Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Class notes

BASICS OF CYBER SECURITY

Rating
-
Sold
-
Pages
27
Uploaded on
28-01-2025
Written in
2024/2025

These notes will allow you to know about all the basics of cyber security. Read then and become a ethical hacker

Institution
Course

Content preview

Unit-1
Cyber Security


CYBERSPACE-Cyberspace can be defined as an intricate environment that involves
interactions between people, software, and services. It is maintained by the worldwide
distribution of information and communication technology devices and networks. With
the benefits of technological advancements, cyberspace today has become a common
pool used by citizens, businesses, critical information infrastructure, the military, and
governments in a fashion that makes it hard to induce clear boundaries among these
different groups. Cyberspace is anticipated to become even more complex in the
upcoming years, with the increase in networks and devices connected to it.

What is cyber security? "Cyber security is primarily about people, processes, and
technologies working together to encompass the full range of threat reduction,
vulnerability reduction, deterrence, international engagement, incident response,
resiliency, and recovery policies and activities, including computer network operations,
information assurance, law enforcement, etc." OR Cyber security is the body of
technologies, processes, and practices designed to protect networks, computers,
programs, and data from attack, damage, or unauthorized access.
Advantages of cyber security: some of the advantages of cyber security.
1. Protection of Sensitive Data:

Cyber security actions shield sensitive data from unsanctioned access, aiding in
maintaining privacy and averting identity theft.

2. Business Continuity:

By preventing cyber attacks, organizations can ensure the availability of their systems
and services, minimizing downtime and potential losses.

3. Compliance with Regulations:

Adhering to cyber security standards and regulations can protect businesses from legal
issues and potential fines.

4. Enhanced Customer Trust:

One of the major benefits of cyber security is building customer trust. A strong cyber
security posture helps organizations build trust with their customers, partners, and
stakeholders.

5. Competitive Benefit:

,Companies with robust cyber security measures in place are less vulnerable to cyber-
attacks and can gain a competitive edge over competitors who may not prioritize
security.



6. Early Detection and Response:

Proactive cyber security measures can help organizations detect threats early and
respond effectively, minimizing potential damage and disruption.

7. Intellectual Property Protection:

Robust cyber security helps protect intellectual property (IP), such as patents, trade
secrets, and copyrighted material, ensuring the organization’s competitive advantage is
maintained.

8. Reputation Protection:

A strong cyber security posture helps organizations avoid reputational damage caused
by data breaches and other cyber incidents, which can lead to loss of customer trust
and decreased business opportunities.

9. Enhanced Collaboration:

Secure communication platforms and tools enable teams to collaborate effectively and
share sensitive information without worrying about unauthorized access or data leaks.

10. Remote Work Security:

As remote work becomes increasingly common, cyber security measures ensure the
secure access and use of organizational resources, maintaining productivity while
reducing risks associated with remote work environments.

Disadvantages of Cyber Security: Some disadvantages as well they include:
1. High Cost of Implementation:

Implementing advanced cyber security measures can be expensive, particularly for small
businesses with limited resources. This includes the cost of hardware, and software, and
hiring skilled professionals to maintain and manage the security infrastructure.

2. Complex Management:

As cyber threats continue to evolve, managing the various components of cyber security
becomes increasingly complex. This can be particularly challenging for businesses with
limited technical expertise.

3. Potential False Sense of Security:

Implementing cyber security measures may sometimes lead to a false sense of security,
causing organizations to overlook other aspects of risk management, such as employee
training and physical security.

4. Compatibility Issues:

, Cyber security tools and solutions may not always be compatible with existing systems
and software, leading to integration challenges and potential security gaps.

4. Inconvenience to Users:

Strict security protocols, such as multi-factor authentication and frequent password
changes, can sometimes lead to inconvenience and reduced productivity among users.

6. Evolving Threat Landscape:

Cyber threats are constantly evolving, making it difficult to keep up with the latest security
measures and tools. Organizations must continually invest in research and development to
stay ahead of potential attacks.

7. Human Error:

Despite the best security measures in place, human error remains a significant risk
factor. Users may inadvertently compromise systems through poor password practices,
social engineering, or other mistakes.

8. Limited Effectiveness Against Insider Threats:

Cyber security measures may not always be effective against malicious insiders who
have legitimate access to systems and data, making it challenging to detect and
prevent insider attacks.

9. Difficulties in Measuring ROI:

Measuring the return on investment (ROI) in cyber security can be challenging, as it is
often difficult to quantify the value of prevention or the impact of a successful cyber
attack.

10. Balancing Security and Usability:

Implementing stringent cyber security measures can sometimes hinder user experience
and productivity, making it challenging for organizations to find the right balance
between security and usability.

Types of Cyber security:

Every organization's assets are the combinations of a variety of different systems.
These systems have a strong cybersecurity posture that requires coordinated efforts
across all of its systems. Therefore, we can categorize cybersecurity in the following
sub-domains:
o Network Security: It involves implementing the hardware and software to secure
a computer network from unauthorized access, intruders, attacks, disruption, and
misuse. This security helps an organization to protect its assets against external
and internal threats.
o Application Security: It involves protecting the software and devices from
unwanted threats. This protection can be done by constantly updating the apps to

Written for

Institution
Course

Document information

Uploaded on
January 28, 2025
Number of pages
27
Written in
2024/2025
Type
Class notes
Professor(s)
None
Contains
All classes

Subjects

$8.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
vaidikog

Get to know the seller

Seller avatar
vaidikog Teerthankar mahaveer university
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
1 year
Number of followers
0
Documents
1
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions