Cyber Security notes
Cyber Security notes
Unit 1
Cyber Security refers to the practice of protecting systems, networks, and programs from digital
attacks. These cyberattacks are often aimed at accessing, altering, or destroying sensitive
information, extorting money from users, or interrupting normal business processes. Cyber
Security involves multiple layers of protection across the devices, networks, and data.
Importance:
Challenges:
Cyberspace
Cyberspace is the virtual environment where digital communication occurs. It encompasses the
internet, computer systems, networks, and associated digital technologies. It serves as a medium
for interaction, data exchange, and resource sharing.
Cyber Threats
Cyber threats are malicious acts aiming to damage, steal, or disrupt digital assets.
Common Types:
Cyberwarfare
Cyberwarfare involves the use of cyberattacks by nations or groups to damage another nation's
infrastructure or assets. Objectives include espionage, sabotage, and economic disruption.
Examples include the Stuxnet worm and attacks on critical systems like power grids.
CIA Triad
Cyber Terrorism
Cyber terrorism involves the use of digital attacks to instill fear or coerce governments. It targets
critical infrastructure, financial systems, or public safety networks, potentially leading to
physical or financial damage.
Critical infrastructure includes essential systems like power grids, water supply, transportation,
and healthcare. Protecting these systems from cyber threats ensures national security and public
safety. Techniques include:
Effective measures include employee training, incident response plans, and advanced threat
detection systems.
Unit 2
Types of Hackers
Hackers are individuals who exploit vulnerabilities in systems to gain unauthorized access. They
can be classified based on their intent and activities:
1. White Hat Hackers (Ethical Hackers) – Security experts who identify and fix
vulnerabilities to enhance protection.
2. Black Hat Hackers – Malicious hackers who exploit systems for personal or financial
gain.
3. Gray Hat Hackers – Operate in between; they hack systems without malicious intent but
without permission.
4. Script Kiddies – Inexperienced individuals using pre-written scripts to attack systems.
5. Hacktivists – Hackers driven by political or social motives to disrupt or deface websites.
6. State-Sponsored Hackers – Employed by governments to engage in espionage or cyber
warfare.
Hackers: Can have positive or negative intent; their focus is primarily on exploring or
securing systems.
Crackers: Malicious individuals who break into systems, bypass security, and cause
damage or steal data.
Cyber-Attacks and Vulnerabilities
1. Denial of Service (DoS) and Distributed DoS (DDoS) – Overloading systems to disrupt
services.
2. SQL Injection – Injecting malicious SQL code to manipulate databases.
3. Cross-Site Scripting (XSS) – Injecting scripts into web pages viewed by other users.
4. Man-in-the-Middle (MITM) – Intercepting communication between two parties.
5. Zero-Day Exploits – Attacks exploiting unknown vulnerabilities.
Malware Threats
Sniffing
Sniffing is the practice of intercepting and capturing data packets as they travel across a network.
Gaining Access
Hackers use various methods to gain unauthorized access to systems:
Escalating Privileges
Once access is gained, hackers escalate their privileges to gain administrative control.
Methods:
Executing Applications
Hiding Files
Covering Tracks
Log Tampering
Clearing Event Logs
Using Anti-Forensic Tools
Worms
Trojans
Viruses
Backdoors
Backdoors are hidden entry points in software or hardware that allow unauthorized access.
Unit 3
Objectives:
Threats: Any circumstance that can compromise the security of data or systems.
Attack Vectors: Methods used by hackers to breach systems.
Information Assurance
Information Assurance (IA) ensures the protection, integrity, and availability of data.
Key Pillars:
Threat Modelling
Threat modeling involves identifying and analyzing security threats to develop countermeasures.
Steps in Threat Modelling:
Phases of VAPT:
Types:
Insider Attack
An Insider Attack occurs when an employee or contractor misuses their access to compromise
systems.
Types:
Targets:
Unit 4
Cyber Forensics is the process of collecting, analyzing, and preserving digital evidence to
investigate cybercrimes. It focuses on tracing unauthorized access, recovering data, and
identifying the perpetrators behind cyberattacks. The goal is to ensure the integrity and
admissibility of evidence in a legal context.
Forensic investigations often involve various types of computer equipment and storage devices.
Common Devices:
A Forensics Investigator plays a crucial role in identifying, preserving, and presenting digital
evidence.
Key Responsibilities:
Challenges:
Volatility of data.
Encryption of traffic.
Real-time evidence collection.
Writing Computer Forensics Reports
A Forensics Report is a critical component that documents the investigation process and
findings.
Essential Elements:
Best Practices:
Auditing
Auditing is the process of evaluating systems, processes, and policies to ensure compliance with
security standards and organizational requirements.
Types of Audits:
1. Define Objectives – Establish the purpose of the audit (e.g., compliance, risk
assessment).
2. Identify Criteria – Reference standards like ISO 27001, NIST, or organizational
policies.
3. Gather Data – Collect relevant logs, documents, and access records.
4. Evaluate Controls – Test and assess the effectiveness of security controls.
5. Report Findings – Highlight gaps, vulnerabilities, and recommendations.
Information Security Management System (ISMS)
ISMS is a structured framework that manages and protects sensitive data within an organization.
Core Components:
Key Principles:
Implementation Steps:
Unit 5
Cyber Laws are legal frameworks established to regulate activities conducted on the internet.
They address issues related to cybercrime, data privacy, intellectual property, and electronic
transactions. Cyber laws ensure that online interactions are secure, legal, and ethical, protecting
individuals and organizations from cyber threats.
E-Commerce (Electronic Commerce) involves buying and selling goods or services over the
internet, while E-Governance refers to the use of digital platforms for government services and
administration.
E-Governance Initiatives:
The Information Technology (IT) Act 2000 is the primary legal framework in India addressing
cybercrime and electronic commerce. It was amended in 2008 to strengthen provisions against
emerging cyber threats.
Challenges in Cyberspace:
Protection Strategies:
IPSec (Internet Protocol Security) is a protocol suite used to secure network communication at
the IP layer by authenticating and encrypting each IP packet during data transfer.
Functions of IPSec:
Modes of IPSec:
1. Transport Mode:
o Encrypts only the payload of the IP packet.
o Suitable for internal network communication.
2. Tunnel Mode:
o Encrypts the entire IP packet (header + payload).
o Used for secure communication between different networks.
Components of IPSec:
1. Authentication Header (AH): Provides data integrity and authentication but does not
encrypt data.
2. Encapsulating Security Payload (ESP): Encrypts and authenticates data, ensuring
confidentiality and integrity.
Benefits of IPSec: