2. What is Optical
Fiber?
● Optical fiber is the technology associated with
data transmission using light pulses travelling
along with a long fiber which is usually made of
plastic or glass.
● Optical fibers are also unaffected by
electromagnetic interference. The fiber optical
cable uses the application of total internal
reflection of light.
● The fibers are designed such that they facilitate
the propagation of light along with the optical
fiber depending on the requirement of power and
distance of transmission.
3. TYPES OF OPTICAL
FIBRES:
The types of optical fibers depend on the refractive index, materials
used, and mode of propagation of light.
The classification based on the refractive index is as follows:
● Step Index Fibers: It consists of a core surrounded by the
cladding, which has a single uniform index of refraction.
● Graded Index Fibers: The refractive index of the optical fiber
decreases as the radial distance from the fiber axis increases.
The classification based on the materials used is as follows:
● Plastic Optical Fibers: The poly methyl methacrylate is used
as a core material for the transmission of the light.
● Glass Fibers: It consists of extremely fine glass fibers.
The classification based on the mode of propagation of light is as
follows:
● Single-Mode Fibers: These fibers are used for long-distance
transmission of signals.
● Multimode Fibers: These fibers are used for short-distance
transmission of signals.
The mode of propagation and refractive index of the core is used to
form four combination types of optic fibers as follows:
● Step index-single mode fibers
● Graded index-Single mode fibers
● Step index-Multimode fibers
● Graded index-Multimode fibers
4. HOW DOES THE
OPTICAL FIBRE
WORK?
● Optical fiber works on the principle of total internal
reflection. Light rays can be used to transmit a huge amount
of data, but there is a problem here – the light rays travel in
straight lines.
● So unless we have a long straight wire without any bends at
all, harnessing this advantage will be very tedious.
● Instead, the optical cables are designed such that they bend
all the light rays’ inwards (using TIR). Light rays travel
continuously, bouncing off the optical fiber walls and
transmitting end to end data.
● Although light signals do degrade over progressing
distances, depending on the purity of the material used, the
loss is much less compared to using metal cables.
5. A Fibre Optic Relay System consists of the
following components:
● The Transmitter – It produces the light
signals and encodes them to fit to transmit.
● The Optical Fibre – The medium for
transmitting the light pulse (signal).
● The Optical Receiver – It receives the
transmitted light pulse (signal) and decodes
them to be fit to use.
● The Optical Regenerator – Necessary for
long-distance data transmission.
7. WHAT IS
CYBERSECURITY?
Cybersecurity is the protection of
internet-connected systems such as hardware,
software and data from cyberthreats. The
practice is used by individuals and enterprises
to protect against unauthorized access to data
centers and other computerized systems.
8. IMPORTANCE OF
CYBERSECURITY?
With an increasing number of users, devices and
programs in the modern enterprise, combined
with the increased deluge of data -- much of
which is sensitive or confidential -- the
importance of cybersecurity continues to grow.
The growing volume and sophistication of cyber
attackers and attack techniques compound the
problem even further.
9. BENEFITS OF
CYBERSECURITY:
The benefits of implementing and maintaining
cybersecurity practices include:
● Business protection against cyberattacks and
data breaches.
● Protection for data and networks.
● Prevention of unauthorized user access.
● Improved recovery time after a breach.
● Protection for end users and endpoint devices.
● Regulatory compliance.
● Business continuity.
● Improved confidence in the company's
reputation and trust for developers, partners,
customers, stakeholders and employees.
10. TYPES OF
THREATS:
● Malware is a form of malicious software in which any
file or program can be used to harm a computer user.
This includes worms, viruses, Trojans and spyware.
● Ransomware is another type of malware. It involves an
attacker locking the victim's computer system files --
typically through encryption -- and demanding a
payment to decrypt and unlock them.
● Social engineering is an attack that relies on human
interaction to trick users into breaking security
procedures to gain sensitive information that is
typically protected.
● Phishing is a form of social engineering where
fraudulent email or text messages that resemble those
from reputable or known sources are sent. Often
random attacks, the intent of these messages is to steal
sensitive data, such as credit card or login
11. TYPES OF
THREATS:
● Spear phishing is a type of phishing attack that has an
intended target user, organization or business.
● Insider threats are security breaches or losses caused by
humans -- for example, employees, contractors or customers.
Insider threats can be malicious or negligent in nature.
● Distributed denial-of-service (DDoS) attacks are those in
which multiple systems disrupt the traffic of a targeted
system, such as a server, website or other network resource.
By flooding the target with messages, connection requests or
packets, the attackers can slow the system or crash it,
preventing legitimate traffic from using it.
● Advanced persistent threats (APTs) are prolonged targeted
attacks in which an attacker infiltrates a network and remains
undetected for long periods of time with the aim to steal data.
● Man-in-the-middle (MitM) attacks are eavesdropping attacks
that involve an attacker intercepting and relaying messages
between two parties who believe
12. CHALLENGES OF
CYBERSECURITY:
1. Ransomware Evolution
Ransomware is a type of malware in which the data on a victim's
computer is locked, and payment is demanded before the ransomed
data is unlocked. After successful payment, access rights returned
to the victim. Ransomware is the bane of cybersecurity, data
professionals, IT, and executives.
2. Blockchain Revolution
Blockchain technology is the most important invention in
computing era. It is the first time in human history that we have a
genuinely native digital medium for peer-to-peer value exchange.
The blockchain is a technology that enables cryptocurrencies like
Bitcoin. The blockchain is a vast global platform that allows two or
more parties to do a transaction or do business without needing a
third party for establishing trust.
13. CHALLENGES OF
CYBERSECURITY:
3. IoT Threats
IoT stands for Internet of Things. It is a system of interrelated
physical devices which can be accessible through the internet. The
connected physical devices have a unique identifier (UID) and have the
ability to transfer data over a network without any requirements of
the human-to-human or human-to-computer interaction. The
firmware and software which is running on IoT devices make
consumer and businesses highly susceptible to cyber-attacks.
4. AI Expansion
AI short form is Artificial intelligence. According to John McCarthy,
father of Artificial Intelligence defined AI: "The science and
engineering of making intelligent machines, especially intelligent
computer programs."
5. Serverless Apps Vulnerability
Serverless architecture and apps is an application which depends on
third-party cloud infrastructure or on a back-end service such as
google cloud function, Amazon web services (AWS) lambda, etc. The
serverless apps invite the cyber attackers to spread threats on their
system easily because the users access the application locally or
off-server on their device.