1st Unit Cyber Secuirty
1st Unit Cyber Secuirty
&
Practice
Objectives
• Introduction
Cyber Security
Cyber Security
C
B
F G
Internet
H I
E
Needs of Cyber Security
• National Security.
• Global Economy.
C = Confidentiality :- F G
Hello World
Encryption Decryption
I = Integrity
•Information Security
• Security Attacks
• E-commerce Security
Information Protection – why ?
• Confidentiality
• Integrity
• Availability
Confidentiality
Refers to information protection from unauthorized
read operations.
Example:
•A person withdrawing money from an ATM
* The person will hide his personal Identification Number (PIN) and ATM card
* The owner of ATM will maintain the confidentiality of this person's bank account
and balance
* The bank will maintain the confidentiality of transaction with this ATM. and the
balance change in the account
Integrity
• Refers to information protection from modifications; it involves several goals:
* Data integrity, ensuring the integrity of information with respect to the original
information.
* Origin integrity, ensuring source of the data, often referred to as authentication
Example:
• A newspaper may print information obtained from a leak at the White house, but
attributes it to the wrong source.
• This obeys data integrity.
• Violates origin integrity.
Availability
Threat - An intruder can exploit the password weakness to break into the
system.
• Risk - The resources within the system are prone to illegal access/
modification/damage by the intruder.
Types of Security Attacks
The security attacks can be classified into four categories:
Fabrication - Unauthorized access to the system and the insertion of false objects into
it. For example, gaining access to a person's email and sending messages (affects
integrity and authenticity)
E-commerce security
Security is an essential part of any transaction that takes place over
the internet. Customers will lose her/his faith in e-business if its security
is compromised. Following are the essential requirements for safe
e-payments/transactions
1. Confidentiality
2. Integrity
3. Availability
4. Authenticity:
There should be a mechanism to authenticate a user before
giving him/her an access to the required information.
5. Non-Repudiability:
It is the protection against the denial of order or denial
of payment. Once a sender sends a message, the sender should not be able to
deny sending the message. Similarly, the recipient of message should not
be able to deny the receipt.
6. Encryption:
Information should be encrypted and decrypted only by an
authorized user.
7. Auditability :
Data should be recorded in such a way that it can be audited for
integrity requirements.
Background and current scenario of information security:-
In the past maintaining the security of information was difficult.
1.Virus
2. Adware
3. Trojan Horse
4. Ransomware
5. Phishing
Virus:-
A computer virus is a malicious piece of
computer code designed to spread from device
to device. A subset of malware, these self-
copying threats are usually designed to damage a
device or steal data.
A computer virus is very similar to the biological
virus . Designed to replicate relentlessly,
computer viruses infect your programs and files,
alter the way your computer operates or stop it
from working altogether.
What does a computer virus do?
Some computer viruses are programmed to harm
your computer by damaging programs, deleting
files, or reformatting the hard drive. Others simply
replicate themselves or flood a network with
traffic, making it impossible to perform any
internet activity. Even less harmful computer
viruses can significantly disrupt your system’s
performance, sapping computer memory and
causing frequent computer crashes.
Adware
What do you mean by adware?
Adware, or advertising supported software,
is software that displays unwanted
advertisements on your computer. ...
Adware uses the browser to collect your
web browsing history in order to 'target'
advertisements that seem tailored to your
interests.
What is adware in computer with example?
Adware (short for advertising-supported
software) is a type of malware that automatically
delivers advertisements. Common examples of
adware include pop-up ads on websites and
advertisements that are displayed by software. ...
Most adware is sponsored or authored by
advertisers and serves as a revenue generating
too.
Trojan horse
What is a Trojan horse on a computer?
Priorities
Absolute priority is accuracy.
Processing steps of conducting of investigation.
Step:-1. Acquisition
Step:-5. Presentation
Text Steganography
Image Steganography
Video Steganography
Audio Steganography
Network Steganography
Text Steganography
I don't want any dog because they spread stink and are
not known for being great.