Module 1 Introduction to Cyber Security PDF

Document Details

EngagingDune2598

Uploaded by EngagingDune2598

Prof. Anuraj Bose

Tags

cyber security cyberattacks data protection information security

Summary

This document provides an introduction to cyber security. It covers topics such as defining cyber security, its importance, and different subfields. It also discusses the need for robust security measures in today's digital world.

Full Transcript

Module 1 : Introduction to Cyber Security 1 Module 1: Introduction to Cyber Security 1. Definition of Cyber Security and Its Importance What is Cyber Security? Cyber Security refers to a collection of techniques, policies, and processes designed to protect systems, networks, and data...

Module 1 : Introduction to Cyber Security 1 Module 1: Introduction to Cyber Security 1. Definition of Cyber Security and Its Importance What is Cyber Security? Cyber Security refers to a collection of techniques, policies, and processes designed to protect systems, networks, and data from cyber threats such as unauthorized access, hacking, malware, and data theft. These measures ensure the security of data by protecting against attacks, unauthorized access, and damage to hardware, software, or electronic data. Cyber security encompasses several subfields, including: Network Security: Protects the integrity and usability of network systems by identifying and stopping threats such as unauthorized access, malware, or distributed denial of service (DDoS) attacks. Application Security: Ensures that software and apps are secure from vulnerabilities during development and deployment. Information Security: Protects the integrity and privacy of data, both in storage and during transmission. Why is Cyber Security Crucial in Today's Digital World? In today’s digital landscape, cyber security is crucial for several reasons, driven primarily by the increasing reliance on technology for personal, financial, and business operations. 1. Growing Number of Cyber Attacks: The frequency of cyberattacks has grown exponentially in recent years. According to a 2020 IBM report, India was the second most attacked country globally in terms of cyber security breaches. 2. Data Protection: With the explosion of data creation and storage, particularly with personal data (banking details, healthcare records), the protection of this data is paramount. 3. Digital Transformation: Industries such as banking, healthcare, and education are moving towards digital-first models, increasing the need for robust security measures. 4. Critical Infrastructure Protection: Government and national security sectors, as well as utilities like electricity grids, depend on cyber security to protect against attacks that can cause widespread disruption. © Prof. Anuraj Bose, www.anurajbosu.com Module 1 : Introduction to Cyber Security 2 Case Study: Aadhaar Data Breach (India, 2018) The Aadhaar Data Breach in 2018 raised significant concerns over India's largest biometric database. This breach exposed sensitive personal information such as names, addresses, phone numbers, and Aadhaar numbers of over 1 billion citizens. The incident highlighted the need for stronger encryption and protection mechanisms in government databases. Suggested Reading: Book: "Cyber Security Essentials" by James Graham, Richard Howard, Ryan Olson [Book Link] Chapter: Introduction to Cyber Security 2. The CIA Triad: Confidentiality, Integrity, and Availability The CIA Triad is a fundamental model designed to guide security policies in organizations and ensure that their data and systems remain protected. Each element plays a key role in building a secure infrastructure. Confidentiality Confidentiality refers to the principle of restricting access to information only to those who are authorized. Confidential data may include personal identification details, banking information, or proprietary business data. This principle ensures that sensitive information is not shared with or disclosed to unauthorized parties. Techniques to Ensure Confidentiality: o Encryption: Encrypting data to make it unreadable to unauthorized users. o Access Control: Limiting access to information through the use of permissions and authentication mechanisms. o Two-Factor Authentication (2FA): Adding an extra layer of security by requiring two forms of verification. Example: o Banking Transactions: When conducting online banking in India, users' data is encrypted to ensure their financial details are not intercepted during transmission. Additionally, banks use OTP (One-Time Password) verification for transactions as an extra layer of security. © Prof. Anuraj Bose, www.anurajbosu.com Module 1 : Introduction to Cyber Security 3 Integrity Integrity ensures that the data being stored or transmitted is accurate and has not been tampered with or altered by unauthorized entities. This is critical in areas like financial records, medical data, and communications where even a small change can have serious consequences. Methods to Ensure Integrity: o Hashing: A method to ensure the data hasn't been altered by transforming it into a fixed-size string of characters, typically for comparison purposes. o Digital Signatures: Used to verify the authenticity and integrity of a message or document. o Checksums: A simple method to detect accidental changes in data. Example: o Healthcare Systems in India: Hospitals store electronic medical records (EMR) to maintain patient history. Integrity mechanisms ensure that these records are not tampered with by unauthorized individuals, which could otherwise lead to incorrect diagnosis or treatment. Availability Availability means that data and services are accessible to authorized users whenever they need them. If systems become unavailable due to a cyberattack, such as a Distributed Denial of Service (DDoS) attack, it can disrupt services like online banking, healthcare systems, or government portals. Ensuring Availability: o Redundant Systems: Using backup servers and systems to ensure services can continue even if one part of the network is attacked or fails. o Disaster Recovery Plans: Ensuring that organizations can quickly recover from an attack or system failure. o Network Load Balancers: Distribute traffic evenly across servers to prevent overload. Example: o Railway Ticket Booking in India (IRCTC): During peak times (festival seasons), the IRCTC portal handles millions of requests. Ensuring the system’s availability is crucial for maintaining the service. DDoS attacks targeting such services could result in downtime, leading to massive public inconvenience. Suggested Reading: Book: "Computer Security: Principles and Practice" by William Stallings [LINK] Chapter: The CIA Triad © Prof. Anuraj Bose, www.anurajbosu.com Module 1 : Introduction to Cyber Security 4 3. Ethics in Cyber Security What Are Ethics in Cyber Security? Ethics in cyber security involves moral principles and professional conduct when dealing with sensitive data, responding to threats, or preventing cyber attacks. Given that cyber security professionals often have access to highly sensitive information, ethical behaviour is essential to prevent misuse, breaches, or harm. Ethics extend to actions such as: Responsible Disclosure: When a vulnerability is found, ethical hackers or researchers must report the issue responsibly to avoid harming individuals or organizations. Protecting Privacy: Professionals must safeguard the privacy of personal data they handle. Avoiding Unauthorized Access: Even if the means exist to access certain data or systems, ethical standards prohibit accessing data without proper authorization. Key Ethical Considerations: Privacy: Cyber security professionals must respect individuals' privacy. Personal information such as health records, banking information, and communication logs must be kept confidential. Honesty: Reporting cyber incidents and vulnerabilities must be done truthfully to ensure appropriate responses. Concealing breaches or downplaying incidents can lead to more severe consequences. Professional Responsibility: Ensuring no harm is caused through negligent practices is paramount. This responsibility extends to avoiding hacking into systems or exploiting vulnerabilities for personal gain. Case Study: Cambridge Analytica Scandal (India, 2018) In India, political parties were accused of using Cambridge Analytica to influence elections by accessing data from millions of Facebook users without consent. This raised ethical concerns regarding data privacy and the extent to which personal data could be manipulated for political purposes. Importance of Ethical Practices: © Prof. Anuraj Bose, www.anurajbosu.com Module 1 : Introduction to Cyber Security 5 Maintaining Public Trust: If the public loses trust in how their data is handled, they may be reluctant to use digital services, affecting sectors like banking, healthcare, and e-commerce. Legal Compliance: Governments globally, including India with laws like the IT Act, regulate how organizations handle data and report breaches. Failing to act ethically can lead to legal consequences. Suggested Reading: Book: "Ethics in Information Technology" by George Reynolds [LINK] Chapter: Cyber Security and Ethics 4. Cybercrime Landscape What Is Cybercrime? Cybercrime refers to illegal activities carried out using computers or the internet. These crimes can include hacking, phishing, identity theft, online scams, and other malicious actions designed to cause harm or financial gain. Cybercrime is not restricted to financial gain; it can also target intellectual property, military information, and critical infrastructure. Costs and Impacts of Cybercrime Financial Impact: Cybercrime has severe financial repercussions on individuals, businesses, and governments. In 2020, cybercrime cost India approximately ₹1.25 lakh crores (Data Security Council of India). Social Impact: Beyond finances, cybercrime can lead to identity theft, loss of reputation, and emotional distress. Victims of scams or data breaches often experience anxiety over their compromised personal information. Impact on National Security: Cyber-attacks targeting government websites, infrastructure like power grids, and communication systems can have devastating consequences. A cyber attack on critical infrastructure can cripple essential services. Types of Cybercrime 1. Phishing: Deceptive emails or websites that trick users into providing sensitive information like passwords or banking details. 2. Ransomware: Malicious software that locks users out of their systems or data until a ransom is paid. This type of attack has targeted hospitals, banks, and government institutions. © Prof. Anuraj Bose, www.anurajbosu.com Module 1 : Introduction to Cyber Security 6 3. Identity Theft: Obtaining personal information without permission to steal identities and commit fraud. 4. Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks: Overloading a server with traffic, causing it to crash and making the service unavailable to users. Real-Life Example: WannaCry Ransomware Attack (India, 2017) The WannaCry ransomware attack was one of the largest ransomware attacks in history. It affected over 150 countries, including India, causing massive disruption. In India, it hit sectors such as telecommunications and banking. The attack demanded payments in Bitcoin to unlock affected systems, causing massive financial losses and downtime. © Prof. Anuraj Bose, www.anurajbosu.com

Use Quizgecko on...
Browser
Browser