Cyber Security
Cyber Security
Defining Cyberspace
The term Cyberspace was first coined by William Gibson in the year 1984.
Cyberspace is the environment in which communication over computer
networks occurs.
Cyberspace is the virtual and dynamic space created by the machine clones.
Cyberspace mainly refers to the computer which is a virtual network and is a
medium electronically designed to help online communications to occur.
The primary purpose of creating cyberspace is to share information and
communicate across the globe.
Cyberspace is that space in which users share information, interact with each
other; engage in discussions or social media platforms, and many other
activities.
The whole Cyberspace is composed of large computer networks which have
many sub- networks. These follow the TCP or IP protocol.
Linux) and various applications (e.g., Microsoft Office, web browsers, video
games) that run on a computer. Operating systems manage hardware resources
and provide a user interface.
3. Networking: Computers can connect to each other and the internet via wired
threats like viruses, malware, and hackers. Antivirus software, firewalls, and
encryption are common security measures.
5. Processing Power: Moore's Law predicts that the processing power of
Microsoft Edge allow users to access and interact with web content.
3. Web Development: Web development involves creating and maintaining
store and deliver digital content and services. They play a pivotal role in
hosting websites, applications, and cloud services.
5. Cybersecurity: The architecture of cyberspace includes various security
communities and social media platforms that enable users to connect, share
information, and collaborate online. These platforms have their own
architectures and algorithms for content delivery and interaction.
10. Internet of Things (IoT): IoT devices are connected to cyberspace, enabling
them to collect and exchange data with other devices and systems. They play a
role in creating the "smart" aspect of cyberspace, connecting physical objects
to the digital realm.
11. Regulations and Governance: Various laws and regulations govern
network of interconnected computers and servers that allows for the transfer
of data and information across the world.
2. Web Browsers: Web browsers like Chrome, Firefox, Safari, and Edge are
software applications that enable users to access and interact with websites
and web-based applications.
3. Websites: Websites are collections of web pages that are hosted on web
servers and can be accessed through a web browser. They are created using
various web technologies such as HTML, CSS, and JavaScript.
4. Web Development: Web development involves designing, creating, and
5. Web Standards and Protocols: Various standards and protocols govern web
Regulation of cyberspace
Cyberspace spans worldwide, but it has no formal framework. The lack of
formal framework makes cyberspace nobody's domain
No single individual, entity, or government owns or controls cyberspace.
Regulation in cyberspace is an emerging challenge
The default in cyberspace is anonymity. Anonymity encourages and enhances
the exercise of freedom. A child too shy to express himself in physical space
can feign to be somebody else in virtual space, and express himself freely.
Crimes of global repercussion are also committed with the use of the internet.
Trafficking of persons, child pornography, kidnapping for ransom, and
terrorism are perpetrated with the use of cyberspace. Freedom thus in
cyberspace should not be exercised without the concomitant responsibility of
its users.
Practical Problems In Extending The Traditional Laws To Cyberspace
1. Multiple Jurisdictions-Because of anonymity of the Internet user,
Cyber Attacks
A cyber-attack is an exploitation of computer systems and networks. It uses
malicious code to alter computer code, logic or data and lead to cybercrimes,
such as information and identity theft.
network. Web applications create cookies to store the state and user sessions.
By stealing the cookies, an attacker can have access to all of the user data.
III.Phishing: Phishing is a type of attack which attempts to steal sensitive
information like user login credentials and credit card number. It occurs
when an attacker is masquerading as a trustworthy entity in electronic
communication.
IV.Denial of Service:It is an attack which meant to make a server or network
computer setting and unusual activity, even when the computer should be idle.
It misleads the user of its true intent. It appears to be a normal application but
when opened/executed some malicious code will run in the background.
Cyber Threat
• A Cyber threat is any malicious act that attempts to gain access to a
Cyber Cyber
Threat Attack
A Threat by definition is a condition /
circumstance which can cause damage to An Attack by definition is an intended
the system/asset. action to cause damage to system/asset.
is forged so that the mail appears to originate from one source but
actually has been sent from another source.
Spamming: Spamming means sending multiple copies of
unsolicited mails or mass e-mails such as chain letters.
Cyber Defamation: This occurs when defamation takes place with
to mine cryptocurrency without their consent, which can slow down the
device and increase energy consumption.
To protect against cybercrime targeting computers and mobiles, individuals
for sexual exploitation. They build trust with the child and gradually
manipulate them into sharing personal information or engaging in
inappropriate activities.
6. Child Pornography: The distribution, possession, or creation of child
Financial frauds
Financial frauds can have devastating consequences for individuals and the
economy as a whole. While digital payments have made life convenient and
easy In India, they have also made us prone to all kinds of financial frauds.
Ponzi Schemes: A Mirage of False Promises
• Ponzi schemes lure investors with promises of unusually high returns in a
short period. The fraudsters use funds from new investors to pay off earlier
investors, creating a false illusion of profitability.
• One infamous example is the Saradha chit fund scam, where millions of
investors lost their hard-earned money. The group, consisting of over 200
private companies, falsely portrayed its collective investment schemes as
chit funds.
• With an estimated collection of ₹200 to 300 billion (US$4–6 billion), the
scheme managed to attract deposits from more than 1.7 million individuals
before its eventual downfall.
Identity fraud
• Identity fraud is common on Internet. Criminals have a few options when it
pretending to be from your bank. Or, they could target you with a cyber
attack to get you to install malware on your devices that steals your logins
and passwords.
• How do you know you're being targeted?
− Unfamiliar transactions on your credit card.
− Strange charges on your bank statements.
− New credit cards or loans in your name.
− Missing or error-filled tax returns.
− Calls from debt collectors about purchases you didn’t make.
− A drop in credit score.
− Bounced checks.
Fraudulent charities
• Scammers use philanthropy as fraud, too. Charity fraud entails creating a
fake charity and collecting “donations” that disappear along with the thief
• How does charity fraud happen?
− Scammers create fake charities — like military veteran charities — that
sound like ones you know and trust. These scams are especially
common during natural disasters or international news events.
• What are the warning signs?
− Claiming that you’re a previous donor when you know you’ve never
sent them money.
− Only accepting donations through cash, cryptocurrency, gift cards, or
wire transfers
They could steal your physical card, trick you into entering information on a
phishing website or email, buy your details on the Dark Web, or use any
number of other credit card scams.
• Hackers can also create a clone of your physical card using just your credit card
numbers.
• What are the warning signs?
− Suspicious transactions on your credit card or bank statement.
− Small unfamiliar charges on your account. (Fraudsters use a scam called
carding to validate your credit card before making large purchases.)
− Fraud alerts from your bank, credit card issuer, or credit monitoring service.
Stock Market Manipulation
• Stock market manipulation includes activities like price rigging, spreading
Social Engineering
It is the “technique to influence” & “persuasion to deceive” people to obtain
the information.
It exploits the fact that people are the weak link in security.
Social engineers build the trust with the victim/person to gain the
unauthorized information/access
Their goal is to fool someone into providing valuable information.
Example: The attacker (social engineer) calling a user & pretending to be a
tech support person & ask questions about the confidential files, passwords,
etc.
personnel to obtain the information since they are trained to help users.
v. Shoulder surfing: It involves gathering information (usernames,
passwords, etc) by watching over a person’s shoulder while he/she logs
into the system.
vi. Dumpster diving (Scavenging/Binning): It involves looking in the
computer/software/internet.
system in the form of an email attachment. The virus, worms, etc which
will be present in the email attachment will be automatically executed if
the victim opens the attachment.
iii.Pop-up windows: They are used similar to email attachments but they
encourage the victim to click on special offers or free stuffs so that the
malicious code can be installed to the system.
Effects of Social Engineering:
Loss/altering of medical & healthcare information, corporate financial data,
electronic funds transfers, etc.
Loss of customers
Loss of funds
Loss of trust
Collapse of the organization
Counter measures (Security) against Social Engineering:
Providing training/awareness to the potential victims at regular intervals about
the attacks
Creating awareness on how attackers gain the trust of the victims
Strict policies about service desk staff, not to ask for personal/sensitive
information
Educate potential victims to recognize social engineering attempt
Cyber attackers create, use and sell malware for many different reasons, but it
is most frequently used to steal personal, financial or business information.
Types of Malware
1. Adware: Display ads (sometimes malicious ads) to users as they work on their
“X” in the upper corner and navigate away from the site that generated it.
Limit the number of apps on your devices. Only install apps you think you
need and will use regularly. And if you no longer use an app, uninstall it.
2. Be careful online
Avoid clicking on unknown links. Whether it comes via email, a social
come from your bank and instructs you to click a link and reset your
password or access your account, don't click it. Go directly to your online
banking site and log in there.
Avoid risky websites, such as those offering free screensavers.
3. Perform regular checks
If you are concerned that your device may be infected, run a scan using
Ransomware Attack
A ransomware attack is a malware that encrypts personal information and
documents while demanding a ransom amount to decrypt them.
Once the files are encrypted or locked behind a password, a text file is
available to the victim, explaining how to make the ransom payment and
unlock the files for it.
How Does a Ransomware Attack Work?
The spread of ransomware mostly starts with phishing attacks. A ransomware
attack gains access to a victim's device through infected emails, messages,
and malicious sites and encrypts the data in that device.
Apple’s iOS fell victim in 2020 to two sets of zero-day bugs that saw attackers
compromising iPhones remotely.
1. Keep all software and operating systems up to date. This is because the
potential vulnerabilities you have. You can reduce the risk to your network by
using only the applications you need.
3. Use a firewall. A firewall plays an essential role in protecting your system
Zero click
zero-click attacks require no action from the victim – meaning that even the
most advanced users can fall prey to serious cyber hacks and spyware tools.
also called interaction-less or fully remote attacks.
spying software relies on convincing the targeted person to click on a
compromised link or file to install itself on their phone, tablet, or computer.
However, with a zero-click attack, the software can be installed on a device
without the victim clicking on any link. As a result, zero-click malware or no-
click malware is much more dangerous.
The target of a zero-click attack can be anything from a smartphone to a
desktop computer and even an IoT device
using mobile phones in bulk. Hence the actual source could not be fixed.
Such messages are often a cause of misperception among people of
different race, culture and tradition many a times often resulting in fights
or riots.
Unaware and innocent people often fall in traps of cyber criminals for
SMS of lottery, Emails of prize money, false promise of jobs, and false
mail for admission in reputed colleges.
Multimedia messages often defaming the identity of a person are
annoying them.
Many a time anonymous calls are used by the criminals as an effective
Such calls are intended to hide the actual location of the caller and any
fake or annoying calls are made. Such calls are often used for terrorist
activity and for trafficking illegal goods or for any ransom or
blackmailing purposes.
Cyber Criminals operating from overseas and indulged in forgery are
contact your bank or financial institution immediately. They can help you
secure your accounts and investigate any unauthorized transactions.
6. Report to Internet Service Providers (ISPs): If you have evidence of
reporting portals where you can report cybercrimes. These portals may be
managed by government agencies or law enforcement. Check if your region
offers such a service.
9. Consider Legal Advice: In some cases, it may be necessary to seek legal
Remedial Measures:
1. Incident Response: In the event of a cyber crime, organizations should have an
incident response plan in place to quickly identify, contain, and mitigate the
impact of the attack. This includes isolating affected systems, restoring backups,
and applying patches or security updates.
help identify the source and extent of the cyber crime, gather evidence, and
aid in legal proceedings.
3. Data Recovery: If data is compromised or encrypted due to a cyber attack,
Mitigation Measures:
1. Strong Security Practices: Implement robust security measures, such as
Media sharing types of Social Media are used to find and share
photographs, live video, video and other kinds of media on the web.
They are also going to help you in brand building, lead generation, targeting
and so on.
Examples: Instagram, Snapchat, YouTube
3. Discussion Forums
Discussion forums encourage people to answer each other's questions and
share ideas and news.
Discussion forums are very essential because they allow users to ask
questions and get answers from different people.
Examples: Quora, Reddit, Digg
5. Bookmarking networks
Bookmarking networks are platforms where users save different ideas,
articles, posts and other content for later use.
Many people also share links to lists of online resources.
The purpose of these websites is to discover new content based on
shared interests and to discuss trends.
Examples: Feedly, Flipboard,Pocket,StumbleUpon, Pinterest
6. Consumer Review Networks
Using Customer Review networks will help you find out, share
and review different information about a variety of products, services
or brands.
When a business has positive reviews on these networks, their
claims turn more credible because reviews on these networks act as
Social Proof.
Examples: Yelp, Zomato, Trip Advisor
7. Social shopping networks
These networks help people spot trends, share great finds,
make purchases and follow their favorite brands. They focus on e-
commerce, and the social element makes it engaging and
entertaining.
Examples: Polyvore, Etsy, Fancy
These categories often overlap, and many social media platforms offer a combination
of functionalities to meet user needs and preferences.
ROI (return on investment): Identify if and how your money is paying off.
Hashtags and keywords: Find the right ones to improve your social media
strategies and attract new customers.
Trends: Identify popular themes, memes, songs, and topics in real time and
how your brand could jump on some of them to attract business.
Share of voice: Understand the percentage of online conversations that are
about your brand vs your competitors.
Hashtag
When it comes to social media, the hashtag is used to draw attention, organize,
promote, and connect.
Hashtags refer to the usage of the pound or number symbol, "#," to mark a
keyword or topic on social media.
It's used within a post on social media to help those who may be interested
in your topic to be able to find it when they search for a keyword or
particular hashtag
It helps to draw attention to your posts and encourage interaction.
The hashtag's use in social media is closely associated with microblogging site
Twitter.
Hashtags can be a fun way to enhance communication and connect yourself
to others discussing the same topic. They offer a shorthand way of
referring to a topic, providing context, or simply adding humor or sarcasm
to a message.
Viral content
Cons
May be time-consuming to set up and maintain
May be unpredictable, as different platforms may change algorithms
May result in negative feedback displayed in a very public fashion
1. Define Your Goals: Determine what you want to achieve with your social
media presence. Whether it's brand awareness, lead generation, customer
engagement, or something else, having clear goals will guide your strategy.
Case studies.
Security Case Studies:
1. Facebook-Cambridge Analytica Scandal (2018): Cambridge Analytica
harvested data from millions of Facebook profiles without users'
consent. This breach raised concerns about data privacy and led to
investigations, changes in Facebook's policies, and CEO Mark
Zuckerberg's testimony in front of Congress.
2. Twitter Hacks (2020): Several high-profile Twitter accounts,
including those of Barack Obama, Elon Musk, and Bill Gates, were
compromised in a Bit coin scam. Hackers gained access to accounts
through social engineering attacks on employees, highlighting the need
for robust internal security protocols.
3. LinkedIn Data Breach (2021): Personal data of around 500 million
LinkedIn users, including email addresses and phone numbers, was
scraped and put for sale online. It raised concerns about data scraping
and the vulnerability of personal information on professional
networking sites.
4. TikTok's Privacy Concerns: TikTok faced scrutiny over its data
collection practices, especially given its Chinese ownership. Concerns
were raised about the potential misuse of user data and its handling,
leading to investigations and debates regarding national security risks.
5. WhatsApp Privacy Policy Update (2021): WhatsApp faced
backlash after announcing changes to its privacy policy, allowing greater
data sharing with its parent company, Facebook. This led to widespread
concern over user privacy and data sharing practices.
Security Measures:
Two-Factor Authentication (2FA): Adding an extra layer of security to
accounts.
Privacy Settings Review: Regularly reviewing and adjusting privacy
settings.
Strong Passwords: Using complex and unique passwords for different
platforms.
Regular Updates and Patches: Ensuring apps and devices are
updated with the latest security patches.
Awareness and Education: Educating users about potential threats
and best practices for staying secure online.
Module-IV:
Definition of E- Commerce, Main components of E-Commerce, Elements of E-
Commerce security, E-Commerce threats, E-Commerce security best practices.
Advantages of e- commerce, Survey of popular e-commerce sites.
Introduction to digital payments, Components of digital payment and stake holders,
Modes of digital payments- Banking Cards, Unified Payment Interface (UPI), e-
Wallets, Unstructured Supplementary Service Data (USSD), Aadhar enabled payments,
Digital payments related common frauds and preventive measures. RBI guidelines
on digital payments and customer protection in unauthorized banking transactions.
Relevant provisions of Payment Settlement Act, 2007.
Definition of E- Commerce
E-Commerce or Electronic Commerce means buying and selling of goods,
products, or services over the internet.
E-commerce is also known as electronic commerce or internet commerce.
Transaction of money, funds, and data are also considered as E-commerce.
These business transactions can be done in four ways: Business to Business
(B2B), Business to Customer (B2C), Customer to Customer (C2C), and
Customer to Business (C2B).
E-commerce platforms face various threats that can compromise security and
disrupt operations. Here are some common threats:
1.Data Breaches: These occur when sensitive customer information, such as
credit card details or personal data, is accessed or stolen by unauthorized
individuals or cybercriminals. Breaches can happen through hacking,
phishing, or exploiting vulnerabilities in the system.
6.QR Codes: Scannable codes that store payment information, enabling easy
transactions by simply scanning the code.
Stakeholders:
1. Customers/Users: Individuals or entities making payments or
transactions using digital payment methods.
2. Merchants/Retailers: Businesses or individuals selling goods or services
and accepting digital payments from customers.
3. Financial Institutions: Banks, credit unions, and other financial entities
that provide the infrastructure and accounts necessary for digital
transactions.
4. Payment Service Providers (PSPs): Companies that offer services
facilitating digital payments for merchants, such as Stripe, Square, or
Adyen.
5. Regulatory Bodies/Government Agencies: Entities responsible for
creating and enforcing rules, regulations, and standards for digital
payments to ensure security and fairness.
6. Technology Providers: Companies developing and maintaining the
technology and software necessary for secure digital payment systems,
including hardware manufacturers and software developers.
7. Security Firms: Organizations specializing in ensuring the security of
digital payment systems by providing encryption, fraud detection, and
cyber security services.
These components and stakeholders collectively form the ecosystem that enables
the seamless execution of digital payments across various platforms and
devices.
AEPS doesn’t require any physical activity like visiting a branch, using debit or
credit cards or making a signature on a document. This bank-led model allows
digital payments at PoS (Point of Sale / Micro ATM) via a Business
Correspondent (also known as Bank Mitra) using Aadhaar authentication.
Each mode of digital payment offers its own set of advantages in terms of
accessibility, ease of use, security, and suitability for different scenarios. The
choice of which to use often depends on factors like convenience, accessibility to
technology, internet connectivity, and personal preferences.
Digital Payments Related Common Frauds and Preventive Measures
With the increasing trend of digital payment systems, the number of fraud
attempts is also increasing at an alarming rate. Cybercriminals are always looking
for ways to exploit the loopholes in the digital payment process to steal money
from unsuspecting individuals.
1. Phishing
Phishing scams are fake messages, emails, or websites that trick people
into providing their personal information, such as login credentials, credit
card details, or social security numbers. These scammers then use this
information to access victims’ accounts and steal their funds.
Preventive Measures:
− Verify website URLs before entering any personal information.
− Never share personal or financial details via email or unsecured
websites.
− Enable two-factor authentication for added security.
2. Identity Theft
Identity theft occurs when a fraudster steals someone’s personal
information, such as their name, address, or social security number, and
uses it for fraudulent activities, such as opening a new credit card or
mobile payment account.
Preventive Measures:
− Use strong, unique passwords for each financial account.
− Regularly monitor your credit report for any suspicious activities.
− Be cautious while sharing personal information online.
3. Account Takeover
In an account takeover, a fraudster gains access to a user’s digital
payment account by stealing their login credentials or obtaining their
personal information using phishing scams. The attacker then uses the
account to make unauthorized transactions and transfer funds.
Preventive Measures:
− Use strong, unique passwords and change them regularly.
− Enable account alerts for any unusual activity.
− Consider using biometric authentication if available.
4. Card Skimming
Card skimming involves the illegal copying of a user’s credit or debit card
information using a skimming device when the card is swiped for payment.
The scammers then use the copied information to make fraudulent
transactions.
Preventive Measures:
− Check for tampering on card readers before using them.
− Use contactless payment methods where possible.
− Regularly monitor your account statements for any unauthorized
charges.
5. Malware and Spyware:
Malicious software designed to steal financial information from devices.
Preventive Measures:
− Install and regularly update antivirus and anti-malware software.
− Avoid clicking on suspicious links or downloading unknown
attachments.
− Keep your device's operating system and apps up to date.
6.Unauthorized Transactions:
Transactions made without the account holder's knowledge or consent.
Preventive Measures:
− Regularly check account statements for any unfamiliar transactions.
− Enable transaction notifications or alerts for your accounts.
− Report any unauthorized transactions to your bank or
payment provider immediately.
7.Social Engineering Attacks:
Manipulating individuals to reveal confidential information.
Preventive Measures:
− Be cautious of unsolicited calls or messages asking for personal
information.
− Verify the identity of the person or organization before sharing any
details.
− Educate yourself and your family about common social engineering
tactics.
RBI guidelines on digital payments and customer protection in unauthorized
banking transactions.
The Reserve Bank of India (RBI) has put forth various guidelines regarding digital
payments and customer protection, particularly concerning unauthorized
banking transactions.
Here are some key aspects:
Digital Payments:
1.Security Measures: RBI mandates that banks and financial institutions
implement robust security measures to safeguard digital transactions. This
includes two-factor authentication, encryption, and other security protocols.
2.Customer Awareness: Banks are required to educate customers about safe
digital practices, potential risks, and methods to secure their transactions. This
could be through notifications, SMS alerts, or educational campaigns.
3.Fraud Monitoring: Regular monitoring of transactions for any suspicious
activity or patterns to prevent fraudulent transactions is mandatory.
4.Prompt Redressal: There are provisions for customers to report unauthorized
transactions promptly. Upon receiving such reports, banks are obligated to
investigate and resolve complaints within a specific timeline.
Customer Protection in Unauthorized Transactions:
1.Limited Liability of Customers: In cases of unauthorized transactions, if
the customer reports the transaction within a stipulated time frame, the
customer's liability is limited. The liability shift is from the customer to the
bank, subject to certain conditions and documentation.
2.Timely Reporting: Customers are encouraged to report unauthorized
transactions or any suspicious activity as soon as possible to minimize their
liability.
3.Dispute Resolution: There is a defined process for dispute resolution
between the customer and the bank regarding unauthorized transactions.
4.Reversal of Transactions: The RBI mandates that banks have to ensure
prompt reversal of any unauthorized transaction within a specified time
frame once it is reported by the customer.
Relevant provisions of Payment Settlement Act,2007.
The Payment and Settlement Systems Act, 2007 is an Indian legislation that
provides the regulatory framework for payment systems in India. Here are some
of the relevant provisions:
1. Regulation of Payment Systems: The Act establishes the Reserve
Bank of India (RBI) as the regulatory authority for payment systems in
India. It aims to ensure the stability, efficiency, and integrity of
payment systems.
2. Designation of Payment Systems: The RBI has the authority to
designate systems for the purpose of the Act, allowing it to regulate
and supervise various payment systems in the country.
3. Licensing of Payment System Operators: The Act outlines
provisions for the licensing and regulation of payment system operators,
ensuring that entities involved in payment systems meet certain criteria
and adhere to specified norms.
4. Oversight and Monitoring: The RBI is empowered to oversee and
monitor payment systems to ensure their smooth functioning, stability,
and compliance with regulations.
5. Settlement Finality: The Act provides for settlement finality, meaning
that once a settlement in a payment system is deemed final, it cannot be
revoked or reversed, except in certain specified circumstances.
6. Establishment of Payment System Board: The Act establishes a
Payment System Board within the RBI to regulate and supervise payment
systems more effectively.
7. Penalties and Enforcement: Provisions for penalties and enforcement
mechanisms are outlined in the Act to ensure compliance with its
provisions and regulations set by the RBI.
These provisions and more are detailed in the Payment and Settlement Systems
Act, 2007, aimed at fostering a secure, efficient, and reliable payment system
framework in India.
Module-V:
End Point device and Mobile phone security, Password policy, Security patch
management, Data backup, Downloading and management of third-party software,
Device security policy, Cyber Security best practices, Significance of host firewall and
Ant-virus, Management of host firewall and Anti-virus, Wi-Fi security, Configuration of
basic security policy and permissions.
4. Encrypt Mobile Data: Enable encryption for data stored on the device.
Most modern smart phones have this option in settings.
5. Remote Wipe/Find Features: Activate remote wipe/locate features so that if
the device is lost, you can erase its data or find its location.
6. Regular Updates: Keep the phone's operating system and apps updated to
patch vulnerabilities.
7. Use VPNs on Public Networks: When connecting to public Wi-Fi, use a
Virtual Private Network (VPN) for encrypted and secure browsing.
8. Avoid Jail breaking or Rooting: Avoid modifying the phone's operating
system beyond the manufacturer's intended use, as it can expose the device to
more risks.
Password policy
A password policy sets the rules that passwords for a service must meet, such as
length and type of characters allowed and disallowed.
Password policies are crucial for ensuring the security of digital accounts and
systems. They typically include guidelines and requirements that dictate how
passwords should be created, used, and managed. Here are some common
elements of a robust password policy:
1. Password Length: Requiring a minimum number of characters (often 8-12)
helps create stronger passwords.
2. Complexity Requirements: Encouraging or mandating a mix of
character types (uppercase, lowercase, numbers, symbols) makes
passwords harder to crack.
3. Regular Changes: Requiring periodic password changes (every 60-90
days) reduces the risk of prolonged exposure to potential breaches.
4. Prohibiting Common Passwords: Blocking commonly used or easily
guessable passwords enhances security.
5. Account Lockout: Implementing a mechanism that locks an account after
multiple failed login attempts prevents brute force attacks.
6. Multi-Factor Authentication (MFA): Encouraging or mandating the use
of MFA adds an extra layer of security, requiring users to provide more than
one form of verification.
7. Education and Training: Providing guidance to users on creating strong
passwords and the importance of safeguarding them through regular
training or resources.
8. Restrictions on Password Sharing: Discouraging or prohibiting the
sharing of passwords helps maintain individual account security.
Effective patch management helps mitigate the risks associated with security
vulnerabilities, reducing the chances of security breaches or attacks exploiting
known weaknesses in software or systems.
Data backup
6. Secure Wi-Fi Networks: Use strong encryption (like WPA3) for Wi-Fi
networks, change default passwords on routers, and hide your network's SSID to
prevent unauthorized access.
7. Implement Firewalls: Use firewalls to establish barriers between your
internal network and untrusted external networks, such as the internet.
8. Limit Access and Permissions: Grant access only to necessary data and
systems. Regularly review and update user permissions as roles change within
the organization.
9. Monitor and Respond: Employ monitoring tools to detect and respond to
security threats promptly. This includes network traffic, system logs, and
anomalous activities.
10. Create an Incident Response Plan: Develop a plan outlining steps to take in
the event of a cyber security incident. This helps in responding effectively and
minimizing damage.
11. Encrypt Sensitive Data: Encrypt data both in transit and at rest. This adds a layer
of protection even if data is compromised.
12. Third-Party Risk Management: Assess and manage the security risks posed
by third-party vendors and service providers who have access to your systems
or data.
13. Regular Security Audits: Conduct periodic security audits and assessments
to identify vulnerabilities and address them promptly.
14. Implement Least Privilege: Provide users with the minimum level of access
needed to perform their jobs. This minimizes the risk of unauthorized access.
15. Stay Informed: Stay updated on the latest cyber security threats and trends.
This knowledge helps in proactively securing systems and networks.
Cyber security is an ongoing process requiring continuous efforts to stay
ahead of evolving threats. Implementing these best practices can significantly
strengthen your organization's security posture.
Both host firewalls and antivirus software play critical roles in computer
security, albeit in different ways.
Host Firewall:
A host firewall is a software or hardware component that monitors and
controls incoming and outgoing network traffic on an individual device (such
as a computer or server). Its primary function is to act as a barrier between
your device and potentially malicious content from the internet or other
networks.
− Protection: It helps prevent unauthorized access to or from a private network
by controlling the traffic entering or leaving the device.
− Filtering: It filters network packets based on predefined security rules, allowing
or denying traffic based on various criteria like IP addresses, ports, protocols,
and applications.
− Defense: A host firewall is the first line of defense against many common
network-based attacks, such as port scanning, malware, and certain types of
cyber threats.
Antivirus Software:
Antivirus software is designed to detect, prevent, and remove malicious software
(malware) from a computer or device.
− Malware Protection: It scans files, emails, downloads, and other elements of
your system for known patterns and behaviors associated with viruses,
worms, Trojans, spyware, ransomware, and other types of malicious
software.
− Real-time Monitoring: Many antivirus programs run continuously in the
background, monitoring system activities and flagging or quarantining
suspicious files or processes.
− Updates and Heuristics: Antivirus software relies on regular updates to its
virus definition databases to recognize new threats. Additionally, some
use heuristic analysis to detect previously unknown malware by
identifying suspicious behavior patterns.
Significance:
− Complementary Protection: Host firewalls and antivirus software complement
each other. Firewalls protect against unauthorized network access, while
antivirus software safeguards against malware threats.
− Defense in Depth: Employing both provides a multi-layered defense,
crucial in cyber security, known as defense in depth. If one layer fails,
others might still provide protection.
− Preventative Measures: Together, they significantly reduce the risk of various
cyber threats, preventing unauthorized access, data breaches, and the potential
damage caused by malware infections.
