Introduction to Cyber Security Basics
Introduction to Cyber Security Basics
● D efinition:Cyber Security (or Information Security) is the practice of protecting systems,
networks, programs, and data from digital attacks.
● Goal:These attacks are usually aimed at accessing, changing, or destroying sensitive
information; extorting money from users ([Link]); or interrupting normal business
processes.
● Core Elements:It involves a combination ofpeople,processes, andtechnologyto
defend against these threats.
Importance
● D ata Protection:Protects sensitive personal data (like PII - Personally Identifiable
Information) and corporate data (like intellectual property, financial records) from theft
and misuse.
● Economic Stability:Prevents financial losses from fraud, extortion (e.g., ransomware),
and business disruption.
● National Security:Guards government secrets, military operations, and critical
infrastructure against attacks by hostile nations or terrorist groups.
● Trust:Maintains user and customer trust in digital services and e-commerce.
Challenges
● C onstantly Evolving Threats:Attackers continuously create new types of malware and
adapt their tactics (e.g., zero-day exploits).
● Asymmetric Warfare:A single attacker with basic tools can cause massive damage to
a large, well-funded organization.
● Human Factor:Users are often the weakest link, falling for phishing scams or using
weak passwords. Social engineering is a major challenge.
● Expanding Attack Surface:The rise of IoT (Internet of Things) devices, cloud
computing, and "Bring Your Own Device" (BYOD) policies means there are more
potential entry points for attackers.
● Lack of Skilled Professionals:There is a significant global shortage of trained
cybersecurity professionals.
1
3. Key Concepts
he CIA Triad is the foundational model for cybersecurity policy. It outlines the three core goals
T
for protecting information.
● Confidentiality:
○ What it is:Ensuring that information is not disclosed to unauthorized individuals,
entities, or processes. It's about secrecy and privacy.
○ How it's achieved:Encryption, access controls (passwords, permissions), and
data classification.
● Integrity:
○ What it is:Maintaining the consistency, accuracy, and trustworthiness of data. It
ensures that data cannot be modified or deleted in an unauthorized or
undetected manner.
2
○ H ow it's achieved:Hashing (e.g., MD5, SHA-256), digital signatures, file
permissions, and version control.
Availability:
●
○ What it is:Ensuring that systems, networks, and data are operational and
accessible to authorized users when they are needed.
○ How it's achieved:Hardware redundancy (e.g., RAID), backups, disaster
recovery plans, and defending against DDoS attacks.
● W hat is Critical Infrastructure (CI)?These are the physical and virtual assets,
systems, and networks that are vital to a nation's security, economy, and public health.
● Examples:Power grids, water supply systems, transportation networks (air, rail),
financial services (banks), healthcare (hospitals), and communication networks.
● Why it's a Target:An attack on CI can cause massive physical damage, economic
chaos, loss of life, and public panic.
● Challenges:Many CI systems are "legacy systems" (old technology) that were not
designed with modern cybersecurity in mind and are now being connected to the
internet, making them vulnerable.
ybersecurity is not just an IT problem; it's a core business risk that affects the entire
C
organization.
3
Negative press and brand damage.
○
● Legal and Regulatory:
○ Organizations must comply with a growing number of data protection laws (like
GDPR, CCPA).
○ Failure to comply can lead to legal action from customers or governments.
Operational Disruption:
●
○ A ransomware attack can halt all business operations (e.g., manufacturing, sales,
communication) for days or weeks.
● Shift in Culture:
○ Requires a "security-first" mindset across all departments, not just IT.
○ Mandatory security awareness training for all employees (to prevent phishing,
etc.).
○ Security must be integrated into business strategy and risk management.
he term "hacker" is often used broadly, but different types are distinguished by their motives,
T
ethics, and (legal) status.
4
○ A ction:An unskilled individual who uses pre-written scripts and tools created by
others to launch attacks. They typically don't understand the underlying
technology.
● Hacktivist:
○ Motive:Political, social, or ideological.
○ Action:Uses hacking to promote a political agenda or social message. This can
include website defacement, leaking sensitive documents, or launching DDoS
attacks. (e.g., Anonymous).
State-Sponsored Hacker (APT - Advanced Persistent Threat):
●
○ Motive:National espionage, cyberwarfare, or stealing intellectual property.
○ Action:Employed by a government to target other nations, corporations, or
critical infrastructure. They are highly skilled, well-funded, and patient.
● H acker:This term originally had a neutral or positive connotation, referring to a skilled
programmer who enjoyed exploring the limits of technology. In modern use, it often
refers toWhite HatandGrey Hatindividuals.
● Cracker:This term was coined to specifically distinguish malicious actors from the
broader "hacker" community. ACrackeris synonymous with aBlack Hat
Hacker—someone who "cracks" security systems for criminal or malicious intent.
Attackers often follow a structured process to breach a system and achieve their goals.
5
○ W hat it is:The initial breach of the system. This is where the attacker actively
exploits a vulnerability.
○ Methods:Using malware (like a Trojan), sending a phishing email, or directly
attacking a web server (e.g., with SQL Injection).
3. Escalating Privileges (Post-Exploitation):
○ What it is:Once inside, the attacker usually has only low-level (standard user)
access. Privilege escalation is the process of gainingadministrativeor "root"
access.
○ Goal:To gain full control over the system, allowing them to disable security,
access all data, and install more tools.
4. Executing Applications (Maintaining Access):
○ What it is:Running malicious programs on the compromised system.
○ Goal:To install tools that ensure the attacker can return later, such as
backdoorsor "bots" that join the computer to a botnet.
5. Hiding Files (Anti-Forensics):
○ What it is:Concealing the attacker's presence and malicious files to avoid
detection by system administrators or antivirus software.
○ Methods:
■ Rootkits:Malware designed to hide its own presence (files, processes)
from the operating system.
■ Steganography:Hiding datawithinother files (e.g., hiding a malicious
script inside an image file).
6. Covering Tracks (Anti-Forensics):
○ What it is:The final step, where the attacker erases all evidence of their activity.
○ Goal:To prevent discovery, delay investigation, and protect their identity.
○ Methods:Deleting or modifying system logs, altering file timestamps, and using
anonymous networks.
● Virus:
○ How it works:A piece of malicious code thatattaches itself to a legitimate
program or file(the "host").
○ How it spreads:It requireshuman action(like opening the infected file) to
execute and spread to other files.
○ Analogy:A biological virus that needs a host cell to replicate.
● Worm:
○ How it works:Astandalonepiece of malware (it doesn't need a host file).
6
○ H ow it spreads:Itself-replicates and spreads independentlyover a network,
exploiting vulnerabilities to jump from one computer to another.
○ Analogy:A worm that burrows from one apple to the next on its own.
● Trojan (or Trojan Horse):
○ How it works:Disguises itself as a legitimate or useful piece of software (e.g., a
game, a utility, or even an antivirus program).
○ Goal:To trick the user into installing it. Once run, the Trojan executes its hidden
malicious function (e.g., installing a backdoor, stealing data).
○ Analogy:The mythical Trojan Horse, which looked like a gift but hid enemy
soldiers inside.
Backdoor:
●
○ What it is:A hidden, undocumented method of bypassing normal authentication
or security controls.
○ Purpose:It gives an attacker (or even the original developer) easy, repeated
access to a system. A Trojan's main purpose is often toinstalla backdoor.
7
2. Threats and Attack Vectors
● T hreat:Apotential dangerthat could exploit a vulnerability. It's the "who" or "what" that
could cause harm (e.g., a Black Hat hacker, a malware, a disgruntled employee).
● Attack Vector:Thepath or methoda threat actor uses to gain unauthorized access to
a system to deliver a payload or launch an attack. It's the "how" the attack is carried out.
