Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10

Information Assurance Se

curity 1
Page
|
1
Module
01
Introduction to Cyber Security
Learning Outcomes
At the end of the lesson, you should
be able to:
1.
Understand the Cyber Security
and
the Cyber Crime.
2.
Know the History
and Advantages
of Cyber Crime.
Introduction
The term cyber security is used to
refer to the security offered through on
line services
to protect your online information.
With an increasing amount of people
getting connected to Internet, the
security threats that
cause massive harm are increasing
also.
Cyber Crime
The former descriptions were
"computer crime", "computer
-
related crime" or "crime by computer".
With the pervasion of digital
technology, some new terms like
"high
-
technology" or "information
-
age" crime were added to the defi
nition. Also, Internet brought other
new terms, like "cybercrime"
and "net" crime.
Other forms include "digital",
"electronic", "virtual" , "IT", "high
-
tech" and technology
-
enabled"
crime .
History

The first recorded cyber crime was
recorded in the ye
ar 1820.

The first spam email took place in
1978 when it was sent over the
Arpanet.

The first Virus was installed on an
Apple Computer in 1982.
Cyber Crimes Includes

Illegal Access

Illegal Interception

System Interference

Data Interference

Misuse
of Devices

Fraud
Why shoul
d
we care?
It is a criminal activity committed on
the internet.
Cyber crime
-
Where computer is either a tool or
target or both.
How can we protect

Read Privacy policy carefully when
you submit the data through internet.

Encrypt
ion: lots of website uses SSL( secure
socket layer) to encrypt a data

Disable remote connectivity
Cyber Security
Cyber security standards are s
ecurity standards which enable
organizations to practice safe
security techniques to minimize the
number of successful cyber security
attacks.
Information Assurance Se
curity 1
Page
|
2
Cyber security refers to the
technologies and processes designed
to protect computers, networks
and data from
unauthorized access, vulnerabilities
and attacks delivered via the Internet
by cyber
criminals.
Though, cyber security is important for
network, data and application
security.
Communication security
-
protecting organization
communication media , tech
nology , and content.
Network security
-
is the protection of networking
components, connection and content.
Information security
-
protection of information and its
critical elements , including the
systems and
hardware that use , store or transmit
that
information.
Advantage of cyber security

It will defend from hacks and virus

The application of cyber security used
in our PC needs update every week.

The security develo
pers will update their database every
week once. Hence the new virus
also deleted.
Need of cyber security:
Cyber security is necessary since it
helps in securing data from treats
such as data theft
or misuse, also safeguards your
system from viruses.
Major Security problems
a.
Virus
b.
Hackers
c.
Malware
d.
Trojan Horses
e.
Password Cracking
Viru
ses and Worms:
A virus is a program that is loaded
onto your computer without your
knowledge and runs
against your wishes.
Solution:
Install a security suite that protects the
computer against threats such as
viruses and worms.
Hackers:
In common a hac
ker is a person who breaks into
computer, usually by gaining access
to
administrative controls.
Types of Hackers:
1.
White Hat Hacker
2.
Grey Hat Hacker
3.
Black Hat Hacker

You might also like