Cyber Security: Week-1
The history of Cybersecurity:
About 40 years ago words like worms, viruses, trojan-horse,
horse, spyware, malware weren’t even a part of
conventional information technology (IT) vocabulary. Cybersecurity only came into existence because of the
development of viruses. But how did we get here?
The history of cybersecurity began as a research project. In the 1970’s, Robert Thomas, a researcher for BBN
nologies in Cambridge, Massachusetts, created the first computer “worm”. It was called The Creeper. The
Technologies
Creeper, infected computers by hopping from system to system with the message “I’M THE CREEPER:
CATCH ME IF YOU CAN.”
em created a replicating program called The Reaper, the first antivirus
Ray Tomlinson, the inventor of email,
software, which would chase Creeper and delete it.
Late in 1988, a man named Robert Morris had an idea: he wanted to test the size of the internet. To do this, he
wrote a program that went through networks, invaded Unix terminals, and copied itself. The Morris worm was
so aggressive that it slowed down computers to the point of being unusable. He subsequently became the first
person to be convicted under Computer Fraud and Abuse Act.
From that point forward, viruses became deadlier, more invasive, and harder to control. With it came the advent
of cybersecurity.
Purpose and Importance:
Why we need Cybersecurity?
the internet, and we general users are almost ignorant
It can be rightfully said that today’s generation lives on the
as to how those random bits of 1’s and 0’s reach securely to our computer.
For a hacker, it’s a golden age. With so many access points, public IP’s and constant traffic and tons of data to
ck hat hackers, are having one hell of a time exploiting vulnerabilities and creating malicious
exploit, black
software for the same.
attacks are evolving by the day. Hackers are becoming smarter and more creative with their
Above that, cyber-attacks
malware and how they bypass virus scans and firewalls still baffles many people.
Therefore there has to be some sort of protocol that protects us against all these cyberattacks and makes sure
our data doesn’t fall into the wrong hands. This is exactly why we need cybersecurity.
cybersecurity
GPT Athani-Dept.of CSE Page 1 Annappa Kyamangol, L/CS
, Cyber Security: Week-1
Why is cybersecurity important?
Listed below are the reasons why cybersecurity is so important in what’s become a predominant digital world:
With each passing year, the sheer volume of threats is increasing rapidly. According to the report by
McAfee, cybercrime now stands at over $400 billion, while it was $250 billion two years ago.
Cyber attacks can be extremely expensive for businesses to endure. In addition to financial damage
suffered by the business, a data breach can also inflict untold reputational damage.
Cyber-attacks these days are becoming progressively destructive. Cybercriminals are using more
sophisticated ways to initiate cyber attacks.
Regulations such as GDPR are forcing organizations into taking better care of the personal data they hold.
Because of the above reasons, cybersecurity has become an important part of the business and the focus now is
on developing appropriate response plans that minimize the damage in the event of a cyber attack. But, an
organization or an individual can develop a proper response plan only when he has a good grip on
cybersecurity fundamentals.
Introduction and Basic concepts of cyber security
What is cyber security?
Cyber security is the protection of Internet-connected systems, including hardware, software, and data
from cyber attacks.
It is made up of two words one is cyber and other is security. Cyber is related to the technology which contains
systems, network and programs or data. Whereas security related to the protection which includes systems
security, network security and application and information security.
It is the body of technologies, processes, and practices designed to protect networks, devices, programs, and
data from attack, theft, damage, modification or unauthorized access.
Cyber safety is the safe and responsible use of information and communication technology. It is about keeping
information safe and secure and also about being responsible with that information.
Cyber Crime: The crime that uses computer and Internet is called cyber crime. It is committed against an
individual or a group. It can also be committed against government or private organizations.
Brief awareness on cyber safety measures
Keep personal information professional and limited.
Keep privacy settings on.
Practice safe browsing.
Make sure Internet connection is secure.
Be careful what you download.
Choose strong passwords.
Make online purchases from secure sites.
Keep antivirus program up to date.
Change your passwords.
Block or report.
Identification of basic security issues in mobile phones and personal computers:
Basic security issues in mobile phone-
Data leakage
Unsecured Wi-Fi
Network Spoofing
Phishing Attacks
GPT Athani-Dept.of CSE Page 2 Annappa Kyamangol, L/CS
, Cyber Security: Week-1
Spyware
Broken cryptography
Improper session handling
Lost or stolen device.
Basic security issues in personal computers-
Computer Viruses
Computer worm
Adware and spyware
Root kit
Hackers and Predators
Phishing
Rogue security software
Trojan horse
Security principles CIA, AAA :
The CIA Triad
Confidentiality, integrity, and availability, also known as the CIA triad, is a model designed to guide
companies and organizations to form their security policies. Technically, cybersecurity means protecting
information from unauthorized access, unauthorized modification, and unauthorized deletion in order to
provide confidentiality, integrity, and availability.
i) Confidentiality
Confidentiality is about preventing the disclosure of data to unauthorized parties. It also means trying to keep
the identity of authorized parties involved in sharing and holding data private and anonymous. Often
confidentiality is compromised by cracking poorly encrypted data, Man-in-the-middle(MITM) attacks,
disclosing sensitive data.
Standard measures to establish confidentiality include:
Data encryption
Two-factor authentication
Biometric verification
Security tokens
GPT Athani-Dept.of CSE Page 3 Annappa Kyamangol, L/CS
, Cyber Security: Week-1
ii) Integrity
Integrity refers to protecting information from being modified by unauthorized parties. It is a requirement that
information and programs are changed only in a specified and authorized manner. Challenges that could
endanger integrity include turning a machine into a “zombie computer”, embedding malware into web pages.
Standard measures to guarantee integrity include:
Cryptographic checksums
Using file permissions
Uninterrupted power supplies
Data backups
iii) Availability
Availability is making sure that authorized parties are able to access the information when needed. Data only
has value if the right people can access it at the right time. Information unavailability can occur due to security
incidents such as DDoS attacks, hardware failures, programming errors, human errors.
Standard measures to guarantee availability include:
Backing up data to external drives
Implementing firewalls
Having backup power supplies
Data redundancy
All cyber attacks have the potential to threaten one or more of the three parts of the CIA triad. Confidentiality,
integrity, and availability all have to work together to keep your information secure. So, It’s important to
understand what the CIA Triad is, how it is used to plan and implement a quality security policy while
understanding the various principles behind it.
GPT Athani-Dept.of CSE Page 4 Annappa Kyamangol, L/CS
The history of Cybersecurity:
About 40 years ago words like worms, viruses, trojan-horse,
horse, spyware, malware weren’t even a part of
conventional information technology (IT) vocabulary. Cybersecurity only came into existence because of the
development of viruses. But how did we get here?
The history of cybersecurity began as a research project. In the 1970’s, Robert Thomas, a researcher for BBN
nologies in Cambridge, Massachusetts, created the first computer “worm”. It was called The Creeper. The
Technologies
Creeper, infected computers by hopping from system to system with the message “I’M THE CREEPER:
CATCH ME IF YOU CAN.”
em created a replicating program called The Reaper, the first antivirus
Ray Tomlinson, the inventor of email,
software, which would chase Creeper and delete it.
Late in 1988, a man named Robert Morris had an idea: he wanted to test the size of the internet. To do this, he
wrote a program that went through networks, invaded Unix terminals, and copied itself. The Morris worm was
so aggressive that it slowed down computers to the point of being unusable. He subsequently became the first
person to be convicted under Computer Fraud and Abuse Act.
From that point forward, viruses became deadlier, more invasive, and harder to control. With it came the advent
of cybersecurity.
Purpose and Importance:
Why we need Cybersecurity?
the internet, and we general users are almost ignorant
It can be rightfully said that today’s generation lives on the
as to how those random bits of 1’s and 0’s reach securely to our computer.
For a hacker, it’s a golden age. With so many access points, public IP’s and constant traffic and tons of data to
ck hat hackers, are having one hell of a time exploiting vulnerabilities and creating malicious
exploit, black
software for the same.
attacks are evolving by the day. Hackers are becoming smarter and more creative with their
Above that, cyber-attacks
malware and how they bypass virus scans and firewalls still baffles many people.
Therefore there has to be some sort of protocol that protects us against all these cyberattacks and makes sure
our data doesn’t fall into the wrong hands. This is exactly why we need cybersecurity.
cybersecurity
GPT Athani-Dept.of CSE Page 1 Annappa Kyamangol, L/CS
, Cyber Security: Week-1
Why is cybersecurity important?
