attacks SQL Injection Injection
that targets an individual These attacks can disrupt SQL injection is a code Successful SQL
computer or website, services, leading to injection technique used injection attacks can
aiming to make it significant downtime and by attackers to lead to unauthorized
unavailable to users. potential financial losses. manipulate databases by access to sensitive data
inserting malicious SQL and compromise the
statements. integrity of a database.
Cybersecurity Terminology
➢ Authentication : Verification, validation, evidence, proof, identification,

documentation

➢ Botnet : Network of infected computers

➢ Data Breach : Data leak or data spill

➢ DDoS : Cybercrime in which the attacker floods a server with internet

➢ Domain : Field of influence, thought, or action

➢ Encryption : The process of converting data into a code to protect it

➢ Exploit : A piece of code or program that takes advantage of a security

vulnerability

➢ Firewall : A network security system that prevents unauthorized access to a

computer network.
Cybersecurity Terminology
➢ Hacker, Black Hat : A computer hacker who violates laws

➢ Hacker, White Hat : Ethical hackers or good hackers

➢ Malware : Malicious software

➢ Man in the Middle Attack : Cyberattack where the attacker secretly relays

➢ Phishing : Involves tricking people into sharing sensitive information

➢ Ransomware : A type of malware that locks a victim's device

➢ Spoofing : A type of scam where a criminal pretends gain the trust of a

victim.

➢ Spyware : Malicious software that collects information from system

without your consent


Resources
List the resources used for research:

1. Chwan-Hwa (John) Wu, J. David Irwin, Introduction to


Computer Networks and Cyber security, CRC Press T&F Group,
2013.

2. Nina Godbole and Sunit Belpure, Cyber Security


Understanding Cyber Crimes, Computer Forensics and Legal
Perspectives, Wiley

3. Cyber Security Essentials, James Graham, Richard Howard


and Ryan Otson, CRC Press.

resources you used for your research:


Source #1
Source #2
Questions & answers
Conclusion
In conclusion, Information Technology (IT) manages and supports digital systems,

while Cyber Security protects them from threats. As digital reliance grows,

safeguarding IT systems is crucial to ensure data integrity, privacy, and system

functionality. The future of IT depends on strong Cyber Security practices to maintain

safe and reliable digital environments.


THANK YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy