Cyber security involves protecting computers, networks, programs and data from unauthorized access and cyber attacks. It aims to ensure confidentiality, integrity and availability of information. Key aspects of cyber security include authentication, authorization, network security, application security and information security. Authentication verifies a user's identity, while authorization determines their access privileges. Cyber threats can include cyber attacks, exploits, vulnerabilities and data breaches. Mitigation strategies and software patches help reduce damage from security incidents.
3. CYBER SECURITY (in short) :
Protection of computers &
other technological devices like data,
networks ,servers etc.
Formal definition:
It is a process designed to protect
networks and networking devices from attack
,damage or unauthorized access.
4. CYBER SPACE:
A place that is not real, where electronic messages
exist while they are being sent from one computer to another.
o Comparatively data is less secured in cyberspace and can be
stole easily.
o Thus minimal technical skills are enough to steal data.
5. Three main aspects of cyber security are:
Unauthorized access
Unauthorized deletion
Unauthorized modification
6. •Authentication is the process of verifying the
identity of a person or device.
•Authentication is the process that determines
whether users are who they claim to be.
•Authentication is often followed by
authorization..
7. It is a security mechanism used to determine user
privileges or access levels, related to system resources.
Authorization is the process that determines what
users can and cannot access.
Authorization is often preceded by authentication.
E.g.: The password verification step in opening a mail is
authentication and if the password, that you entered
happens to be correct , you will be authorized to
access the mails.
8. Cyber security is divided into :
Network security(module-3)
Application security(module-3)
Disaster recovery(module-5)
Operation security(module-5) and
Information security
9. CYBER SECURITY:
(i)To protect the resources(data and devices) from
attacks in cyberspace.
(ii)Concerned with analyzing attacks and framing
security measures, to prevent such attacks in future.
INFORMATION SECURITY:
(i)To protect data from any sort of threats.
(ii)Prioritizes data first rather than concerning
attacks.
10. In 2019, effects of cyber crimes have cost $2trillion which in 2021,
would be $6trillion.
The more secured your system is, the lesser is the risk.
If you have a secured system you won’t be an easy target for an
attacker.
11.
12. CONFIDENTIALITY: (privacy)
It is the security principle or set of rules
that control access to information.
Integrity: (correctness, accuracy, consistency)
(i)Maintaining the accuracy and consistency of
data over its entire lifetime.
(ii)Unauthorized modifications should not occur.
Availability:
Ability of the user to access information or
resources in the correct format as and when they
need them.
15. CAPTCHA:
A computer program or system intended to
distinguish human from machine input.
CAPTCHA is an acronym that stands for
"Completely Automated Public Turing test to
tell Computers and Humans Apart .“
A computer program such as a bot will be unable
to interpret the distorted letters, while a human
being can interpret them.
16. CYBER ATTACK:
CYBER THREATS:
A cyber attack is an assault launched by cybercriminals
using one or more computers against a single or
multiple computers or networks.
Cyber threats are malicious attempts to cause
disruptions to a computer system or network by stealing
valuable data or accessing unauthorized files.
17. EXPLOIT:
VULNERABILITY:
An exploit is a piece of software, a chunk of data, or a
sequence of commands that takes advantage of a
vulnerability to cause damage.
( to use something to one’s own advantage)
Vulnerability is a weakness which can be exploited by
a threat actor, such as an attacker, to perform
unauthorized actions.
18. MITIGATION:
DATA BREACH:
PATCH:
Data breach is a confirmed incident in which sensitive,
confidential or protected data has been accessed and/or
disclosed in an unauthorized fashion .
Threat Mitigation refers to the policies or the processes used to,
lessen the extent of a damage , when security attacks happen.
A patch is a small piece of software that a company issues
whenever a security flaw is uncovered.
19. AUTHENTICATION
VALIDATING OR VERIFYING AN IDENTITY OF A
USER BEFORE ALLOWING ACCESS.
TWO PHASES:
IDENTIFICATION
ACTUAL AUTHENTICATION
IDENTIFICATION – THE USER ID YOU ENTER.
ACTUAL AUTHENTICATION – PASSWORD OR PIN
20. It is a security process in which users provide two
different authentication factors to verify themselves.
Two-factor authentication methods rely on a user
providing a password, as well as a second factor,
usually either a security token
80% of data breaches can be prevented by 2FA.
Less than 10% of users adopted 2FA over the course
of over 7 years.
TWO FACTOR AUTHENTICATION
21. MFA: IT IS THE MOST SOPHISTICATED AUTHENTICATION METHOD THAT
USES 2 OR MORE INDEPENDENT FACTORS TO GRANT USER ACCESS TO A
SYSTEM.
Something you know - a password or a pin
Something you have - mobile phone or a security token
Something you are - fingerprint or Face ID
Something you do - typing speed, locational information
MULTI FACTOR AUTHENTICATION