Listed below are the reasons why cybersecurity is so important in what’s become a predominant digital world:
With each passing year, the sheer volume of threats is increasing rapidly. According to the report by
McAfee, cybercrime now stands at over $400 billion, while it was $250 billion two years ago.
Cyber attacks can be extremely expensive for businesses to endure. In addition to financial damage
suffered by the business, a data breach can also inflict untold reputational damage.
Cyber-attacks these days are becoming progressively destructive. Cybercriminals are using more
sophisticated ways to initiate cyber attacks.
Regulations such as GDPR are forcing organizations into taking better care of the personal data they hold.
Because of the above reasons, cybersecurity has become an important part of the business and the focus now is
on developing appropriate response plans that minimize the damage in the event of a cyber attack. But, an
organization or an individual can develop a proper response plan only when he has a good grip on
cybersecurity fundamentals.
Introduction and Basic concepts of cyber security
What is cyber security?
Cyber security is the protection of Internet-connected systems, including hardware, software, and data
from cyber attacks.
It is made up of two words one is cyber and other is security. Cyber is related to the technology which contains
systems, network and programs or data. Whereas security related to the protection which includes systems
security, network security and application and information security.
It is the body of technologies, processes, and practices designed to protect networks, devices, programs, and
data from attack, theft, damage, modification or unauthorized access.
Cyber safety is the safe and responsible use of information and communication technology. It is about keeping
information safe and secure and also about being responsible with that information.
Cyber Crime: The crime that uses computer and Internet is called cyber crime. It is committed against an
individual or a group. It can also be committed against government or private organizations.
Brief awareness on cyber safety measures
Keep personal information professional and limited.
Keep privacy settings on.
Practice safe browsing.
Make sure Internet connection is secure.
Be careful what you download.
Choose strong passwords.
Make online purchases from secure sites.
Keep antivirus program up to date.
Change your passwords.
Block or report.
Identification of basic security issues in mobile phones and personal computers:
Basic security issues in mobile phone-
Data leakage
Unsecured Wi-Fi
Network Spoofing
Phishing Attacks
GPT Athani-Dept.of CSE Page 2 Annappa Kyamangol, L/CS
, Cyber Security: Week-1
Spyware
Broken cryptography
Improper session handling
Lost or stolen device.
Basic security issues in personal computers-
Computer Viruses
Computer worm
Adware and spyware
Root kit
Hackers and Predators
Phishing
Rogue security software
Trojan horse
Security principles CIA, AAA :
The CIA Triad
Confidentiality, integrity, and availability, also known as the CIA triad, is a model designed to guide
companies and organizations to form their security policies. Technically, cybersecurity means protecting
information from unauthorized access, unauthorized modification, and unauthorized deletion in order to
provide confidentiality, integrity, and availability.
i) Confidentiality
Confidentiality is about preventing the disclosure of data to unauthorized parties. It also means trying to keep
the identity of authorized parties involved in sharing and holding data private and anonymous. Often
confidentiality is compromised by cracking poorly encrypted data, Man-in-the-middle(MITM) attacks,
disclosing sensitive data.
Standard measures to establish confidentiality include:
Data encryption
Two-factor authentication
Biometric verification
Security tokens
GPT Athani-Dept.of CSE Page 3 Annappa Kyamangol, L/CS
, Cyber Security: Week-1
ii) Integrity
Integrity refers to protecting information from being modified by unauthorized parties. It is a requirement that
information and programs are changed only in a specified and authorized manner. Challenges that could
endanger integrity include turning a machine into a “zombie computer”, embedding malware into web pages.
Standard measures to guarantee integrity include:
Cryptographic checksums
Using file permissions
Uninterrupted power supplies
Data backups
iii) Availability
Availability is making sure that authorized parties are able to access the information when needed. Data only
has value if the right people can access it at the right time. Information unavailability can occur due to security
incidents such as DDoS attacks, hardware failures, programming errors, human errors.
Standard measures to guarantee availability include:
Backing up data to external drives
Implementing firewalls
Having backup power supplies
Data redundancy
All cyber attacks have the potential to threaten one or more of the three parts of the CIA triad. Confidentiality,
integrity, and availability all have to work together to keep your information secure. So, It’s important to
understand what the CIA Triad is, how it is used to plan and implement a quality security policy while
understanding the various principles behind it.
GPT Athani-Dept.of CSE Page 4 Annappa Kyamangol, L/CS