The document discusses various topics related to cybersecurity including cyberspace, applications, types of attacks and attackers, security systems, challenges, and conclusions. It defines key terms like white hat, gray hat, and black hat attackers and types of common cyber attacks such as malware, phishing, ransomware, and denial of service attacks. The document emphasizes that public awareness and strong cryptographic protocols are needed to help reduce cyber attacks given their increasing sophistication and the untraceable nature of many threats.
2. • Cyberspace
• Applications
• Attacks in cyberspace
• Security system
• Security awareness
• Challenges in security system
• Conclusion
3. Cyberspace refers to the virtual computer world, and
more specifically, it is an electronic medium used to
make a global computer network to facilitate online
communication. - introduced by William Gibson in his
1984 book, “Neuromancer”.
5. • White hat attacker
• Gray hat attacker
• Black hat attacker
White hat hackers are often behind the scenes,
thwarting attacks in real time, or proactively
exposing weakness to try to help keep services
running and data protected. Additionally, white
hat hackers are often employed by businesses to
help assess and improve security.
A gray hat hacker (also spelled grey hat hacker) is
someone who may violate ethical standards or principles,
but without the malicious intent ascribed to black hat
hackers. Gray hat hackers may engage in practices that
seem less than completely above board, but are often
operating for the common good.
Black hat attackers are malicious hackers, sometimes
called crackers. Black hats lack ethics, sometimes
violate laws, and break into computer systems
with malicious intent, and they may violate the
confidentiality, integrity, or availability of an
organization's systems and data.
6. Malware
Phishing
Any kind of software that can
change the register value or
delete the system files
Cybercriminals craft
emails to fool a target
into taking some
harmful action
Ransomware
A Malware that encrypts a
victim’s files and demands
money to restore files
Denial of service
Brute force method to try
stop some online service
from working properly
Man in the middle
Attackers manage to interpose
themselves secretly between the
user and a web service
SQL injection
An attacker can exploit a
vulnerability to take control of a
victim's database
Zero-day exploits
7. • Information security
• Computer security
• Network security
• Application security
• Cloud security
• Mobile security
• Database and infrastructure security
8. What kind of security system is required?
Authenticity Confidentiality Integrity Availability
Authenticity
Password
based
Password
+
Biometric
based
Graphical
Password
based
Pattern
based
9. A company said to employees not to login after 12 am
due to some reasons, then also observation tells that
some employees do so. – Can cryptography technique
restrict them?
Cryptography Expert system
10. Security awareness is a formal process for training and
educating employees about IT protection. It includes:
1. Programs to educate employees
2. Individual responsibility for company security policies
3. Measures to audit these efforts
11. • Faulty design in cryptographic algorithms
• Physical tampering of e-devices
• Non-migratability of security frameworks
12. The volume and sophistication of cyber attacks grow, companies and
organizations, especially those that are tasked with safeguarding
information relating to national security, health, or financial records,
need to take steps to protect their sensitive business and personnel
information. The nation’s top intelligence officials cautioned that cyber
attacks and digital spying are the top threat to national security,
eclipsing even terrorism.
Public awareness along with flawless secure cyptographic protocol is the
only way to reduce the probable attacks in cyberspace. But, till now,
many more cyber attacks cannot be captured due to untraceable nature
of cyber threats.
13. [1] William Gibson, “Neuromancer”, revolutionized science fiction,1984.
[2] The Definition of Security Awareness :
https://resources.infosecinstitute.com/category/enterprise/securityawareness/#gref
[3] Xiao,Y., Jia, Y., Liu, C., Cheng, X., Yu, J., Lv, W.: Edge Computing Security: State of the Art and
Challenges. in Proceedings of the IEEE. vol. 107. no. 8 (2019) 1608–1631.
[4] White Hat Hackers: https://safebreach.com/White-Hat-Hackers
[5] Gray Hat Hacker: https://www.techopedia.com/definition/15450/gray-hat-hacker
[6] Black hats attacker: https://www.sciencedirect.com/topics/computer-science/black-hat-
hacker