Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Interview

Cyber Security of Annappa Sir

Beoordeling
-
Verkocht
-
Pagina's
43
Geüpload op
27-07-2023
Geschreven in
2021/2022

Interview of 43 pages for the course Eng at Sixth year / 12th Grade (Well Good book)

Instelling
Vak

Voorbeeld van de inhoud

Cyber Security: Week-1
The history of Cybersecurity:
 About 40 years ago words like worms, viruses, trojan-horse,
horse, spyware, malware weren’t even a part of
conventional information technology (IT) vocabulary. Cybersecurity only came into existence because of the
development of viruses. But how did we get here?
 The history of cybersecurity began as a research project. In the 1970’s, Robert Thomas, a researcher for BBN
nologies in Cambridge, Massachusetts, created the first computer “worm”. It was called The Creeper. The
Technologies
Creeper, infected computers by hopping from system to system with the message “I’M THE CREEPER:
CATCH ME IF YOU CAN.”
 em created a replicating program called The Reaper, the first antivirus
Ray Tomlinson, the inventor of email,
software, which would chase Creeper and delete it.
 Late in 1988, a man named Robert Morris had an idea: he wanted to test the size of the internet. To do this, he
wrote a program that went through networks, invaded Unix terminals, and copied itself. The Morris worm was
so aggressive that it slowed down computers to the point of being unusable. He subsequently became the first
person to be convicted under Computer Fraud and Abuse Act.
 From that point forward, viruses became deadlier, more invasive, and harder to control. With it came the advent
of cybersecurity.

Purpose and Importance:
Why we need Cybersecurity?




 the internet, and we general users are almost ignorant
It can be rightfully said that today’s generation lives on the
as to how those random bits of 1’s and 0’s reach securely to our computer.
 For a hacker, it’s a golden age. With so many access points, public IP’s and constant traffic and tons of data to
ck hat hackers, are having one hell of a time exploiting vulnerabilities and creating malicious
exploit, black
software for the same.
 attacks are evolving by the day. Hackers are becoming smarter and more creative with their
Above that, cyber-attacks
malware and how they bypass virus scans and firewalls still baffles many people.
 Therefore there has to be some sort of protocol that protects us against all these cyberattacks and makes sure
our data doesn’t fall into the wrong hands. This is exactly why we need cybersecurity.
cybersecurity




GPT Athani-Dept.of CSE Page 1 Annappa Kyamangol, L/CS

, Cyber Security: Week-1
Why is cybersecurity important?

Listed below are the reasons why cybersecurity is so important in what’s become a predominant digital world:
 With each passing year, the sheer volume of threats is increasing rapidly. According to the report by
McAfee, cybercrime now stands at over $400 billion, while it was $250 billion two years ago.
 Cyber attacks can be extremely expensive for businesses to endure. In addition to financial damage
suffered by the business, a data breach can also inflict untold reputational damage.
 Cyber-attacks these days are becoming progressively destructive. Cybercriminals are using more
sophisticated ways to initiate cyber attacks.
 Regulations such as GDPR are forcing organizations into taking better care of the personal data they hold.
 Because of the above reasons, cybersecurity has become an important part of the business and the focus now is
on developing appropriate response plans that minimize the damage in the event of a cyber attack. But, an
organization or an individual can develop a proper response plan only when he has a good grip on
cybersecurity fundamentals.

Introduction and Basic concepts of cyber security
What is cyber security?
 Cyber security is the protection of Internet-connected systems, including hardware, software, and data
from cyber attacks.
 It is made up of two words one is cyber and other is security. Cyber is related to the technology which contains
systems, network and programs or data. Whereas security related to the protection which includes systems
security, network security and application and information security.
 It is the body of technologies, processes, and practices designed to protect networks, devices, programs, and
data from attack, theft, damage, modification or unauthorized access.
 Cyber safety is the safe and responsible use of information and communication technology. It is about keeping
information safe and secure and also about being responsible with that information.
 Cyber Crime: The crime that uses computer and Internet is called cyber crime. It is committed against an
individual or a group. It can also be committed against government or private organizations.
Brief awareness on cyber safety measures
 Keep personal information professional and limited.
 Keep privacy settings on.
 Practice safe browsing.
 Make sure Internet connection is secure.
 Be careful what you download.
 Choose strong passwords.
 Make online purchases from secure sites.
 Keep antivirus program up to date.
 Change your passwords.
 Block or report.
Identification of basic security issues in mobile phones and personal computers:
Basic security issues in mobile phone-
 Data leakage
 Unsecured Wi-Fi
 Network Spoofing
 Phishing Attacks
GPT Athani-Dept.of CSE Page 2 Annappa Kyamangol, L/CS

, Cyber Security: Week-1
 Spyware
 Broken cryptography
 Improper session handling
 Lost or stolen device.
Basic security issues in personal computers-
Computer Viruses
Computer worm
Adware and spyware
Root kit
Hackers and Predators
Phishing
Rogue security software
Trojan horse
Security principles CIA, AAA :
The CIA Triad
 Confidentiality, integrity, and availability, also known as the CIA triad, is a model designed to guide
companies and organizations to form their security policies. Technically, cybersecurity means protecting
information from unauthorized access, unauthorized modification, and unauthorized deletion in order to
provide confidentiality, integrity, and availability.




i) Confidentiality
 Confidentiality is about preventing the disclosure of data to unauthorized parties. It also means trying to keep
the identity of authorized parties involved in sharing and holding data private and anonymous. Often
confidentiality is compromised by cracking poorly encrypted data, Man-in-the-middle(MITM) attacks,
disclosing sensitive data.
 Standard measures to establish confidentiality include:
 Data encryption
 Two-factor authentication
 Biometric verification
 Security tokens




GPT Athani-Dept.of CSE Page 3 Annappa Kyamangol, L/CS

, Cyber Security: Week-1
ii) Integrity
 Integrity refers to protecting information from being modified by unauthorized parties. It is a requirement that
information and programs are changed only in a specified and authorized manner. Challenges that could
endanger integrity include turning a machine into a “zombie computer”, embedding malware into web pages.
 Standard measures to guarantee integrity include:
 Cryptographic checksums
 Using file permissions
 Uninterrupted power supplies
 Data backups


iii) Availability
 Availability is making sure that authorized parties are able to access the information when needed. Data only
has value if the right people can access it at the right time. Information unavailability can occur due to security
incidents such as DDoS attacks, hardware failures, programming errors, human errors.
 Standard measures to guarantee availability include:
 Backing up data to external drives
 Implementing firewalls
 Having backup power supplies
 Data redundancy


 All cyber attacks have the potential to threaten one or more of the three parts of the CIA triad. Confidentiality,
integrity, and availability all have to work together to keep your information secure. So, It’s important to
understand what the CIA Triad is, how it is used to plan and implement a quality security policy while
understanding the various principles behind it.




GPT Athani-Dept.of CSE Page 4 Annappa Kyamangol, L/CS

Geschreven voor

Instelling
Middelbare school
Vak
School jaar
1

Documentinformatie

Geüpload op
27 juli 2023
Aantal pagina's
43
Geschreven in
2021/2022
Type
INTERVIEW
Bedrijf
Onbekend
Persoon
Onbekend

Onderwerpen

€7,53
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
shanteshkhanadale

Maak kennis met de verkoper

Seller avatar
shanteshkhanadale
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
2 jaar
Aantal volgers
0
Documenten
1
Laatst verkocht
-

0,0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen