Professional Documents
Culture Documents
Cyber Security Module 1
Cyber Security Module 1
Cyber Security Module 1
CYBER SECURITY
MODULE 1
V SEM B.Sc./BCA
Prepared By:
Shruthi V.
Santhosha M.
Lohith
Dept. Of Computer science
Cyberspace
It refers to the virtual computer network and is an electronic medium used to form a
global computer network to facilitate online communication.
It is a large computer network made up of many worldwide computer networks
uses TCP/IP protocol for communication and data exchange activities.
Overview of computer
Computer is an electronic device that receives input, stores or processes the input as per
user instructions and provides output in desired format.
Output Unit: Devices like printer and visual display unit that are used to provide
information to the user in desired format are called output unit.
Control Unit: This unit controls all the functions of the computer. All devices or
parts of computer interact through the control unit.
Arithmetic Logic Unit: This is the brain of the computer where all arithmetic
operations and logical operations take place.
Memory: All input data, instructions are stored in the memory. Memory is of two
types – primary memory and secondary memory. Primary memory resides within
the CPU whereas secondary memory is external to it.
Characteristics of Computer
Speed: Computer can carry out 3-4 million instructions per second.
Accuracy: Computers exhibit a very high degree of accuracy. Errors that may occur
are usually due to inaccurate data, wrong instructions.
Reliability: Computers can carry out same type of work repeatedly without
throwing up errors due to tiredness or boredom.
Versatility: Computers can carry out a wide range of work from data entry and
ticket booking to complex mathematical calculations and continuous astronomical
observations.
Storage Capacity: A computer can store millions of records. These records may be
accessed with complete precision. Computer memory storage capacity is measured
in Bytes, Kilobytes (KB), Megabytes(MB), Gigabytes(GB), and Terabytes(TB). A
computer has built-in memory known as primary memory.
Advantages of Computer
Multitasking: Multitasking is one of the main advantages of computers. The
computer can perform millions or trillions of works in one second.
Speed: One of the most advantages of computers is their incredible speed which
helps human to finish their task in a few seconds.
Accuracy: Computers perform not only calculations but also with accuracy.
Communication: The computer helps the user better understand and communicate
with other devices.
Disadvantages of computer
Virus and hacking attacks: A virus may be a worm and hacking are just
unauthorized access over a computer for illegal purposes. Viruses can go to another
system from email attachments, viewing an infected website advertisement, through
removable devices like USBs, etc.
Online Cyber Crimes: Online cyber-crime means computers and networks may
have been utilized in order to commit a crime. Cyberstalking and fraud are the
points that come under online cyber-crime.
Communication
Communication is a foundational component of all work in cybersecurity. Communication
happens in many forms, written, spoken, and even non-verbal. It happens in large groups
and small, sometimes it's real-time, and sometimes it's asynchronous. Communicating
effectively is perhaps the most important soft skill in this framework. Everyone also carries
past experiences, perceptions, ideas, and mental models. These things inevitably inform
how people receive and interpret any form of communication.
Purpose
Communication serves many purposes for people:
Web Technology
Web Technology refers to the various tools and techniques that are utilized in the process of
communication between different types of devices over the Internet. A web browser is used
to access web pages. Web browsers can be defined as programs that display text, data,
pictures, animation, and video on the Internet.
Web Browser: The web browser is an application software to explore www (World
Wide Web). It provides an interface between the server and the client and requests to
the server for web documents and services.
Web Server: Web server is a program which processes the network requests of the
users and serves them with files that create web pages. This exchange takes place using
Hypertext Transfer Protocol (HTTP).
Web Pages: A webpage is a digital document that is linked to the World Wide Web and
viewable by anyone connected to the internet has a web browser.
Web Development: Web development refers to the building, creating, and maintaining
of websites. It includes aspects such as web design, web publishing, web programming,
and database management. It is the creation of an application that works over the
internet i.e. websites.
Internet
Internet is a global communication system that links together thousands of individual
networks. It allows exchange of information between two or more computers on a
network. Thus internet helps in transfer of messages through mail, chat, video & audio
conference, etc. It has become mandatory for day-to-day activities: bills payment, online
shopping and surfing, tutoring, working, communicating with peers, etc.
The 4G network is launched in 2009. The internet is used by 3 billion people nowadays.
By 2030, there are expected to be 7.5 billion internet users and 500 billion devices linked
to the internet.
Uses of the Internet:
E-mail: E-mail is an electronic message sent across a network from one computer
user to one or more recipients. It refers to the internet services in which messages are
sent from and received by servers.
Web Chat: Web chat is an application that allows you to send and receive messages in
real-time with others. By using Internet chat software, the user can log on to specific
websites and talk with a variety of other users online.
World Wide Web: The World Wide Web is the Internet’s most popular information
exchange service. It provides users with access to a large number of documents that
are linked together using hypertext or hyperlinks.
Internet telephony: The technique that converts analog speech impulses into digital
signals and routes them through packet-switched networks of the internet is known
as internet telephony.
Video conferencing: The term “video conferencing” refers to the use of voice and
images to communicate amongst users.
Education, Online Jobs, Freelancing: Through the Internet, we are able to get more
jobs via online platforms like Linkedin and to reach more job providers. Freelancing
on the other hand has helped the youth to earn a side income and the best part is all
this can be done via the INTERNET.
Entertainment: There are numerous options for entertainment online we can listen
to music, play games can watch movies, and web series, and listen to podcasts,
YouTube itself is a hub of knowledge as well as entertainment.
New Job Roles: The Internet has given us access to social media, and digital products
so we are having numerous new job opportunities like digital marketing and social
media marketing online businesses are earning huge amounts of money just because
the Internet is the medium to help us to do so.
Best Communication Medium: The communication barrier has been removed from
the Internet. You can send messages via email, Whatsapp, and Facebook. Voice
chatting and video conferencing are also available to help you to do important
meetings online.
Comfort to humans: Without putting any physical effort you can do so many things
like shopping online it can be anything from stationeries to clothes, books to personal
items, etc. You can books train and plane tickets online.
GPS Tracking and Google maps: Yet another advantage of the internet is that you
are able to find any road in any direction, and areas with less traffic with the help of
GPS on your mobile.
Bad Impacts on Health: Spending too much time on the internet causes bad impacts
on your health physical body needs some outdoor games exercise and many more
things. Looking at the screen for a longer duration causes serious impacts on the eyes.
Cyber Crimes: Spam, viruses, hacking, and stealing data are some of the crimes
which are on the verge these days. Your system which contains all the confidential
data can be easily hacked by cybercriminals.
Effects on Children: Small children are heavily addicted to the Internet watching
movies, and games all the time is not good for their overall personality as well as
social development.
History:
It is a project created, by Timothy Berner Lee in 1989, for researchers to work together
effectively at CERN, is an organization named the World Wide Web Consortium (W3C),
which was developed for further development of the web. This organization is directed
by Tim Berner’s Lee, aka the father of the web.
System Architecture:
From the user’s point of view, the web consists of a vast, worldwide connection of
documents or web pages. Each page may contain links to other pages anywhere in the
world. The pages can be retrieved and viewed by using browsers of which internet
explorer, Netscape Navigator, Google Chrome, etc are the popular ones. The browser
fetches the page requested interprets the text and formatting commands on it, and
displays the page, properly formatted, on the screen.
The world wide web is a subset of the The Internet is the superset of the world wide
Internet. web.
The world wide web uses HTTP. The Internet uses IP Addresses.
When You “Google” From a Web Browser, from opening a web browser to visiting a
website, it all happens with specific methods that we’re going to check in these 5 easy
steps.
1. Firstly, you’ll be required to connect your system or PC with any router or modem to
establish a connection. This connection is the base of the internet connection.
2. When you open the browser and start typing something like “www.google.com”, your
system will push a query command to your ISP (Internet Service Provider) that is
connected with other servers that store and process data.
3. Now, the web browser will start indexing the URL that you’ve entered and will fetch
the details in numeric format (in their own language to identify the
address (unique) that you’re trying to reach.
4. Next is, now your browser will start sending the HTTP request where you’re trying to
reach and sends a copy of the website on the user’s system. Note: The server will send
data in the form of small packets (from the website to the browser)
5. Once all the data (of small packets) will be received at the user’s end (PC/Laptop), the
browser will start arranging all those small packets and later will form a collective file
(here, the browser will gather all the small packets and rearrange them just like a
puzzle) and then you’ll be able to see the contents of that website
Dial-Up: People used to connect their system with the help of a dial-up connection,
and it is one of the slowest types of Internet connection. This is used to enable
internet connectivity with the help of a telephone connection and the user must
have multiple connections then only they can use a Dial-up connection.
Cable TV Connection: It is being used to connect your system to the Internet, and for
that, you, ISP will connect it via cable TV wire. It also uses Broadband technology and
you really don’t need to have a Cable connection for that. Cable is considered as most
accessible as and faster than dial-up and DSL that we have for connection.
Satellite: It also uses broadband technology but without interacting with any cable
connection. Hence, it connects wirelessly with the help of a satellite and this enables
its availability anywhere in the world.
3G/4G/5G: This is the new age technology in the entire world. It connects wirelessly
via different ISPs and is widely used in cell phones. But they aren’t considered as
stable as DSL or cable and most importantly they come with a DATA LIMITATION cap
for each month.
Internet Society
Cybersecurity is a critical aspect of the modern Internet society. It encompasses a range of
practices, technologies, and measures designed to protect computer systems, networks,
and data from various forms of cyber threats and attacks. The Internet Society, often
represented by organizations like the Internet Society (ISOC), plays a significant role in
promoting and addressing cybersecurity concerns in the digital age.
Here are some key points related to cybersecurity and the Internet Society:
1. Data Protection and Privacy Regulations: Many regions have enacted data
protection laws that mandate how personal data should be handled, stored, and
protected. The General Data Protection Regulation (GDPR) in the European Union is
one such example, imposing strict requirements on data handling, consent, and
breach notification.
2. Cybercrime Laws: Cybersecurity regulations often include laws that define and
criminalize various forms of cybercrime, such as hacking, malware distribution,
identity theft, and fraud. These laws prescribe penalties for offenders and empower
law enforcement agencies to investigate and prosecute cybercriminals.
3. Incident Reporting and Notification: Some regulations require organizations to
report cybersecurity incidents promptly, particularly data breaches, to regulatory
authorities and affected individuals. These notifications help in containing the
damage and protecting individuals' rights.
4. Critical Infrastructure Protection: Regulations may require operators of critical
infrastructure, such as energy, water, and financial institutions, to implement
specific cybersecurity measures to safeguard these vital systems from cyberattacks.
5. Regulations on Access Control and Authentication: Regulations often emphasize
access control and authentication mechanisms to ensure that only authorized
individuals have access to sensitive data and systems. Multi-factor authentication
(MFA) and strong password policies may be mandated.
6. Network Security Requirements: Regulations may outline network security
standards that organizations must adhere to, including firewall configurations,
intrusion detection systems, and encryption protocols.
7. Employee Training and Awareness: Some regulations recommend or mandate
employee training and awareness programs to help organizations maintain a
security-aware workforce.
8. Audit and Compliance Reporting: Organizations might be required to conduct
regular security audits and produce compliance reports to demonstrate their
adherence to cybersecurity regulations.
9. Vendor and Supply Chain Security: Regulations often encourage organizations to
assess the cybersecurity practices of their vendors and supply chain partners to
reduce vulnerabilities introduced by third parties.
Some of the major issues and challenges in the field of cybersecurity include:
1. Cyber Threats and Attacks: Cyber threats continue to grow in volume and
sophistication. These include malware, ransomware, phishing, and Distributed