Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Delta computer institute, Surkhet, 9858077977

9. Cyber Security

9.1. Introduction to Cyber Security

Cyber security refers to the practice of protecting computer systems, networks, and sensitive digital
information from unauthorized access, theft, damage, or disruption. It involves a range of measures to
safeguard the confidentiality, integrity, and availability of data and resources in cyberspace.

Cyber security is becoming increasingly important as more of our daily activities and personal
information are conducted online. Threats to cyber security can come from a variety of sources,
including hackers, malware, phishing scams, and insider threats.

Some common cyber security measures include:

1. Strong passwords and two-factor authentication


2. Regular software updates and patching
3. Firewalls and antivirus software
4. Network segmentation and access controls
5. Employee training and awareness programs
6. Encryption and data backup
7. Incident response planning and testing

As the technology landscape continues to evolve, cyber security will remain a critical issue for
individuals, businesses, and governments alike.

9.2. Common security threats: Social engineering;

Social engineering is a common security threat that involves psychological manipulation of individuals to
obtain confidential information or access to computer systems. It can take many forms, including
phishing, pretexting, baiting, and tailgating. Here are some examples of social engineering attacks:

A. Phishing: This involves sending fraudulent emails that appear to come from a trustworthy
source, such as a bank or government agency. The emails typically contain a link to a fake
website where victims are asked to enter their login credentials or other sensitive information.
B. Pretexting: This involves creating a false scenario or pretext to trick victims into disclosing
sensitive information or performing a specific action. For example, a social engineer might pose
as an IT support technician and call an employee to request their login credentials.
C. Baiting: This involves leaving a physical item, such as a USB drive, in a public place with malware
installed. When an unsuspecting victim picks up the item and plugs it into their computer, the
malware is executed.
Delta computer institute, Surkhet, 9858077977

D. Tailgating: This involves following an authorized person into a secure area without proper
authorization. For example, a social engineer might hold the door open for an employee with a
security badge, and then follow them into a restricted area.

Social engineering attacks can be difficult to detect and prevent because they rely on human nature and
emotions such as trust, fear, and curiosity. To minimize the risk of social engineering attacks, it's
important to educate employees on the risks and provide regular training on how to recognize and
report suspicious behavior. Other measures such as strong authentication and access controls can also
help mitigate the risk of social engineering attacks.

Distributed Denial of Services;

Distributed Denial of Service (DDoS) is a type of cyberattack that aims to disrupt the availability of a
website or online service by overwhelming it with a large volume of traffic from multiple sources. The
attack is distributed because it originates from multiple compromised computers or devices, known as
botnets, that are controlled by the attacker.

DDoS attacks can cause significant damage to businesses and organizations by disrupting their online
operations, resulting in loss of revenue, reputation damage, and customer dissatisfaction. Here are
some common types of DDoS attacks:

A. Volumetric attacks: This type of attack aims to consume all the available bandwidth of a
network by flooding it with a high volume of traffic.
B. Protocol attacks: This type of attack aims to exploit vulnerabilities in the network protocols used
by the target system, causing it to crash or become unresponsive.
C. Application-layer attacks: This type of attack aims to overwhelm the target system by exploiting
vulnerabilities in the application layer of the network, such as a web application.
D. Distributed reflection and amplification attacks: This type of attack involves the attacker
sending requests to a large number of internet-connected devices that have a vulnerability that
can be used to amplify the traffic directed at the target system, making the attack more potent.

To mitigate the risk of DDoS attacks, organizations can employ various measures, including deploying
DDoS mitigation solutions, such as firewalls, intrusion detection systems, and load balancers, to filter
out unwanted traffic. Additionally, it's essential to ensure that all systems and devices are kept up-to-
date with the latest security patches and that employees receive regular training on how to recognize
and respond to potential DDoS attacks.

Malwares: Phishing, Spyware, Viruses, Worms, Trojans, etc.