● Common Attack Vectors:
○ Phishing emails (email vector)
○ Malicious websites (web vector)
○ Unpatched software vulnerabilities (network/software vector)
○ Stolen credentials (identity vector)
○ Infected USB drives (physical/removable media vector)
8
5. Enterprise Information Security Architecture (EISA)
● D efinition:EISA is the set ofmodels, principles, and standardsthat guide the design
and implementation of security controls across an entire organization (the "enterprise").
● Analogy:It's the "master blueprint" for the organization's security. It ensures that
security is not just a collection of random tools (firewalls, antivirus) but a cohesive,
integrated system that aligns with the organization's business goals.
● Role:It answers questions like:
○ "How should all our different departments (HR, Finance, IT) handle data?"
○ "What is our standard for encrypting data?"
○ "How do we manage user identities and access across all our applications?"
9
ey Difference:VAis apassivelist of flaws ("finds vulnerabilities"), whilePTis an
K
activesimulation of an attack ("exploits vulnerabilities").
10
7. Social Engineering
ocial Engineering is the art ofpsychological manipulationto trick people into divulging
S
confidential information or performing actions that compromise security. It attacks the "human
firewall," which is often the weakest link.
11
● A ccess Controls:Implement strong password policies, Multi-Factor Authentication
(MFA), and role-based access control (RBAC).
● Monitoring:Use tools to monitor for unusual employee activity (e.g., accessing files at 3
AM, downloading large amounts of data).
● Employee Training:Regular, mandatory training on security policies and how to spot
social engineering.
● Offboarding:Have a formal process to immediately revoke all access for employees
who are leaving or have been terminated.
12
Module 4: Cyber Forensics & Security Auditing
igital evidence can be found on any device that stores or transmits data. These are
D
categorized by their volatility (how easily the data is lost).
● V olatile Data:This is temporary data, primarily inRAM (Random Access Memory). It's
lost when the device is powered off. It includes:
○ Running processes and applications.
○ Active network connections.
○ The system's clipboard and command history.
○ Rule:Volatile data must be collectedfirst, while the system is still running (this is
called "live forensics").
● Non-Volatile Data:This is permanent storage. The data persists even when the device
is powered off. This includes:
○ HDDs (Hard Disk Drives)andSSDs (Solid State Drives).
○ Removable Media:USB flash drives, SD cards, external hard drives.
○ Optical Media:CDs, DVDs, Blu-ray discs.
○ Other Devices:Mobile phones, tablets, routers, IoT devices, printers, and
servers.
M
● eticulous:Pays extreme attention to detail.
● Objective:Remains unbiased and only follows the evidence. The investigator's job is to
present facts, not to determine guilt or innocence.
● Ethical:Follows legal and professional standards.
13
Key Responsibilities:
S
● ecure the digital "crime scene."
● Properly identify, label, and document all evidence.
● Establish and maintain theChain of Custody(a formal log of who handled the
evidence, when, and for what purpose).
● Createforensic images(bit-for-bit copies) of storage media for analysis.The
investigatorneverworks on the original evidence.
● Analyze the forensic image to find evidence (including deleted files, hidden data, and file
fragments).
● Write a detailed, clear, and objective report.
● Testify in court as an expert witness.
1. Identification:Recognize that an incident occurred and identify what evidence may be
present (e.g., which laptops, servers, or phones are involved).
2. Preservation (Collection):
○ Secure the sceneto prevent evidence from being tampered with.
○ Collect volatile data(e.g., RAM dump) from live systems.
○ Acquire non-volatile databy creating a forensic image (or "bitstream copy").
This is done using awrite-blockerto ensure the original drive is not altered in
any way.
○ Document everythingand maintain the Chain of Custody.
3. Analysis:
○ The investigator works on thecopy(forensic image), not the original.
○ Use specialized forensic tools (e.g., EnCase, FTK, Autopsy) to examine the data.
○ This includes recovering deleted files, searching keywords, analyzing file
timestamps, and building a timeline of events.
4. Documentation:
○ This happensthroughout the entire process.
○ Every action taken by the investigator—from plugging in a cable to running a
search—must be logged.
5. Presentation (Reporting):
○ The findings are compiled into a formal report.
○ The report must be clear, concise, and understandable to a non-technical
audience (like a judge, lawyers, or management).
14
5. Collecting Network-Based Evidence
15
Part 2: auditors-report: Auditing and ISMS
1. Auditing
16
P
○ lan:Identify assets, assess risks, and select security controls.
○ Do:Implement the selected controls.
○ Check:Monitor the controls, conduct internal audits, and review their
effectiveness.
○ Act:Take corrective actions to fix any problems and make improvements to the
ISMS.
● C lauses 4-10 (The Requirements):These are the mandatory "shalls" an organization
mustdo to be compliant.
○ Clause 4:Context of the Organization (understanding the business).
○ Clause 5:Leadership (getting management buy-in).
○ Clause 6:Planning (this is whereRisk Assessmenthappens).
○ Clause 7:Support (resources, competence, awareness).
○ Clause 8:Operation (implementing the risk plan).
○ Clause 9:Performance Evaluation (monitoring, internal audits).
○ Clause 10:Improvement (fixing non-conformities).
● Annex A (The Controls):
○ This is a "catalog" of114 reference security controlsgrouped into14 domains
(e.g., A.9 Access Control, A.10 Cryptography, A.12 Operations Security).
○ An organizationdoes nothave to implement all 114 controls.
○ It must use its Risk Assessment (from Clause 6) to choose which controls from
Annex A are necessary.
17
Module 5: Cyber Ethics and Laws
1. Introduction to Cyber Laws
● D efinition:Cyber Law (or Internet Law) is the part of the legal system that deals with
legal issues related to the internet and cyberspace. It covers a broad range of topics,
including data protection, intellectual property, cybercrime, and electronic commerce.
● Why is it needed?
○ Borderless Nature:The internet is global, but laws are national (jurisdictional).
Cyber laws help define which laws apply to an online activity.
○ Anonymity:It's easier for criminals to hide their identity online. Cyber laws
provide mechanisms for tracking and prosecuting them.
○ New Types of Crime:It addresses crimes that don't exist in the physical world,
like data theft, hacking, and denial-of-service (DoS) attacks.
○ Digital Evidence:It provides a legal framework for collecting and using digital
evidence in court (as seen in Module 4).
18
3. Certifying Authority (CA) and Controller (CCA)
his is the trust framework forDigital Signatures(which are different from electronic
T
signatures).
● D igital Signature Certificate (DSC):An electronic file that serves as a digital "ID card"
or "passport." It proves your identity in an online transaction and is issued by a Certifying
Authority.
● Certifying Authority (CA):
○ Role:A CA is atrusted third party(like eMudhra, Sify) that is licensed to issue,
manage, revoke, and renew Digital Signature Certificates (DSCs) to individuals
and organizations.
○ Function:Before issuing a DSC, the CA verifies the applicant's identity (like a
passport office verifies your identity before issuing a passport). This ensures that
the person using the digital signature is truly who they claim to be.
● Controller of Certifying Authorities (CCA):
○ Role:This is thegovernment body(under the IT Act in India) thatregulates the
CAs.
○ Function:The CCA's job is to license, audit, and oversee the CAs. It's the "boss"
of the CAs, ensuring they follow the standards and are trustworthy.
● G
eneral "Offences"refer to criminal acts, while "Contraventions" often refer to civil
wrongs (which result in a financial penalty or "damages" rather than jail time).
19
Here are some of the most important sections:
● S ection 43: Penalty and Compensation for Damage to Computer, Computer
System, etc.
○ What it is (Civil Offence):This section deals withunauthorized access and
damagewithoutcriminal intent.
○ Acts Covered:
■ Accessing or downloading data without permission.
■ Introducing a virus or malware.
■ Damaging a computer system or network.
■ Denial of Service (DoS) attacks.
