PPT1_Chapter 1 Introduction
PPT1_Chapter 1 Introduction
Cyber Security
Dr. Upendra Verma
Asst. Prof. , MPSTME Shirpur Campus,
SVKM’S NMIMS University
Course Design
Syllabus
Syllabus cont’d
Text Book
What is Cyber Security?
• Cyber security is the practice of defending computers, servers,
mobile devices, electronic systems, networks, and data from
malicious attacks.
• Domains of Cyber Security:
• Network security- Security measures for protecting a computer network from
intruders, including both wired and wireless (Wi-Fi) connections.
• Application security- Processes that help protect applications operating on-
premises and in the cloud.
• Security should be built into applications at the design stage.
• Information security- Data protection measures, such as the General Data
Protection Regulation or GDPR, that secure your most sensitive data from
unauthorized access, exposure, or theft.
Cyber Security cont’d
• We can not provide 100% security.
Illustration of Figure:
Here, a wall is holding water back. The water to the left of the wall is a threat to the man on the right of
the wall: The water could rise, overflowing onto the man, or it could stay beneath the height of the wall,
causing the wall to collapse. So the threat of harm is the potential for the man to get wet, get hurt, or be
drowned. For now, the wall is intact, so the threat to the man is unrealized. We can see a small crack in
the wall a vulnerability that threatens the man's security. the water rises to or beyond the level of the
crack, it will exploit the vulnerability and harm the man.
System Security Threats
• Four kinds of threats: interception, interruption, modification, and
fabrication.
System Security Threats
• An interception means that some unauthorized party has gained
access to an asset.
• In an interruption, an asset of the system becomes lost, unavailable,
or unusable.
• If an unauthorized party not only accesses but tampers with an asset,
the threat is a modification.
• An unauthorized party might create a fabrication of counterfeit
objects on a computing system.
Vulnerability
• Hardware Vulnerabilities
• Software Vulnerabilities
• Data Vulnerabilities
Vulnerability
• Hardware Vulnerabilities:
• Hardware is more visible than software, largely because it is composed of physical
objects. Because we can see what devices are hooked to the system, it is rather simple
to attack by adding devices, changing them, removing them, intercepting the traffic to
them, or flooding them with traffic until they can no longer function.
• Software Vulnerabilities:
• Software can be replaced, changed, or destroyed maliciously, or it can be modified,
deleted, or misplaced accidentally. Whether intentional or not, these attacks exploit
the software's vulnerabilities.
• Data Vulnerabilities:
• A data attack is a more widespread and serious problem than either a hardware or
software attack.
• Data items have greater public value than hardware and software because more
people know how to use or interpret data.
Difference between Vulnerability
and Threat
• There are many threats to a computer system, including human-
initiated and computer-initiated ones. We have all experienced the
results of inadvertent human errors, hardware design flaws, and
software failures. But natural disasters are threats, too; they can bring
a system down when the computer room is flooded or the data center
collapses from an earthquake.
• A human who exploits a vulnerability perpetrates an attack on the
system.
• An attack can also be launched by another system, as when one system
sends an overwhelming set of messages to another, virtually shutting
down the second system's ability to function.
Risk
• Risk is defined as the potential for loss or damage when a threat
exploits a vulnerability.
• Examples of risk include:
• Financial losses
• Loss of privacy
• Damage to your reputation Rep
• Legal implications
• Even loss of life