Delta computer institute, Surkhet, 9858077977

9.3. Security Mechanisms

There are various security mechanisms that organizations can implement to protect themselves from
cybercrime. Here are some examples:

A. Firewall: A firewall is a network security device that monitors incoming and outgoing network
traffic and decides whether to allow or block specific traffic based on predefined security rules.
A properly configured firewall can help prevent unauthorized access to a network and protect
against cyber attacks.
B. Antivirus software: Antivirus software is a program that detects, prevents, and removes
malicious software, such as viruses, worms, and Trojans, from a computer system. It scans files
and programs on a computer for signs of infection and can help prevent malware from being
installed on a system.
C. Encryption: Encryption is a security mechanism that involves converting plaintext into
ciphertext, which can only be deciphered using a decryption key. It helps to protect sensitive
data, such as passwords and financial information, from unauthorized access.
D. Two-factor authentication: Two-factor authentication is a security mechanism that requires
users to provide two different types of authentication factors, such as a password and a
fingerprint, to access a system or application. It provides an additional layer of security to help
prevent unauthorized access.
E. Intrusion Detection and Prevention Systems: Intrusion detection and prevention systems (IDPS)
are network security appliances that monitor network traffic for signs of cyber attacks or
malicious activity. They can detect and block malicious traffic and alert security teams to
potential threats.
F. Security awareness training: Security awareness training is a program designed to educate
employees about potential cyber threats and how to identify and respond to them. It can help
to prevent cyber attacks that target human vulnerabilities, such as phishing and social
engineering attacks.

Implementing these security mechanisms can help organizations to protect themselves from
cybercrime and improve their overall security posture. It's essential to regularly review and update
these measures to ensure they remain effective against evolving cyber threats.

9.3.1. Identity and Access Control

Identity and access control is a security mechanism that helps organizations to manage access to
their systems, networks, and applications. It involves verifying the identity of users and controlling
their access to resources based on their level of authorization. Here are some examples of identity
and access control mechanisms:
Delta computer institute, Surkhet, 9858077977

G. User authentication: User authentication is the process of verifying the identity of a user who is
attempting to access a system or application. It can involve a combination of usernames,
passwords, biometric authentication, and two-factor authentication.
H. Authorization: Authorization is the process of granting or denying access to a resource based on
a user's identity and their level of permission. It involves setting up access controls that define
which users can access specific resources and what actions they can perform.
I. Role-based access control: Role-based access control (RBAC) is a method of access control that
defines permissions based on the roles of individual users. It involves assigning users to specific
roles that have predefined permissions, rather than assigning permissions directly to individual
users.
J. Privileged access management: Privileged access management (PAM) is a security mechanism
that involves controlling and monitoring access to privileged accounts, such as administrator
accounts. It helps to prevent unauthorized access to critical systems and reduce the risk of
insider threats.
K. Single sign-on: Single sign-on (SSO) is a mechanism that allows users to access multiple
applications and systems with a single set of login credentials. It improves security by reducing
the need for users to remember multiple usernames and passwords, and can also help to
streamline access management.

Implementing effective identity and access control mechanisms is critical for maintaining the
security of an organization's systems and data. It helps to prevent unauthorized access, reduce the
risk of data breaches, and ensure that users only have access to the resources they need to perform
their job functions.

9.3.2. Use of Firewalls, IDS and IPS

Firewalls, intrusion detection systems (IDS), and intrusion prevention systems (IPS) are important
security mechanisms that can help organizations protect their networks and systems from cyber
attacks. Here's a brief overview of each:

A. Firewalls: Firewalls are network security devices that monitor and control incoming and
outgoing network traffic based on predefined security rules. They can be hardware, software, or
a combination of both and are typically placed at the perimeter of a network to protect it from
external threats. Firewalls can filter out unwanted traffic and help prevent unauthorized access
to a network.
B. IDS: Intrusion detection systems are security appliances or software that monitor network traffic
for signs of malicious activity or unauthorized access. They analyze network traffic and identify
potential threats based on predefined patterns or behaviors. IDS can detect attacks, such as port
scanning, malware, and unauthorized access attempts, and alert security teams to potential
threats.
C. IPS: Intrusion prevention systems are similar to IDS but go one step further by actively blocking
or preventing potential threats. They can block malicious traffic and take action to prevent
Delta computer institute, Surkhet, 9858077977

unauthorized access or data exfiltration. IPS can also be configured to automatically respond to
security events based on predefined security policies.
D. Firewalls, IDS, and IPS can work together to provide a layered approach to network security.
Firewalls can block traffic that does not comply with predefined security policies, while IDS can
monitor for unusual activity and alert security teams to potential threats. IPS can then take
action to block or prevent potential threats from compromising the network.

It's essential to regularly update and maintain these security mechanisms to ensure they remain
effective against evolving cyber threats. Additionally, security teams should regularly review logs
and alerts generated by these systems to identify potential security incidents and respond quickly to
mitigate the impact of any security breaches.

9.3.3. Email Filtering

Email filtering is a security mechanism that helps organizations to protect their email systems from
threats such as spam, malware, phishing, and other types of malicious content. It involves analyzing
incoming and outgoing email messages and filtering out those that are identified as suspicious or
harmful. Here are some of the most common types of email filtering:

A. Spam filtering: Spam filters are designed to block unwanted or unsolicited emails, such as
advertising or promotional emails, that can clog up inboxes and distract users from more
important messages. They work by analyzing the content of incoming emails and looking for
common spamming characteristics, such as the use of certain words, phrases, or sender
addresses.
B. Malware filtering: Malware filters are used to block emails that contain malicious
attachments or links. They scan incoming emails for viruses, worms, Trojans, and other
types of malware and prevent them from infecting the recipient's system.
C. Phishing filtering: Phishing filters are used to block emails that contain fraudulent links or
attachments that attempt to trick users into divulging their personal or confidential
information. They work by analyzing the content of the email and looking for signs that it
may be a phishing attempt, such as suspicious links or requests for sensitive information.
D. Content filtering: Content filters are used to block emails that contain inappropriate or
sensitive content, such as explicit or discriminatory language. They work by analyzing the
content of the email and looking for keywords or phrases that may indicate inappropriate or
sensitive content.

Email filtering can be implemented using a variety of techniques, including rules-based filters,
machine learning algorithms, and artificial intelligence. These techniques can be used alone or in
combination to provide a layered approach to email security. By implementing email filtering,
organizations can improve their email security posture and reduce the risk of email-based
threats
Delta computer institute, Surkhet, 9858077977

9.3.4. Use of antivirus software

9.4. Digital Signature: Concept and Applications

A digital signature is an electronic method of verifying the authenticity and integrity of a digital
document or message. It is a type of electronic signature that uses encryption techniques to
ensure that the signer's identity is authenticated and the contents of the document are not
tampered with.

The concept of digital signatures is based on public-key cryptography. In this system, the sender
uses their private key to create a digital signature that is attached to the document. The
recipient can then verify the signature using the sender's public key, which ensures that the
document was signed by the sender and that it has not been modified since it was signed.

Applications of digital signatures include:

A. Authentication of electronic documents: Digital signatures are widely used in digital


documents, such as contracts, invoices, and other legal agreements, to authenticate the
identity of the signer and ensure that the document has not been tampered with.
B. Secure email communication: Digital signatures can be used to sign and encrypt email
messages, ensuring that the sender's identity is verified and the contents of the
message are protected from unauthorized access.
C. Financial transactions: Digital signatures are used in financial transactions, such as
online banking and electronic funds transfer, to verify the identity of the parties
involved and ensure that the transaction is secure.
D. Software and code signing: Digital signatures are used to sign software and code,
ensuring that the code has not been modified or tampered with and that it comes from
a trusted source.

Overall, digital signatures provide a secure and reliable method of authenticating digital
documents and messages, protecting against fraud and ensuring that sensitive information
remains confidential.

You might also like