Cyber Security Notes
Cyber Security Notes
NOTES
Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from
malicious attacks.
PROTECTION:- it states that protect the data of an individuals, group of community , company etc over an internet
Network Security: It involves implementing the hardware and software to secure a computer network
from unauthorized access, intruders, attacks, disruption, and misuse. This security helps an organization
o Application Security: It involves protecting the software and devices from unwanted threats. This
protection can be done by constantly updating the apps to ensure they are secure from attacks. Successful
security begins in the design stage, writing source code, validation, threat modeling, etc., before a program
or device is deployed.
o Information or Data Security: It involves implementing a strong data storage mechanism to maintain
o Identity management: It deals with the procedure for determining the level of access that each individual
o Operational Security: It involves processing and making decisions on handling and securing data assets.
o Mobile Security: It involves securing the organizational and personal data stored on mobile devices such
as cell phones, computers, tablets, and other similar devices against various malicious threats. These
o Cloud Security: It involves in protecting the information stored in the digital environment or cloud
architectures for the organization. It uses various cloud service providers such as AWS, Azure, Google, etc.,
and plans to how an organization responds when any malicious activity is causing the loss of operations
or data. Its policies dictate resuming the lost operations after any disaster happens to the same operating
o User Education: It deals with the processes, monitoring, alerts, and plans to how an organization responds
when any malicious activity is causing the loss of operations or data. Its policies dictate resuming the lost
operations after any disaster happens to the same operating capacity as before the event.
Risk
Cyber security risks are commonly classified as vulnerabilities. However, vulnerability and risk are not the same
thing, which can lead to confusion.
If the impact and probability of a vulnerability being exploited is low, then there is low risk. Inversely, if the impact
and probability of a vulnerability being exploited is high, then there is a high risk.
Generally, the impact of a cyber attack can be tied to the CIA triad or the confidentiality, integrity, or availability of
the resource. Following this train of reasoning, there are cases where common vulnerabilities pose no risk. For
example, when the information system with the vulnerability has no value to your organization.
Vulnerability
computer system. After exploiting a vulnerability, a cyberattack can run malicious code, install malware, and
Cyber Security's main objective is to ensure data protection. The security community provides a triangle of three
related principles to protect the data from cyber-attacks. This principle is called the CIA triad.
When any security breaches are found, one or more of these principles has been violated.
We can break the CIA model into three parts: Confidentiality, Integrity, and Availability. It is actually a security
model that helps people to think about various parts of IT security. Let us discuss each part in detail.
Confidentiality
Confidentiality is equivalent to privacy that avoids unauthorized access of information. It involves ensuring the data
is accessible by those who are allowed to use it and blocking access to others. It prevents essential information
from reaching the wrong people. Data encryption is an excellent example of ensuring confidentiality.
Integrity
This principle ensures that the data is authentic, accurate, and safeguarded from unauthorized modification by
threat actors or accidental user modification. If any modifications occur, certain measures should be taken to protect
the sensitive data from corruption or loss and speedily recover from such an event. In addition, it indicates to make
the source of information genuine.
Availability
This principle makes the information to be available and useful for its authorized people always. It ensures that
these accesses are not hindered by system malfunction or cyber-attacks.
Threat
A threat in cybersecurity is a malicious activity by an individual or organization to corrupt or steal data, gain access
to a network, or disrupts digital life in general. The cyber community defines the following threats available today:
Malware
Malware means malicious software, which is the most common cyber attacking tool. It is used by the cybercriminal
or hacker to disrupt or damage a legitimate user's system. The following are the important types of malware created
by the hacker:
o Virus
o Spyware
o Trojans
o Ransomware
o Worms
o Adware
Phishing
Phishing is a type of cybercrime in which a sender seems to come from a genuine organization like PayPal, eBay,
financial institutions, or friends and co-workers. They contact a target or targets via email, phone, or text message
with a link to persuade them to click on that links. This link will redirect them to fraudulent websites to provide
sensitive data such as personal information, banking and credit card information, social security numbers,
usernames, and passwords. Clicking on the link will also install malware on the target devices that allow hackers
to control devices remotely.
It is a type of cyber threat or malicious attempt where cybercriminals disrupt targeted servers, services, or network's
regular traffic by fulfilling legitimate requests to the target or its surrounding infrastructure with Internet traffic.
Here the requests come from several IP addresses that can make the system unusable, overload their servers,
slowing down significantly or temporarily taking them offline, or preventing an organization from carrying out its
vital functions.
Brute Force
A brute force attack is a cryptographic hack that uses a trial-and-error method to guess all possible
combinations until the correct information is discovered. Cybercriminals usually use this attack to obtain personal
information about targeted passwords, login info, encryption keys, and Personal Identification Numbers (PINS).
SQL injection is a common attack that occurs when cybercriminals use malicious SQL scripts for backend database
manipulation to access sensitive information. Once the attack is successful, the malicious actor can view, change,
or delete sensitive company data, user lists, or private customer details stored in the SQL database.
The following are the system that can be affected by security breaches and attacks:
o Communication: Cyber attackers can use phone calls, emails, text messages, and messaging apps for
cyberattacks.
o Finance: This system deals with the risk of financial information like bank and credit card detail. This
o Governments: The cybercriminal generally targets the government institutions to get confidential public
o Transportation: In this system, cybercriminals generally target connected cars, traffic control systems, and
o Healthcare: A cybercriminal targets the healthcare system to get the information stored at a local clinic
o Education: A cybercriminals target educational institutions to get their confidential research data and
Digital Signature
A digital signature is a mathematical technique which validates the authenticity and integrity of a message, software
or digital documents. It allows us to verify the author name, date and time of signatures, and authenticate the
message contents.
The digital signatures are different from other electronic signatures not only in terms of process and result, but
also it makes digital signatures more serviceable for legal purposes. Some electronic signatures that legally
recognizable as signatures may not be secure as digital signatures and may lead to uncertainty and disputes.
o Authentication
o Non-repudiation
o Integrity
Authentication
Authentication is a process which verifies the identity of a user who wants to access the system. In the digital
signature, authentication helps to authenticate the sources of messages.
Non-repudiation
Non-repudiation means assurance of something that cannot be denied. It ensures that someone to a contract or
communication cannot later deny the authenticity of their signature on a document or in a file or the sending of a
message that they originated.
Integrity
Integrity ensures that the message is real, accurate and safeguards from unauthorized user modification during the
transmission.
Authorization is the process of determining whether a user or entity has the necessary permissions and privileges
to access a specific resource or perform a particular action within a system or network. It is a security mechanism
that ensures only authorized personnel can access sensitive data and applications.
Authentication is the process of identifying the user or entity trying to access a system or network, while
authorization is the process of determining whether the identified user or entity has the necessary permissions
and privileges to access a specific resource or perform a particular action within that system or network. In other
words, authentication verifies the identity of a user, while authorization verifies their access rights.
• Plaintext: This refers to the original readable data in its natural form. It’s the information before
encryption. Any message, document, or file that is not meant to be encrypted falls into the category of
plaintext. For example, the text you’re reading right now is plaintext.
• Ciphertext: When data is encrypted, it becomes ciphertext. Ciphertext is not easily readable; it requires
decryption to be understood. Algorithms transform plaintext into ciphertext and vice versa. The output
of encryption is ciphertext, while the input for decryption is also ciphertext.
Types of ciphers
There are various types of ciphers, including:
• Substitution ciphers. Replace bits, characters, or character blocks in plaintext with alternate bits, characters or
character blocks to produce ciphertext. A substitution cipher may be monoalphabetic or polyalphabetic:
o A single alphabet is used to encrypt the entire plaintext message. For example, if the letter A is
enciphered as the letter K, this will be the same for the entire message.
e.g – ALIBABA------→ KMICKCK
o A more complex substitution using a mixed alphabet to encrypt each bit, character or character block of
a plaintext message. For instance, the letter A may be encoded as the letter K for part of the message, but
later it might be encoded as the letter W.
e.g – ALIBABA------→ KMSKJDP
• Transposition ciphers. Unlike substitution ciphers that replace letters with other letters, transposition ciphers keep
the letters the same, but rearrange their order according to a specific algorithm. For instance, in a simple columnar
transposition cipher, a message might be read horizontally but would be written vertically to produce the
ciphertext.
Data encryption is a way of translating data from plaintext (unencrypted) to ciphertext (encrypted). Users can
access encrypted data with an encryption key and decrypted data with a decryption key.
Asymmetric Cryptography
Asymmetric Cryptography, also known as Public-Key Cryptography, encrypts and decrypts the data using two
separate cryptographic asymmetric keys. These two keys are known as a “public key” and a “private key”.
• RSA
• Public key infrastructure (PKI).
Symmetric Cryptography
Symmetric cryptography is a type of encryption where only one secret symmetric key is used to encrypt the plaintext
and decrypt the ciphertext.
Public key
It is an encryption technique that uses a pair of keys (public and private key) for secure data communication. In the
pair of keys, the public key is for encrypting the plain text to convert it into ciphertext, and the private key is used
for decrypting the ciphertext to read the message.
The private key is given to the receiver while the public key is provided to the public. Public Key Cryptography is
also known as asymmetric cryptography.
Public-key encryption is slower than secret-key encryption. In secret key encryption, a single shared key is used to
encrypt and decrypt the message, while in public-key encryption, different two keys are used, both related to each
other by a complex mathematical process. Therefore, we can say that encryption and decryption take more time in
public-key encryption.
ADVERTISEMENT
o Public key cryptography can be used to encrypt Emails to keep their content confidential.
o It can be used to create a digital signature in the Operating System software such as Ubuntu, Red Hat
Private Key
In private key, the same key (or secret key) is used by both the parties, i.e., the sender and receiver, for
Encryption/Decryption technique.
The sender uses the secret key and encryption algorithm for encryption, whereas for decryption, the receiver uses
this key and decryption algorithm. In Secret Key Encryption/Decryption technique, the algorithm used for
encryption is the inverse of the algorithm used for decryption. It means that if the combination of addition and
multiplication is used in the encryption algorithm, then the decryption algorithm will use the combination of
subtraction and division.
cyber forensics is required for legal compliance and to enforce auditing policies in a way that the integrity of information is
maintained and tied to a sequence of actions, which may be attributed to a criminal behavior.
Turning our focus outward, we confront the orchestrated challenges posed by external threats.
Cybercriminals, state-sponsored actors, hacktivists, and corporate espionage attempts create a
formidable force that organizations must guard against. Understand the anatomy of external threats,
dissecting their potential impact, and implementing actionable insights to fortify defenses against
these ever-evolving challenges, integrating cyber threat intelligence.
External threats, often more visible, can result in large-scale data breaches, financial losses, and
infrastructure damage. Their visibility may exacerbate public concern, magnifying reputational
damage.
Risk analysis refers to the review of risks associated with the particular action or event. The risk analysis is applied
to information technology, projects, security issues and any other event where risks may be analysed based on a
quantitative and qualitative basis. Risks are part of every IT project and business organizations. The analysis of risk
should be occurred on a regular basis and be updated to identify new potential threats. The strategic risk analysis
helps to minimize the future risk probability and damage.
by assigning the probability and impact number. Probability is something a risk event will occur whereas
o The objective of qualitative risk analysis is to assess and evaluate the characteristics of individually
identified risk and then prioritize them based on the agreed-upon characteristics.
o The assessing individual risk evaluates the probability that each risk will occur and effect on the project
o Qualitative analysis is used to determine the risk exposure of the project by multiplying the probability
and impact.
o The objectives of performing quantitative risk analysis process provide a numerical estimate of the overall
o It is used to evaluate the likelihood of success in achieving the project objectives and to estimate
o Quantitative analysis is not mandatory, especially for smaller projects. Quantitative risk analysis helps in