In the constantly evolving landscape of cyber security, it's essential to keep
both your host firewall and antivirus software updated to ensure they can
effectively counter new and emerging threats.
Management of host firewall and Anti-virus
Managing host firewalls and antivirus software is crucial for maintaining a secure
system. Here are some general guidelines for managing them effectively:
Firewall Management:
1. Understand Firewall Rules: Learn how your firewall works and the rules
governing inbound and outbound traffic. Configure rules based on the
principle of least privilege, allowing only necessary traffic.
2. Regular Updates: Keep the firewall software updated to ensure it has the
latest security patches and features.
3. Logging and Monitoring: Enable logging to track firewall activities.
Regularly review logs for any suspicious activities or unauthorized access
attempts.
4. Default Deny Policy: Implement a default deny policy where all traffic is
blocked unless specifically allowed. This minimizes the attack surface.
5. Application Control: Use application-specific rules to control which
applications can access the network. This helps prevent unauthorized
programs from communicating externally.
Antivirus Management:
1. Regular Updates: Ensure your antivirus software is updated with the latest
virus definitions and software patches. New threats emerge regularly, so
frequent updates are crucial.
2. Scheduled Scans: Set up regular system scans to check for malware,
viruses, and other threats. Perform full system scans periodically.
3. Real-Time Protection: Enable real-time scanning to monitor files and
processes in real- time for any suspicious behavior or malware.
4. Quarantine and Removal: Configure the antivirus to quarantine or
remove identified threats automatically. Regularly review quarantined items
to ensure no false positives.
5. User Education: Educate users about safe browsing habits, downloading files
from trusted sources, and avoiding suspicious emails or websites that
could introduce malware.
6. Compatibility and Performance: Ensure the antivirus software doesn’t
conflict with other applications or significantly degrade system
performance. Adjust settings if needed for optimal performance
Wi-Fi security
Wi-Fi security is crucial in safeguarding your network from unauthorized access,
data breaches, and various cyber threats. Here are some essential tips to
enhance Wi-Fi security:
1. Strong Passwords: Use a complex, unique password for your Wi-Fi
network. Avoid using default passwords provided by the router
manufacturer.
2. Encryption: Enable WPA3 (Wi-Fi Protected Access 3) encryption if
available on your router. WPA2 is also secure but might not be as
robust as WPA3.
Creating a basic security policy involves several steps and considerations. Here’s
a general guide on how to approach setting up security policies and
permissions:
1. Identify Assets: Determine what data, systems, or resources need protection.
This could be customer data, intellectual property, servers, etc.
2. Risk Assessment: Evaluate potential threats and vulnerabilities to those assets.
Consider internal and external risks, such as cyber attacks, unauthorized
access, data breaches, etc.
3. Define Security Policies: Create a set of rules and guidelines to protect the
identified assets. This might include:
− Access Control Policies: Define who can access what. Use principles like
least privilege (giving users only the necessary permissions) and
separation of duties.
− Data Encryption Policies: Specify when and where encryption should
be applied to sensitive data, both at rest and in transit.
− Password Policies: Establish guidelines for strong, regularly updated
passwords and multi-factor authentication.
− Security Update Policies: Define how often systems and software should
be updated to patch vulnerabilities.
− Incident Response Policies: Lay out procedures for responding to
security incidents, including reporting and mitigation steps.
4. Implement Permissions:
− User Roles: Define roles (like admin, user, manager) and assign
permissions accordingly. Admins usually have the highest level of access,
while users have more limited access.
− Access Controls: Use tools like access control lists (ACLs) or Role-Based
Access Control (RBAC) to enforce permissions. This can be managed
through operating systems, databases, or applications.
5. Regular Audits and Updates: Periodically review and update security policies and
permissions. Technology changes and new threats emerge, so it’s important to
stay up-to-date.
6. Employee Training: Educate employees about security policies and the
importance of adhering to them. Human error is a significant factor in security
breaches.
7. Monitoring and Logging: Implement systems to monitor user activities and
log events. This helps in identifying suspicious behavior and investigating
incidents.
8. Compliance: Ensure that your security policies align with relevant regulations
and industry standards applicable to your organization.
Remember, this is a general framework. The specifics will vary depending on the
nature of your organization, the industry, and the regulatory environment you
operate in. Always consider seeking professional advice or a security expert's
help when setting up security policies for an organization.