Cyber Security Notes 1
Cyber Security Notes 1
Introduction to cyber security: Defining cyber space and overview of computer and web
technology, architecture of cyber space, communication and web technology, Internet,
world wide web, advent of internet, internet infrastructure for data transfer, Internet
society, regulation of cyber space, concept of cyber security, issues and challenges of
cyber security.
Cyberspace
Cyberspace refers to the virtual environment or digital realm created by the interconnected
network of computer systems and communication channels.
Concept of cyberspace
Virtual environment: Cyberspace offers immersive virtual environments where users can
interact in real-time, creating rich social experiences. These spaces often reflect or
enhance real-world dynamics, shaping how people communicate and engage with one
another.
Overview of computer
A computer is an electronic device that processes data according to a set of instructions
known as programs.
It performs four primary functions: input (receiving data), processing (manipulating data),
output (displaying results), and storage (saving data for future use).
Key Components
1. Hardware: The physical components, including the central processing unit (CPU),
memory (RAM), storage devices (hard drives or SSDs), and input/output devices
(keyboard, mouse, monitor).
2. Software: The programs and operating systems that instruct the hardware on how
to perform tasks. Software can be system software (like operating systems) or
application software (like word processors and games).
Memory (RAM): Random Access Memory (RAM) is a type of volatile memory used for
temporarily storing data that the CPU needs to access quickly. More RAM allows a
computer to handle multiple tasks simultaneously and improves overall performance.
Motherboard: The motherboard is the main circuit board that connects all components of
the computer. It houses the CPU, memory, and provides slots for other components like
graphics cards and storage devices, facilitating communication between them.
Power supply unit (PSU): The PSU converts electrical power from an outlet into usable
power for the computer’s components. It ensures that each part receives the appropriate
voltage and current.
Graphics processing unit (GPU): The GPU handles rendering images, animations, and
video for display. While some CPUs have integrated graphics, dedicated GPUs are
essential for gaming, video editing, and graphic design tasks.
Input devices: These allow users to interact with the computer. Common input devices
include:
Output devices: These display or output information from the computer. Key output
devices include:
Generation of computer
• Technology: Transistors.
• Characteristics: Smaller, faster, more reliable, and energy-efficient than first-
generation computers. They introduced assembly language and high-level
programming languages.
• Examples: IBM 7094, CDC 1604.
• Technology: Microprocessors.
• Characteristics: Marked by the development of personal computers.
Microprocessors integrated thousands of transistors into a single chip, making
computers smaller and more accessible. This generation also saw the rise of GUI
and networking.
• Examples: Intel 4004, Apple Macintosh, IBM PC.
Types of Computers
Mainframe Computers:
Minicomputers:
• Description: Mid-sized systems that are smaller than mainframes but larger than
personal computers.
• Usage: Often used in manufacturing and research for data processing and control
applications.
Microcomputers:
Analog Computers:
• Description: Use continuous physical quantities (like voltage) to represent
information.
• Usage: Historically used for simulations and measurements in engineering and
scientific applications, like flight simulators.
Digital Computers:
• Description: Process discrete values using binary numbers, making them suitable
for general computation tasks.
• Usage: Most computers today are digital, including everything from PCs to
smartphones and servers.
Hybrid Computers:
• Description: Combine both analog and digital components to take advantage of the
strengths of each type.
• Usage: Commonly used in applications like medical equipment and scientific
instruments, where both types of processing are beneficial.
General-Purpose Computers:
• Description: Versatile machines that can perform a variety of tasks with different
software applications.
• Usage: Suitable for users who need a computer for various activities, from office
work to multimedia and gaming.
Special-Purpose Computers:
• Description: Tailored for specific tasks and optimized for efficiency in those tasks.
• Usage: Examples include embedded systems in appliances, automotive systems,
and industrial controllers.
Features of computer
• Speed: Rapid data processing and calculation capabilities.
• Accuracy: High precision in tasks, minimizing errors.
• Automation: Ability to perform tasks without human intervention.
• Storage: Large data storage capacity using various devices.
• Versatility: Capable of handling a wide range of tasks and applications.
• Connectivity: Ability to connect to networks and the internet for data sharing.
• Multitasking: Running multiple applications simultaneously.
• Programmability: Customizable through software programming.
• Reliability: Consistent performance with minimal failures.
• Multimedia Capabilities: Support for text, images, audio, and video.
• User-Friendly Interfaces: Accessible GUIs for easy interaction.
• Scalability: Can be upgraded or expanded to meet changing needs.
▫ Web development involves languages like HTML for structure, CSS for styling, and
JavaScript for interactivity.
▫ Frameworks like React, Angular, and [Link] enhance development efficiency and
user experience.
▫ Backend technologies, such as [Link], Python, and PHP, handle server-side logic
and database interactions.
▫ Web servers, such as Apache and Nginx, serve website content to users by
responding to requests via protocols like HTTP and HTTPS.
▫ HTTP enables standard communication, while HTTPS adds a layer of security
through encryption, ensuring safe data transmission between clients and servers.
▫ Web design focuses on the visual and functional aspects of a website, prioritizing
user experience.
▫ Good UX design involves intuitive navigation, responsive layouts, and accessibility,
ensuring that users can easily interact with the site across devices.
▫ Aesthetic elements like color schemes and typography also play a critical role in
engagement.
Web Hosting:
▫ Web hosting services provide the infrastructure necessary to store and serve
websites to users.
▫ Different types of hosting (shared, VPS, dedicated, and cloud) cater to various
needs, balancing performance, scalability, and cost.
▫ Reliable hosting is crucial for website accessibility and uptime.
Web Security:
▫ Web hosting services provide the infrastructure necessary to store and serve
websites to users.
▫ Different types of hosting (shared, VPS, dedicated, and cloud) cater to various
needs, balancing performance, scalability, and cost.
▫ Web standards are guidelines set by organizations like W3C to ensure consistency
and interoperability across websites.
▫ Accessibility aims to make web content usable for people with disabilities, allowing
everyone to navigate and interact effectively.
▫ Adhering to these standards improves user experience and broadens audience
reach.
Physical Infrastructure:
▫ This includes the hardware and facilities that support internet connectivity, such as
data centers, servers, routers, and networking cables.
▫ These elements form the backbone of the internet, providing the necessary
resources for data transmission and storage.
Internet Backbone:
▫ The internet backbone consists of high-capacity data routes and large networks
operated by major telecommunications companies.
▫ These backbone connections facilitate long-distance data transfer and
interconnect regional networks, ensuring global connectivity and data flow.
▫ Protocols, such as TCP/IP, HTTP, and HTTPS, are essential for data communication
over the internet, defining how data packets are transmitted and received.
▫ Standards set by organizations like the Internet Engineering Task Force (IETF)
ensure compatibility and interoperability among different devices and services,
enabling seamless communication across diverse platforms.
▫ Email allows users to exchange digital messages, documents, and multimedia files
asynchronously.
▫ It includes features like spam filtering and organizational folders, making it versatile
for personal and professional communication.
▫ Despite the rise of instant messaging, email remains a fundamental tool for formal
correspondence.
▫ VoIP and video calling technologies, such as Skype and Zoom, allow users to
communicate via voice and video over the internet.
▫ These services are cost-effective for long-distance communication and often
include features like screen sharing and recording.
▫ They are increasingly essential for both personal interactions and professional
meetings.
Social media:
▫ Social media platforms, like Facebook and Twitter, facilitate content sharing and
community engagement, enabling users to connect globally.
▫ Web conferencing tools, such as Microsoft Teams and Google Meet, support virtual
meetings with features like screen sharing and chat, enhancing collaboration in
professional settings.
▫ Together, they strengthen both personal and business communication.
▫ Webinars are interactive online seminars that allow presenters to share information
with a live audience.
▫ They often include features like Q&A sessions and polls, promoting engagement
and discussion.
▫ Used for training and marketing, webinars provide valuable learning opportunities
and can be recorded for future access.
▫ Blogs serve as online journals for sharing thoughts and expertise, allowing for
reader engagement through comments.
▫ Forums are community-driven platforms that facilitate discussions on specific
topics, enabling users to ask questions and share knowledge.
▫ Both promote information exchange and foster community interaction in the digital
space.
▫ Social networking sites, such as LinkedIn and Instagram, enable users to create
profiles, connect, and share content.
▫ They facilitate relationship-building and information sharing, with interactions
through posts, comments, and messages.
▫ These platforms play a crucial role in personal branding and community
engagement.
▫ Online news and media platforms provide real-time updates on global events,
utilizing multimedia content like articles, videos, and podcasts.
▫ They enhance public awareness and foster informed discussions, reshaping how
people access and engage with news in the digital age.
▫ Reliable sources are essential for maintaining trust and credibility.
▫ Web forms and surveys are tools for collecting user data and feedback online.
▫ They can be customized for various purposes, such as registrations or customer
feedback, making data collection efficient.
▫ Accompanying analytics help organizations analyze responses and make informed
decisions.
Online Collaboration:
▫ Online collaboration tools, like Google Workspace and Microsoft Teams, enable
real-time teamwork across distances.
▫ They offer document editing, task management, and communication features,
fostering productivity and cooperation.
▫ These technologies are vital for successful project management, especially in
remote work environments.
Internet
▫ The internet is a global network of interconnected computers and devices that
communicate with each other using standardized protocols.
▫ It enables the sharing of information and resources, supporting various applications
such as web browsing, email, online gaming, and streaming services.
▫ The internet serves as a vast information repository and a platform for social
interaction, commerce, and education.
Working of Internet
Infrastructure: The internet comprises physical components, including servers, routers,
switches, and cables (fiber optics, copper wires). These elements form the backbone that
facilitates data transmission across the globe.
Data Transmission: When a user sends a request (like accessing a website), the data is
broken into smaller packets, each labeled with the destination IP address. These packets
travel through various network paths to reach the target server.
Web Browsers: Users interact with the internet through web browsers, which retrieve and
display content from web servers. When a user enters a URL, the browser sends a request
to the server hosting the website, which responds with the requested data.
Client-Server Model: The internet operates on a client-server model, where client devices
(computers, smartphones) request resources from servers that host applications,
websites, and data. This model allows multiple clients to access resources
simultaneously.
Security and Encryption: To protect data transmitted over the internet, security protocols
like HTTPS and SSL/TLS encrypt communication, ensuring that sensitive information
remains confidential during transmission.
WWW
The World Wide Web (WWW) is a system of interlinked hypertext documents and
multimedia content accessed via the internet, allowing users to browse and navigate
information using web browsers. It enables the sharing of text, images, audio, and video
through websites, primarily using the Hypertext Transfer Protocol (HTTP).
Advantages of Internet
• Information Access: Vast resources on any topic for learning and research.
• Communication: Instant global connections through email and social media.
• Convenience: Easy online shopping, banking, and service access.
• Remote Work: Supports telecommuting and collaboration tools.
• Entertainment: Wide range of options, including streaming and gaming.
• Education: Access to online courses and learning materials.
Disadvantages of Internet
Physical Infrastructure:
The physical infrastructure of internet comprises the tangible components that enable the
transmission of data and functioning of digital communication.
o Submarine Cables: Undersea cables that carry data between continents and
countries, forming the backbone of global internet [Link] facilitate high-
speed data transmission over long distances and are crucial for international
communication.
o Terrestrial Cables: Fiber optic and copper cables that run over land, connecting
cities and regions to data centers and network infrastructures. hey support local
and regional data transmission, enabling high-speed internet access for homes and
businesses.
o Data centers: Facilities that house servers, storage systems, and networking
equipment to store, manage, and process data. They provide the infrastructure
necessary for cloud computing, web hosting, and large-scale data processing,
ensuring reliable service delivery.
o Switches and Routers: Switches are the devices that connect multiple devices on
a local network, directing data traffic efficiently within the network. Routers are
Devices that route data packets between different networks, directing traffic from
local networks to the internet.
Data transmission protocols are a set of rules and conventions that governs the format,
timing, sequencing, and error control during the exchange of data between devices over a
network.
Some important protocols are:
➢ IP (Internet Protocol): The fundamental protocol that addresses and routes data
packets across networks, assigning unique IP addresses to devices to facilitate
communication between different networks.
➢ HTTPS (Hypertext Transfer Protocol Secure): The secure version of HTTP that uses
SSL/TLS encryption to protect data during transmission, ensuring secure
communication for sensitive information like passwords.
➢ FTP (File Transfer Protocol): A standard protocol for transferring files between a
client and a server, supporting both uploads and downloads, commonly used for
website file management.
➢ SMTP (Simple Mail Transfer Protocol): A protocol for sending emails across
networks, facilitating the transfer of messages from the senders to the recipient's
mail server.
➢ POP3 (Post Office Protocol version 3): A protocol for retrieving emails from a server,
allowing users to download messages to their local device, typically removing them
from the server.
➢ IMAP (Internet Message Access Protocol): A protocol that enables users to access
and manage emails directly on the server, allowing for email organization across
multiple devices without downloading them.
➢ The IETF (Internet Engineering Task Force) develops voluntary internet standards
focused on protocols and architecture, allowing open participation and publishing
standards as Request for Comments (RFC) documents.
➢ The W3C (World Wide Web Consortium) creates open standards for web
technologies like HTML and CSS, emphasizing accessibility and encouraging
collaboration among stakeholders, while exploring emerging technologies to
enhance the web’s future.
Internet Society
Regulation of cyberspace involves the establishment and enforcement of rules, laws, and
guidelines to govern the behavior, activities and transactions in the digital realm.
▫ Net neutrality: Mandates that internet service providers treat all data equally,
promoting fairness and innovation online.
▫ Internet governance organizations: Entities like ICANN and IETF develop policies
and standards that influence global internet operations.
▫ User education and awareness: Initiatives to inform users about cybersecurity risks
and safe practices, fostering a culture of security and responsibility.
Cyber Security
• Cybersecurity is the practice of protecting systems, networks, and data from digital
attacks and unauthorized access.
• It involves implementing measures to ensure the confidentiality, integrity, and
availability of information, addressing vulnerabilities through risk management,
threat detection, and incident response to defend against cyber threats.
[Link] security
Network security refers to the practices and technologies designed to protect computer
networks from unauthorized access, misuse, or attacks.
a. Access Control: Mechanisms that restrict access to network resources, ensuring only
authorized users can access sensitive data through authentication and authorization
protocols.
b. Firewalls: Security devices or software that monitor and control network traffic based
on predefined rules, acting as barriers to block unauthorized access and malicious traffic
c. Intrusion Detection and prevention system (IDS/IPS): IDS monitors for suspicious
activity and alerts administrators, while IPS actively blocks potential threats, enhancing
overall network security.
d. Virtual private network (VPN): A secure, encrypted connection that allows users to
access a private network over the internet, protecting sensitive data during remote access.
f. Security policies: Formal rules that govern the management and protection of
information assets, outlining employee responsibilities and procedures for handling
security incidents.
g. Network monitoring: Continuous observation of network traffic to detect anomalies
and security threats, ensuring effective resource usage and quick response to issues.
h. Encryption: The process of converting data into a coded format to protect its
confidentiality, ensuring that intercepted information remains unreadable without the
appropriate decryption key.
[Link] security
Application security (AppSec) focuses on keeping software and devices free of threats.
d. Security patching and updates: Regular security patching and updates are crucial for
addressing vulnerabilities in software. Automated patch management and vulnerability
scans help identify outdated components, while testing patches in staging environments
mitigates risks.
g. Web application firewalls (WAFs): Web Application Firewalls (WAFs) monitor and filter
incoming traffic to block malicious requests. They employ rule-based filtering, provide rate
limiting, and maintain logs for compliance, enhancing overall application security.
[Link] security
b. Integrity: Maintains the accuracy and consistency of data, ensuring it is not altered by
unauthorized users, often through checksums and hash functions.
c. Availability: Ensures that information and resources are accessible to authorized users
when needed, supported by redundancy and disaster recovery plans.
[Link] security
d. Countermeasures and safeguards: These are specific actions and tools implemented
to protect critical information, such as security protocols, encryption, and access
controls, aimed at reducing identified risks.
e. Security culture: A security culture fosters an environment where employees are aware
of security policies and practices, promoting vigilance and encouraging everyone to take
responsibility for protecting sensitive information.
[Link] Threats and Attacks: Cyber threats and attacks involve various malicious
activities aimed at compromising systems and data, including malware, ransomware, and
phishing.
[Link] Breaches: Data breaches occur when unauthorized individuals access sensitive
information, leading to financial loss and reputational damage for organizations.
[Link] Theft and Fraud: Identity theft involves the unauthorized acquisition of personal
information for financial gain, often resulting in devastating consequences for victims.
[Link] Threats: Insider threats can stem from both malicious actions by employees and
unintentional mistakes. To address these risks, organizations should implement regular
training and strict access controls, ensuring that sensitive information is protected from
both intentional and accidental breaches.
[Link] and OT Vulnerabilities: The rise of Internet of Things (IoT) and operational
technology (OT) devices introduces unique security challenges, as many lack robust
protections. Compromised devices can lead to data breaches and safety hazards,
highlighting the need for stronger security measures in their design and deployment.
[Link] of Security by Design: A lack of security by design occurs when security measures
are not integrated during the system development lifecycle, resulting in inherent
vulnerabilities.
[Link] Error and Lack of Awareness: Human error and a lack of awareness are
significant factors in cybersecurity incidents, as employees may fall victim to phishing
scams or misconfigure systems.
1. Evolving threat landscapes: Cyber threats are constantly changing, with attackers
using increasingly sophisticated techniques like ransomware and social
engineering. The growing number of digital assets expands the attack surface,
making detection and mitigation more challenging.
2. Complexity of IT environment: Organizations face a diverse mix of legacy systems,
cloud solutions, and applications, complicating security management. Ensuring
consistent security policies across these technologies introduces vulnerabilities
and integration challenges.
3. Skill shortage: A significant shortage of skilled cybersecurity professionals makes
it difficult for organizations to fill critical roles. High demand for talent leads to
competitive hiring, and existing staff often require extensive training to stay updated
on evolving threats.
4. Data privacy regulations: Data privacy regulations protect individuals' personal
information and govern how organizations collect, use, and store data, enhancing
consumer rights like access and deletion
5. Insider threats: Insider threats can arise from unintentional actions or malicious
intent by employees. Identifying these threats is difficult due to legitimate access,
making monitoring and prevention essential.
6. Lack of security awareness: Many employees lack adequate training in
cybersecurity best practices, increasing vulnerability to attacks. A strong security
culture and regular awareness training are vital to promote proactive behavior.
7. Financial Constraint: Budget limitations hinder organizations' ability to invest in
comprehensive cybersecurity measures. The financial impact of breaches often
exceeds initial security investments, emphasizing the need for proactive funding.
UNIT 2
Cyber-crime
• Cybercrime refers to illegal activities that are conducted through computers or the
internet, targeting computer systems, networks, or devices.
• This includes a wide range of offenses such as hacking, identity theft, online fraud,
malware distribution, and phishing scams. Cybercrime can have significant
financial, legal, and reputational consequences for individuals and organizations.
Cyber law
• Cyber law refers to the legal regulations and frameworks that govern activities
conducted online, addressing issues related to the internet, digital communication,
and technology.
• It encompasses laws related to cybersecurity, data protection, intellectual
property, e-commerce, privacy, and online crimes.
• Cyber law aims to protect individuals and organizations from cyber threats while
ensuring the lawful use of technology and the internet.
a. Identity theft: This occurs when someone unlawfully obtains and uses another
person’s personal information, such as Social Security numbers, to impersonate
them and commit fraud.
b. Credit card fraud: Involves the unauthorized use of a credit card or card
information to make purchases or withdraw funds, often through data breaches or
stolen cards.
c. Online Banking fraud: his type of fraud targets online banking accounts, allowing
criminals to transfer funds or access sensitive information through hacking or
phishing schemes.
d. Cryptocurrency theft: Involves stealing digital currencies from wallets or
exchanges, often through hacking, phishing attacks, or exploiting vulnerabilities in
the blockchain.
e. Phishing: A deceptive practice where attackers impersonate legitimate entities to
trick individuals into providing sensitive information, such as passwords or credit
card numbers, often via emails or fake websites.
Cyber Vandalism