Cyber Security Notes
Cyber Security Notes
• Definition:
• Key Objectives:
1. Confidentiality:
2. Integrity:
3. Availability:
• Importance:
3. Business Continuity:
4. National Security:
5. Public Trust:
• Challenges:
2. Human Factor:
3. Resource Constraints:
4. Complexity of IT Systems:
2.1 Importance
3. Business Continuity:
4. National Security:
5. Public Trust:
2.2 Challenges
3. Resource Constraints:
4. Complexity of IT Systems:
5. Insider Threats:
Module 3: Cyberspace
3.1 Definition
• Cyberspace:
3.2 Components
1. Physical Layer:
1. Global Reach:
2. Interactivity:
3. Anonymity:
4. Scalability:
4. Cyber Threats
• Definition:
2. Phishing:
4. Man-in-the-Middle (MitM):
5. Zero-Day Exploits:
6. Insider Threats:
• Impact:
5. Cyberwarfare
• Definition:
1. Targeted:
2. Sophisticated:
3. Stealthy:
• Notable Examples:
1. Stuxnet Worm:
6. CIA Triad
1. Confidentiality:
3. Availability:
7. Cyber Terrorism
• Definition:
• Key Characteristics:
1. Targets:
2. Motivation:
3. Scale:
• Examples:
• Definition:
1. Dependency:
2. High Stakes:
• Challenges:
1. Legacy Systems:
2. Interconnectivity:
3. Advanced Threats:
• Best Practices:
1. Risk Assessment:
2. Continuous Monitoring:
• Risks:
1. Financial Loss:
2. Reputational Damage:
3. Legal Consequences:
• Mitigation Strategies:
1. Policy Development:
2. Employee Training:
3. Regular Audits:
4. Use of Technology:
• Key Regulations:
• Types of Hackers:
4. Script Kiddies:
5. Hacktivists:
6. State-Sponsored Hackers:
• Hackers:
• Operate in a middle ground between white and black hats. They may
find vulnerabilities without permission but report them to the
organization without exploiting them. Their actions can be ethically
ambiguous, as they may not always have explicit authorization.
4. Script Kiddies:
5. Hacktivists:
• Hackers who use their skills for political or social activism. They may
target government websites, corporations, or organizations to
promote a cause or raise awareness about issues, often through
defacement or data leaks.
6. State-Sponsored Hackers:
• Crackers:
1. Intent:
2. Legality:
3. Methods:
• Hackers may use their skills to find and report vulnerabilities, while
crackers typically use similar skills to exploit those vulnerabilities
for personal gain.
10.6 Impact of Hackers and Crackers
• Data Breaches:
• Financial Loss:
• Reputational Damage:
• Legal Consequences:
• Ensure that all software and systems are regularly updated to patch
known vulnerabilities and reduce the risk of exploitation.
1. Cyber-Attacks:
2. Vulnerabilities:
• Weak passwords.
• Unpatched software.
• Definition:
• Types of Malware:
1. Viruses:
2. Worms:
3. Trojans:
5. Spyware:
13. Sniffing
• Definition:
• Types of Sniffing:
1. Passive Sniffing:
2. Active Sniffing:
• Prevention:
• Definition:
• Methods:
2. Brute-Force Attacks:
• Systematically trying all possible combinations of passwords
until the correct one is found.
3. Social Engineering:
• Definition:
• Techniques:
2. Password Cracking:
• Definition:
• Examples:
1. Installing Malware:
2. Running Scripts:
• Executing scripts to exfiltrate data or perform other malicious
actions.
• Definition:
• Techniques:
2. Using Rootkits:
• Definition:
• Methods:
1. Deleting Logs:
2. Overwriting Data:
19. Worms
• Definition:
• Characteristics:
• Examples:
20. Trojans
• Definition:
• Examples:
2. Banking Trojans:
• Definition:
• Characteristics:
• Examples:
1. File Infectors: Infect executable files and spread when the infected file
is run.
22. Backdoors
• Definition:
1. Exploiting Vulnerabilities:
2. Installing Malware:
• Prevention:
• Definition:
• Ethical hacking involves legally breaking into computers and
devices to test an organization’s defenses.
1. Network Security:
2. Application Security:
3. Physical Security:
4. Employee Awareness:
• Definition of Threats:
• Emerging Threats:
• Definition:
• Key Components:
1. Risk Management:
2. Policy Development:
3. Compliance:
• Definition:
1. Asset Identification:
2. Threat Identification:
3. Vulnerability Analysis:
4. Mitigation Planning:
• Common Models:
• Definition:
• A framework that aligns cybersecurity strategies with business
objectives to enhance overall security posture.
• Key Components:
1. Business Alignment:
2. Policy Framework:
3. Technology Integration:
4. Incident Response:
• Benefits:
• Vulnerability Assessment:
• Penetration Testing:
• Types:
1. Black Box: No prior information about the system is provided to the
tester.
2. White Box: Full information about the system is given to the tester.
• Phases of VAPT:
2. Scanning and Enumeration: Identify live hosts, open ports, and services
running on the target.
• Definition:
• Types:
• Definition:
• Types of Insiders:
• Examples:
• Impact:
• Strategies:
• Common Targets:
1. Employees with access to sensitive information, such as HR or
finance personnel.
• Defense Strategies:
• Objectives:
• Types of Equipment:
2. Storage Media: Hard drives (HDD, SSD), USB drives, CDs, DVDs for
data storage.
3. Peripheral Devices: Keyboards, mice, printers, scanners that interact
with computer systems.
2. Solid State Drives (SSD): Faster and more reliable, but complex
recovery processes.
3. Removable Media: USB drives and memory cards are portable but prone
to theft and loss.
• Key Responsibilities:
• Skills Required:
• Ethical Considerations:
• Phases of Investigation:
• Tools Used:
2. Analysis Tools: Examine file systems, logs, and metadata using tools
like Autopsy and Wireshark for deeper insights.
• Challenges:
• Techniques:
• Legal Considerations:
• Purpose:
• Structure:
• Best Practices:
1. Maintain Objectivity: Avoid personal bias and present facts without
interpretation.
36. Auditing
• Definition:
• Types of Audits:
• Importance:
5. Schedule and Execute: Set timelines for the audit process and
carry out the audit according to the plan.
• Definition:
• Key Elements:
• Benefits:
• Definition:
• Key Features:
• Clauses:
• Cyber laws are legal measures that regulate internet activities and
digital interactions, aiming to ensure order, security, and privacy in
cyberspace.
• Definition:
• Key Objectives:
• Importance:
2.
• E-Commerce:
• Refers to buying, selling, and exchanging goods and services over the
internet.
• Key Aspects:
• E-Governance:
• Key Aspects:
• Examples:
1. Online Tax Filing Systems: Such as Income Tax E-Filing, allowing citizens
to file taxes electronically.
2. Digital Payment Systems: Platforms like UPI and BHIM in India that
facilitate secure online transactions.
• Role of CA:
• Examples:
• Responsibilities:
• Overview:
• Key Offences:
• Amendments:
• Common Offences:
• Penalty Types:
• Definition:
1. Copyright:
2. Trademarks:
3. Patents:
• Challenges in Cyberspace:
• Enforcement:
• Definition:
• Key Features:
1. Authentication:
2. Confidentiality:
3. Integrity:
• Components:
1. Transport Mode:
2. Tunnel Mode:
• Use Cases: