Fundamentals of Cyber Security: Principles, Theory and Practices
()
About this ebook
The book features the most current research findings in all aspects of information Security. From successfully implementing technology change to understanding the human factors in IT utilization, these volumes address many of the core concepts and organizational applications, implications of information technology in organizations.
Related to Fundamentals of Cyber Security
Related ebooks
Cybersecurity: Rating: 0 out of 5 stars0 ratingsCYBER SECURITY HANDBOOK Part-2: Lock, Stock, and Cyber: A Comprehensive Security Handbook Rating: 0 out of 5 stars0 ratingsIntroduction to Cyber-Security Rating: 0 out of 5 stars0 ratingsCyber Resilience: Defence-in-depth principles Rating: 0 out of 5 stars0 ratingsAdvanced Cybersecurity Strategies: Navigating Threats and Safeguarding Data Rating: 0 out of 5 stars0 ratingsMicrosoft Windows Security Essentials Rating: 5 out of 5 stars5/5Modern Cybersecurity Practices: Exploring And Implementing Agile Cybersecurity Frameworks and Strategies for Your Organization Rating: 0 out of 5 stars0 ratingsCybersecurity: Building a Fortified Digital Environment Rating: 0 out of 5 stars0 ratingsCybersecurity for Small Businesses and Nonprofits Rating: 0 out of 5 stars0 ratingsLeveraging Agile Project Management for Robust Cybersecurity: A Guide for Leaders & Managers Rating: 0 out of 5 stars0 ratingsCybersecurity: Issues of Today, a Path for Tomorrow Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Review Guide: Exam SY0-501 Rating: 1 out of 5 stars1/5Set Up Your Own IPsec VPN, OpenVPN and WireGuard Server: Build Your Own VPN Rating: 5 out of 5 stars5/5Red Hat Enterprise Linux 6 Administration: Real World Skills for Red Hat Administrators Rating: 0 out of 5 stars0 ratingsOperating Systems Interview Questions You'll Most Likely Be Asked Rating: 0 out of 5 stars0 ratingsFreeSWITCH Cookbook Rating: 0 out of 5 stars0 ratingsMicrosoft Windows Server Administration Essentials Rating: 0 out of 5 stars0 ratingsA Pythonic Adventure: From Python basics to a working web app Rating: 0 out of 5 stars0 ratingsUltimate Splunk for Cybersecurity Rating: 0 out of 5 stars0 ratingsGitLab Guidebook: From Basics to Expert Proficiency Rating: 0 out of 5 stars0 ratingsLinux Bible Rating: 4 out of 5 stars4/5Essential Computer Hardware: Understanding the Building Blocks of Modern Technology and Securing Your Digital World Rating: 0 out of 5 stars0 ratingsVCA-DCV VMware Certified Associate on vSphere Study Guide: VCAD-510 Rating: 0 out of 5 stars0 ratingsRedHat Enterprise Linux 9 for Beginners: A comprehensive guide for learning, administration, and deployment (English Edition) Rating: 0 out of 5 stars0 ratingsComplete Guide to Building an Information Security Program Rating: 0 out of 5 stars0 ratingsUltimate Git and GitHub for Modern Software Development Rating: 0 out of 5 stars0 ratingsMastering Cloudflare: Optimizing Security, Performance, and Reliability for the Web Rating: 4 out of 5 stars4/5Backup and Restore The Ultimate Step-By-Step Guide Rating: 0 out of 5 stars0 ratingsAdvanced Computer Networking: Comprehensive Techniques for Modern Systems Rating: 0 out of 5 stars0 ratings
Security For You
Deep Dive: Exploring the Real-world Value of Open Source Intelligence Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 5 out of 5 stars5/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsHacking For Dummies Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5CompTia Security 701: Fundamentals of Security Rating: 0 out of 5 stars0 ratingsLinux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali Rating: 3 out of 5 stars3/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5How to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5Learning Android Forensics Rating: 4 out of 5 stars4/5Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions Rating: 5 out of 5 stars5/5Codes and Ciphers Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Unmasking the Social Engineer: The Human Element of Security Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 4 out of 5 stars4/5CompTIA Data+ (Plus) The Ultimate Exam Prep Study Guide to Pass the Exam Rating: 0 out of 5 stars0 ratingsThe Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Metasploit Bootcamp Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5Ethical Hacking 101 - How to conduct professional pentestings in 21 days or less!: How to hack, #1 Rating: 5 out of 5 stars5/5
Reviews for Fundamentals of Cyber Security
0 ratings0 reviews
Book preview
Fundamentals of Cyber Security - Mayank Bhushan
Chapter-1
Introduction to Information Systems
1.1 INTRODUCTION
In this age of data, most fields of endeavor like education, producing, research, games, recreation, and business treats data systems as a desire. Indeed, each activity in our everyday life these days needs folks to induce concerned with the use of data systems.
Have you ever used Associate in Nursing ATM to withdraw cash or to shop for the product at an oversized supermarket? In each case, we have a tendency to area unit indirectly victimization the facilities offered by Associate in the Nursing system.
What is a system? A system is just a gaggle of activities and components, which are organized to realize a definite objective. Associate in the Nursing system could be a combination of hardware, code and telecommunication systems, which may support business operations to extend productivity, and facilitate managers create choices.
In this age, the success of a business depends on the data system. Several organizations these days use data systems to supply services with larger satisfaction to customers, to access a wide variety of data, to handle business changes at a larger speed, and to extend the productivity of staff. For the supported variety of research organizations, an efficient system ought to be ready to exceed client expectations and fulfill business wants.
1.2 MODELLING THE BUSINESS METHOD
Many corporations these days use data as a basis to extend productivity, manufacturing quality merchandise, providing quality services, making client confidence, and creating timely choices.
As such, data technology has become the prime reason for the success and failure of an organization to vie in business. This illustrates the impact of data technology on business operations these days. As a result, coming up with Associate in the Nursing data system of high quality is vital therefore that organizations will vie with success within the world market.
Information systems specialists have to be compelled to perceive the business operation of an organization before they'll style a comprehensive system. Every business situation is probably going to diverge. As Associate in Nursing example, business transactions at a grocery, bank, and edifice need data systems that area unit completely different and distinctive.
Figure 1.1: Computers in business
An analyst applies a method known as Business method Modelling to represent corporations operations and data needs. Works in the data technology based mostly department. This person is liable for designing, analyzing and implementing data systems.
1.2.1 Business Profile, Model and Process
In trying to understand the operation of a certain company, a system analyst needs to develop a business profile and think about/believe some business models. This could be explained briefly as shown in Figure 1.2 below.
Figure 1.2: General duties of a system analyst
Business profile covers ownership, structure, and management of the company, together with its customers and suppliers; while a business model can take the form of an actual, physical type, a virtual store, and so on. They can be as described/explained as these, or can just be in brief forms.
Business Process explains a certain process, activity, and the results expected. It is basically a way of doing business, which begins with the customer and ends with the customer. Customers can either be external or internal.
Figure 1.3 illustrates a business process for Student Registration
.
Figure 1.3: A business process
The above business process has a beginning and an end, three sub-processes and a result. When a company tries to simplify operations, or tries to decrease operational cost, or increase value to customers, the company is said to be involved in business process re-engineering(BPR).
1.3 INFORMATION SYSTEM COMPONENTS
A system could be a set of connected parts, which may method input to provide an explicit output. Each system needs a type of knowledge input. For instance, Associate in Nursing ATM accepts knowledge once you enter the PIN. A washer accepts knowledge once you choose the beginning buttons. They method the inputs and turn out their individual outputs.
In Associate in tending data system, input file carries with its facts and figures, that kind the systems material. Data is knowledge that has been usefully processed. However, Associate in data system doesn't solely contain knowledge. There also are alternative components within the system, that area unit connected and area unit in support of one another. The presence of these connected components makes data a lot of helpful whereby, it will be created accessible, will be processed, distributed, manipulated, saved, and so on. this mixture offers rise to a system, that is orderly Associate in per se it's referred to as an Information System
Figure 1.4: Information system
The activity of converting data into information is called a process. An information system contains FIVE main components: the hardware, software, data, process and human, as shown in Figure 1.5 below:
Figure 1.5: Components of an information system
Hardware
Hardware is the physical embodiment of an information system. It is one of the main elements which creates the information system cycle.
Information system's hardware refers to any or all kinds of hardware and also newspapers, web sites, and TV used for input, processing, managing, distributing business partner degreed saving data that area unit getting used in an organisation. Samples of the hardware area unit the physical computers, networks, installation, scanners, digital drives, and so on.
Basic hardware for a definite pc consists of 4 main parts as shown in Figure 1.6 below.
Figure 1.6: Basic hardware of a computer
To understand in greater detail on the functions and examples of the computer hardware, we can refer to Table 1.1 below.
Table 1.1: Functions of the Basic Hardware of a Computer
Computers is helpful tools if you recognize the way to use (for selfish reasons) To change computers to operate a lot of effectively and to (branch out into different things) their functions, you wish the communication network to attach many computers along. The network provides the hardware support to change communication to be established among one another. The communication network includes modems, hubs, cables and different devices.
Software system
Software consists of two classes a the system software system and therefore the application software.
- System software system controls the laptop and contains the software system and device drivers, which may communicate with the hardware. It also can change information into a replacement kind, stop viruses and create copies.
- Application software system contains programs that will help users and change corporations to (do/complete) business functions. Users will increase working well and getting a lot done with the presence of application software system like spreadsheets, data processing, ordering systems, and (money owed to you).
Data
Data refers to the raw facts on anything or things/businesses like student names, courses and marks. The raw data that has not yet been given can be Processed to become more useful information.
Information is an organised, meaningful and useful (understanding/ explanation) of data such as a company's performances or a student's (related to school and learning) performance. Information systems change data into information, which is useful and capable of giving a certain meaning to its users.
Figure 1.7 below shows an example to represent data and information:
Figure 1.7: Differences between data and information
Based on the instance within the on top of figure, we will perceive that records within each attribute beneath the knowledge item do not offer any specific that means. Each knowledge or record here may be a raw reality. When surfing processes like addition, ordering, combining, controlling/moving around/misleading and then on, (more than two, but not a lot of) styles of info are often created. The data created isn't restricted to an exact type. It is often taken in many ways in keeping with the needed things and wills of shoppers.
Method
Process or procedure explains the activities carried out by users, managers and workers. Process is important for supporting a certain business model available as written documents or as reference materials on-line.
Process is a guide consisting of neat/ well-organized/ well-behaved steps, which need to be followed and put into use in order to get a certain decision on a certain matter.
The procedure for employing a sure matter is very wide and really necessary to make sure that it will be enforced successfully. All the data system parts contain management and putting into use procedures on their own, and that they square measure totally different from one another.
--Human
The main goal of an information system is to provide extremely valuable information to managers and users, whether inside or outside the company. Users can be broken up into three categories, which are:
End-Users, consisting of the staff, customers, suppliers and others who communicate with the information system.
Internal Users, including the managers, technicians, sales representatives and (related to big business) officers.
External Users, consisting of the customers who use the companies system for performing transactions, suppliers WHO use the system for designing sales, and therefore the workers WHO use the system outside workplace hours.
The success or failure of associate system depends on whether or not the system that has been developed will fulfil the user's needs, and therefore the users feel happy with the results and therefore the system's operation. A wonderful system needs (combined different things together so they worked as one unit) efforts from info technology specialists like the system analysts, programmers and therefore the info technology managers this way as to fulfil business desires and to support company's goals.
1.4 INFORMATION SYSTEM CLASSES
Now there square measure many approaches to finding a definite (bad result or effect). There also are many sorts of info systems, that square measure developed to beat clearly stated/particular issues, besides making an attempt to fulfil the user's requests (usually/ in a common and regular way). In a very huge organisation, finding business issues like the management of workers (moneys paid for working), process of business information et al is often done by the employment of huge computers with internal and external networks.
Every type of information system has a role to play. If you look at the functions and the extent of/the range of usage, information systems can be divided into six main categories such as those given in Figure 1.8 below.
Figure 1.8: Categories of information system
To understand the six main categories of information systems, Table 1.2 gives the explanation for each category.
Table 1.2: Information System Categories
1.5 INDIVIDUALS IN THE INFORMATION SYSTEM
To handle an info system's project, we want to have a systematic work set up. An info system's design provides a piece set up, that is exclusive, whereby numerous people with completely different objectives will manage and see the building blocks of an data system.
Figure 1.9: Individuals in information system
If we intend to develop an information system, the individuals involved in the development will see the system from a different perspective. These individuals can be categorised into four groups:
(a) Systems Owner
The systems owner carries/holds the cost of system development and maintenance. He has the right over the system, decides/figures out the interest over the system and decides/figures out the policies over its use. The system owner is also responsible for system (good reason for: thinking or doing something, or for the existence of something) and system acceptance. In certain situations, the system owner is also a system user.
System owners always think of the return value, which can be received/be gotten by developing the information system. This return is valued from different aspects such as:
- What are the benefits of the system?
- What are the mission and goals?
- What is the cost of developing the system?
- What is the cost of operating the system?
- Can the investment pay back the capital?
What are the benefits that can be measured from the system?
(b) Systems User
The system user is an individual who uses the system for producing something, or uses the system to help him in his daily jobs. Directly, users are the ones who get the benefits from the system that has been developed. Besides being the initiators for the new information system request, users also decide/figure out:
- The problems to be solved;
- Opportunities to be taken advantage of;
- The needs to be satisfied;
- Business restrictions to be overcome by the system; and
- Whether the information system that has been developed is easy or difficult to use.
Compared to the system owner, the system users are not so interested in the cost and benefits of the system. They often importance and focus the business needs inside the system. System users can be divided into three main categories: internet, external and mobile users.
(i) Internal User
Workers who work in the company to develop the information system. Internal users make up/be equal to the highest percentage among those who use the said system. They include the support and (related to managing and running a company or organization) staff, the technical and professional staff, supervisors, the management and the executives.
(ii) Mobile User
Mobile users are the users who often do jobs outside the company.
Examples of these users are salesmen and sales representatives. They often do jobs that require travelling from place to place, meeting customers, buyers and soon. Organisations which have users of this kind often have complex information system designs because the system that is developed needs to change something (to help someone)/take care of someone the information needed by users of this kind. In satisfying the information needs of mobile users, the information should be accessible wherever they are.
Therefore, the information system that has been developed should provide a (related to sending and receiving phone calls, texts, etc.) surrounding conditions and the network to enable information stored in the (computer file full of information) to be (easy to get to, use, or understand) by users.
(iii) External User
The information system can now connect the system to other individuals as users of the system. Due to worldwide competition, businesses are redesigned to enable connectivity with other organisations, partners, suppliers, customers and end users.
As an example, you need not fill up any form to apply for entry into OUM. With the information system given by OUM, you just need to go to the OUM website, fill up the application form online, and send the form online. Now, the facility is given, but in future it may be necessary to change our way of life.
(c) Systems Designer
Systems designers are experts in the technical field who would design a system for satisfying the needs of users. They are responsible for controlling/moving around/ misleading the needs of business users and the restrictions in technical solutions. They design computer files, (computer files full of information), input, output, screen, networks, and programs that can fulfil the needs of system users. They are also responsible for (combining different things together so they work as one unit) the technical solutions into the daily business (surrounding conditions).
Systems designers understand the (related to computers and science) (surrounding conditions) better when compared to systems owners and systems users. They always provide other choices and design systems based on (related to computers and science) restrictions at that time. Now, systems designers give more attention to technical experts such as:
(computer file full of information) designers who provide focus on the data;
Programmers and software engineers who provide focus on the process;
Systems integrators who provide focus on the system (connecting points/ ways of interacting with something); and
Telecommunication and network experts who provide focus on the location (in the world)s.
(d) Systems Developer
Systems developers are the experts in the technical field who would develop, test and produce a system, which can operate successfully. They build the system parts/ pieces based on the design (detailed descriptions of exactly what is required) of the system designers. In many situations, system designers are the system developers. They use technology to develop information systems.
Among the people who get involved directly in information system development, you maybe ask what is the role of the systems analyst? In actual fact, the systems analysts are really acting as helpers/planners for information systems development. The system analyst has the (ability to do things very well) that is owned by all the above people. They should feel comfortable with the views of all the people talked about/said above. For the systems owners and users, the systems analyst should develop and update their views. The duty of the systems analyst is to make sure that the technical knowledge of systems designers and developers are agreeing with/ matching up with/working regularly with the current business needs.
Figure 1.10: Information systems perspective
1.6 DEVELOPMENT OF INFORMATION SYSTEMS
As mentioned earlier, each company has associate degree system already in situated, be it a file card and pencil primarily based system, a processed system or associate degree intermediate of the two. Therefore the IS development method involves work on associate degree existing system - mapping the system, automating it and ensuring that it functions per user needs. Thus in its initial part the method makes an attempt to see the scope and sort of latest system that the user needs. Consecutive part analyzes the higher than demand in two elements to facilitate elaborate verification and validation before the system is really designed and enforced.
1.6.1 Starting with the users
Infact the complete conception of knowledge systems development revolves round the users - their desires, performance expectations, needs and different specifications. The terribly success or failure of associate degree system could also be measured by the amount of satisfaction of its basic users within the organisation. It's terribly essential that the info satisfy the wants of the user, otherwise he or she's going to continue together with his or her own system and thereby defeat the aim of the central info. The key part during this conception is that every scheme utilize identical info within the satisfaction of its info desires. This may yield an extra important advantage - the mixing of departments and functions. So every department, through its access and interface with the overall info resources of the corporate, gains a bigger understanding and appreciation of however its actions and plans have an effect on others throughout the organization.
Necessary question which will be raised is why it's important to analyse and style info systems before you build them. Why cannot you build the data systems directly? The most reasons are:
It's necessary to create