Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Interview

Cyber Security of Annappa Sir

Rating
-
Sold
-
Pages
43
Uploaded on
27-07-2023
Written in
2021/2022

Interview of 43 pages for the course Eng at Sixth year / 12th Grade (Well Good book)

Institution
Course

Content preview

Cyber Security: Week-1
The history of Cybersecurity:
 About 40 years ago words like worms, viruses, trojan-horse,
horse, spyware, malware weren’t even a part of
conventional information technology (IT) vocabulary. Cybersecurity only came into existence because of the
development of viruses. But how did we get here?
 The history of cybersecurity began as a research project. In the 1970’s, Robert Thomas, a researcher for BBN
nologies in Cambridge, Massachusetts, created the first computer “worm”. It was called The Creeper. The
Technologies
Creeper, infected computers by hopping from system to system with the message “I’M THE CREEPER:
CATCH ME IF YOU CAN.”
 em created a replicating program called The Reaper, the first antivirus
Ray Tomlinson, the inventor of email,
software, which would chase Creeper and delete it.
 Late in 1988, a man named Robert Morris had an idea: he wanted to test the size of the internet. To do this, he
wrote a program that went through networks, invaded Unix terminals, and copied itself. The Morris worm was
so aggressive that it slowed down computers to the point of being unusable. He subsequently became the first
person to be convicted under Computer Fraud and Abuse Act.
 From that point forward, viruses became deadlier, more invasive, and harder to control. With it came the advent
of cybersecurity.

Purpose and Importance:
Why we need Cybersecurity?




 the internet, and we general users are almost ignorant
It can be rightfully said that today’s generation lives on the
as to how those random bits of 1’s and 0’s reach securely to our computer.
 For a hacker, it’s a golden age. With so many access points, public IP’s and constant traffic and tons of data to
ck hat hackers, are having one hell of a time exploiting vulnerabilities and creating malicious
exploit, black
software for the same.
 attacks are evolving by the day. Hackers are becoming smarter and more creative with their
Above that, cyber-attacks
malware and how they bypass virus scans and firewalls still baffles many people.
 Therefore there has to be some sort of protocol that protects us against all these cyberattacks and makes sure
our data doesn’t fall into the wrong hands. This is exactly why we need cybersecurity.
cybersecurity




GPT Athani-Dept.of CSE Page 1 Annappa Kyamangol, L/CS

, Cyber Security: Week-1
Why is cybersecurity important?

Listed below are the reasons why cybersecurity is so important in what’s become a predominant digital world:
 With each passing year, the sheer volume of threats is increasing rapidly. According to the report by
McAfee, cybercrime now stands at over $400 billion, while it was $250 billion two years ago.
 Cyber attacks can be extremely expensive for businesses to endure. In addition to financial damage
suffered by the business, a data breach can also inflict untold reputational damage.
 Cyber-attacks these days are becoming progressively destructive. Cybercriminals are using more
sophisticated ways to initiate cyber attacks.
 Regulations such as GDPR are forcing organizations into taking better care of the personal data they hold.
 Because of the above reasons, cybersecurity has become an important part of the business and the focus now is
on developing appropriate response plans that minimize the damage in the event of a cyber attack. But, an
organization or an individual can develop a proper response plan only when he has a good grip on
cybersecurity fundamentals.

Introduction and Basic concepts of cyber security
What is cyber security?
 Cyber security is the protection of Internet-connected systems, including hardware, software, and data
from cyber attacks.
 It is made up of two words one is cyber and other is security. Cyber is related to the technology which contains
systems, network and programs or data. Whereas security related to the protection which includes systems
security, network security and application and information security.
 It is the body of technologies, processes, and practices designed to protect networks, devices, programs, and
data from attack, theft, damage, modification or unauthorized access.
 Cyber safety is the safe and responsible use of information and communication technology. It is about keeping
information safe and secure and also about being responsible with that information.
 Cyber Crime: The crime that uses computer and Internet is called cyber crime. It is committed against an
individual or a group. It can also be committed against government or private organizations.
Brief awareness on cyber safety measures
 Keep personal information professional and limited.
 Keep privacy settings on.
 Practice safe browsing.
 Make sure Internet connection is secure.
 Be careful what you download.
 Choose strong passwords.
 Make online purchases from secure sites.
 Keep antivirus program up to date.
 Change your passwords.
 Block or report.
Identification of basic security issues in mobile phones and personal computers:
Basic security issues in mobile phone-
 Data leakage
 Unsecured Wi-Fi
 Network Spoofing
 Phishing Attacks
GPT Athani-Dept.of CSE Page 2 Annappa Kyamangol, L/CS

, Cyber Security: Week-1
 Spyware
 Broken cryptography
 Improper session handling
 Lost or stolen device.
Basic security issues in personal computers-
Computer Viruses
Computer worm
Adware and spyware
Root kit
Hackers and Predators
Phishing
Rogue security software
Trojan horse
Security principles CIA, AAA :
The CIA Triad
 Confidentiality, integrity, and availability, also known as the CIA triad, is a model designed to guide
companies and organizations to form their security policies. Technically, cybersecurity means protecting
information from unauthorized access, unauthorized modification, and unauthorized deletion in order to
provide confidentiality, integrity, and availability.




i) Confidentiality
 Confidentiality is about preventing the disclosure of data to unauthorized parties. It also means trying to keep
the identity of authorized parties involved in sharing and holding data private and anonymous. Often
confidentiality is compromised by cracking poorly encrypted data, Man-in-the-middle(MITM) attacks,
disclosing sensitive data.
 Standard measures to establish confidentiality include:
 Data encryption
 Two-factor authentication
 Biometric verification
 Security tokens




GPT Athani-Dept.of CSE Page 3 Annappa Kyamangol, L/CS

, Cyber Security: Week-1
ii) Integrity
 Integrity refers to protecting information from being modified by unauthorized parties. It is a requirement that
information and programs are changed only in a specified and authorized manner. Challenges that could
endanger integrity include turning a machine into a “zombie computer”, embedding malware into web pages.
 Standard measures to guarantee integrity include:
 Cryptographic checksums
 Using file permissions
 Uninterrupted power supplies
 Data backups


iii) Availability
 Availability is making sure that authorized parties are able to access the information when needed. Data only
has value if the right people can access it at the right time. Information unavailability can occur due to security
incidents such as DDoS attacks, hardware failures, programming errors, human errors.
 Standard measures to guarantee availability include:
 Backing up data to external drives
 Implementing firewalls
 Having backup power supplies
 Data redundancy


 All cyber attacks have the potential to threaten one or more of the three parts of the CIA triad. Confidentiality,
integrity, and availability all have to work together to keep your information secure. So, It’s important to
understand what the CIA Triad is, how it is used to plan and implement a quality security policy while
understanding the various principles behind it.




GPT Athani-Dept.of CSE Page 4 Annappa Kyamangol, L/CS

Written for

Institution
Secondary school
Course
School year
1

Document information

Uploaded on
July 27, 2023
Number of pages
43
Written in
2021/2022
Type
INTERVIEW
Company
Unknown
Person
Unknown

Subjects

$8.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
shanteshkhanadale

Get to know the seller

Seller avatar
shanteshkhanadale
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
2 year
Number of followers
0
Documents
1
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions