Cyber Security
UNIT-1
Introduction:
Cybersecurity is the practice of protecting computers, servers, mobile devices,
electronic systems, networks, and data from malicious attacks. It is also known
as information technology security or electronic information security.
Cyber Safety refers to the safe and responsible use of Internet so as to ensure
safety and security of personal information and not posing threat to anyone
else's information. It involves gaining knowledge about possible threats to
personal safety and security risks for the information along with measures to
prevent and counter them. In Cyber security you can encompasses the
protection of computer systems, networks, and data from digital attacks, theft,
and damage. It involves implementing measures to safeguard sensitive
information and ensure the integrity, confidentiality, and availability of data.
Importance of Cyber Security:
1. Protects Sensitive Information: - Safeguards personal data, financial
information, and intellectual property from unauthorized access and breaches.
2. Maintains Privacy: - Ensures that individuals' personal and professional
information is not misused or exploited.
3. Prevents Financial Loss: - Helps in mitigating the risks of financial losses due
to cybercrime such as fraud and theft.
4. Maintains Reputation: - Protects the reputation of individuals and
organizations from damage caused by data breaches and security incidents.
5. Supports Compliance: - Ensures adherence to legal and regulatory
requirements for data protection and privacy.
6. Prevents Operational Disruptions: - Minimizes downtime and disruptions to
business operations caused by cyber incidents.
Why We Need Cyber Security Skills
We surf the Internet for a variety of reasons, from using social media, buying
and selling goods, to sending information. When we give out private data to
businesses and other Internet users (such as while filling up some forms or
making payments online), we trust them to use that information for legitimate
purposes. This isn't always the case though and financial and personal data can
be used for harmful IDENTITY THEFT reasons like hacking, stalking and
identity fraud. Identity theft is a type of fraud that involves using someone fraud
is when personal details that have been accessed or stolen are used to commit
fraudulent acts posing as someone else with else's identity to steal money or
gain other benefits. Online stolen identity. Identity theft refers to an act of Most
common solution to this is
1. Increasing Cyber Threats: - As cyber threats evolve, having skills to
recognize and mitigate them becomes crucial.
2. Job Market Demand: - Cyber security skills are in high demand across
various industries, offering lucrative career opportunities.
3. Protection of Assets: - Skills in cyber security help protect both personal and
organizational assets from cyber-attacks.
4. Regulatory Compliance: - Understanding cyber security helps in meeting
regulatory requirements and avoiding legal issues.
5. Incident Response: - Skills are necessary for effective response and
management of cyber security incidents.
Computer Viruses:- Computer viruses are malicious codes/programs that
cause damage to data and files on a system. Viruses can attack any part of a
computer's software such as boot block, operating system, system area, files and
application-program etc. Two other similar programs also cause virus like
effects.
Types of Computer Viruses and Infections
1. Adware & Spyware:-
Adware:-Software that automatically displays or downloads advertisements
when a user is online. Often bundled with free software.
Spyware: - Malicious software that secretly monitors and collects user
information, including browsing habits and personal data.
2. Antispam:
Purpose: - Tools and techniques designed to filter out unwanted and potentially
harmful emails and messages (spam) from reaching a user's inbox.
3. Botnet:-
Definition: A network of compromised computers controlled remotely by a
hacker. Used to execute various attacks like distributed denial-of-service
(DDoS) attacks or distribute malware.
4. Keyloggers:
Function: Malware that records keystrokes on a keyboard, capturing sensitive
information such as passwords and credit card numbers.
Overview of Viruses:
Rootkits: A type of malware designed to gain unauthorized access to a
computer and hide its presence. Often used to maintain privileged access to the
system.
Trojans: - Malicious software disguised as legitimate applications. Once
installed, it can create backdoors for unauthorized access or perform other
harmful activities.
Worms: - A worm is a self-replicating program which eats up the entire disk
space or memory. A worm keeps on creating its copies until all the disk space or
memory is filled. Self-replicating malware that spreads through networks
without needing to attach itself to other programs. Can cause widespread
damage and system overload.
Malware: - General term for any software designed to cause harm, including
viruses, Trojans, worms, ransomware, and more.
Ransomware:- A type of malware that encrypts the victim's files or locks the
system, demanding a ransom payment for restoring access. Often distributed via
phishing or exploit kits.
Host File:-A local file used to map hostnames to IP addresses. Malware can
modify this file to redirect traffic to malicious sites.
Preventing Unwanted Ads and Pop-ups
1. Use Ad Blockers: - Browser extensions that prevent ads from appearing on
web pages.
2. Enable Pop-up Blockers: - Built-in browser settings or extensions that block
pop-up windows.
3. Update Software Regularly: - Ensures that security vulnerabilities are
patched, reducing the risk of adware infections.
4. Avoid Suspicious Sites: - Refrain from visiting websites that seem
untrustworthy or offer suspicious downloads.
Managing and Maintaining Strong Passwords
1. Use Complex Passwords: - Combine letters, numbers, and special characters
to create strong passwords.
2. Avoid Reusing Passwords: -Use unique passwords for different accounts to
prevent a single breach from compromising multiple accounts.
3. Change Passwords Regularly: -Update passwords periodically to enhance
security.
4. Use Password Managers: - Tools that securely store and manage passwords,
generating strong passwords and auto filling them as needed.
Secure Online Banking and Information Safety
1. Use Secure Connections: - Ensure that online banking transactions are
conducted over secure, encrypted connections (look for HTTPS in the URL).
2. Enable Two-Factor Authentication (2FA):- Adds an extra layer of security by
requiring a second form of verification.
3. Monitor Accounts Regularly: -Check bank statements and account activity
frequently for unauthorized transactions.
4. Avoid Public Wi-Fi for Transactions: -Conduct sensitive transactions over
secure, private networks.
Securing Net Banking and Online Transactions
1. Use Virtual Private Networks (VPNs):- Encrypts internet traffic, providing
secure access to online banking services.
2. Log Out Properly: - Ensure you log out from your banking session before
leaving a public computer.
3. Avoid Public Computers for Sensitive Transactions: - Use personal devices
for financial transactions to reduce risk.
4. Clear Browser History: - Remove cookies and cached data after using a
public computer to protect your information.
Avoid using public computers
Always try not to use the public computer especially if you have to deal with
your crucial data. But if you need to work on a public computer, then make sure
following things:
a) Browse privately.
b) Don't save your login information.
c) Never save passwords while working on a public computer.
d) Avoid entering sensitive information onto a public computer.
e) Don't leave the computer unattended with sensitive information on the
screen. Disable the feature that stores passwords.
f) Properly log out before you leave the computer.
g) Erase history and traces of your work, i.e., clear history and cookies.
Avoiding Malware
1. Install Anti-Malware Software: - Use reputable security software to detect
and remove malware.
2. Update Software and Operating Systems: - Regular updates patch
vulnerabilities and protect against new threats.
3. Be Cautious with Email Attachments and Links: - Do not open attachments
or click on links from unknown or suspicious sources.
4. Backup Data Regularly: - Keep regular backups of important data to recover
from potential malware attacks or data loss.
Term Function Risk Prevention
Shows unwanted Slows system,
Adware Ad-blockers, antivirus
ads collects data
Monitors user Anti-spyware tools,
Spyware Identity/data theft
activity secretly firewall
Blocks unwanted Phishing, malware Spam filters, blacklists,
Antispam
emails via spam CAPTCHAs
Network of DDoS, data theft, Strong antivirus, avoid
Botnet
infected devices spam malware
Password & Virtual keyboard, 2FA,
Keyloggers Records keystrokes
credential theft malware scanner