■ Stealing or destroying data.
○ Penalty:The offender must payfinancial damages(compensation) to the
person affected.
● Section 65: Tampering with Computer Source Code
○ What it is (Criminal Offence):Knowingly or intentionallyconcealing,
destroying, or alteringthe source code of a computer program when it's
required to be kept.
○ Penalty:Imprisonment up to3 yearsor a fine up to ₹2 lakh (or both).
● Section 66: Computer Related Offences (Hacking)
○ What it is (Criminal Offence):This is the main "hacking" section. It's when a
person commits any act under Section 43 (like unauthorized access, data theft,
etc.) but withfraudulent or dishonest intent.
○ Penalty:Imprisonment up to3 yearsor a fine up to ₹5 lakh (or both).
● Section 66B: Punishment for Dishonestly Receiving Stolen Computer Resource or
Communication Device
○ What it is (Criminal Offence):The digital equivalent of "receiving stolen goods."
Knowingly receiving a stolen laptop, mobile phone, or stolen data.
○ Penalty:Imprisonment up to3 yearsor a fine up to ₹1 lakh (or both).
● Section 66C: Punishment for Identity Theft
○ What it is (Criminal Offence):Fraudulently or dishonestly using someone else's
electronic signature, password, or other unique identification feature.
○ Penalty:Imprisonment up to3 yearsand a fine.
● Section 67: Punishment for Publishing or Transmitting Obscene Material in
Electronic Form
○ What it is (Criminal Offence):Publishing or transmitting any material that is
"lascivious or appeals to the prurient interest" (i.e., obscene) online.
○ Penalty (for first conviction):Imprisonment up to3 yearsand a fine up to ₹5
lakh. Penalties are higher for subsequent convictions.
20
5. Intellectual Property Rights (IPR) in Cyberspace
Intellectual Property (IP) refers to creations of the mind (inventions, literary/artistic works,
symbols, names). Protecting IP in cyberspace is challenging due to the ease of copying and
distribution.
● Copyright:
○ What it Protects:Original works of expression, such as software code,
website content (text and graphics), e-books, music, and videos.
○ Cyberspace Issues:
■ Software Piracy:Unauthorized copying and distribution of software.
■ Digital Piracy:Illegal downloading/streaming of music and movies (e.g.,
via torrents).
■ Website Content Theft:Copying text or images from one website and
using them on another.
● Trademark:
○ What it Protects:Brand identifiers, such as logos, slogans, and names (e.g.,
the "Google" logo, Nike's "Just Do It").
○ Cyberspace Issues:
■ Cybersquatting:Registering a domain name (e.g., [Link] ) that
is a famous trademark, with the intent of selling it to the company for a
high price.
■ Phishing:Using a well-known brand's logo and name in an email to trick
users.
● Patent:
○ What it Protects:Inventions and functional processes(e.g., Amazon's
"1-Click" shopping).
○ Cyberspace Issues:This is a highly complex area, involving patents for
software algorithms, business methods, and other digital processes.
(Note: This is a technical network security topic, distinct from the legal topics above.)
● W hat it is:IPSec is asuite of protocolsthat secures data communications over an IP
network (like the internet).
● Layer:It operates at theNetwork Layer (Layer 3)of the OSI model.
● Main Goal:To provide securitydirectly between two computers (hosts)ortwo
networks (gateways), making the connection private and secure. It is the technology
that mostVPNs (Virtual Private Networks)are built on.
21
IPSec provides theCIA Triad(from Module 1) for network traffic:
● T ransport Mode:Encrypts only thepayload(the actual data) of the packet. The packet
header (with source/destination IP) is visible.
○ Use Case:Securing a connection between two end computers (e.g., your PC
and a web server).
● Tunnel Mode:Encrypts theentireoriginal packet (both data and header) and puts it
inside a new IP packet.
○ Use Case:Creating a secure "tunnel" between two entire networks (e.g.,
connecting a branch office's network to the main corporate network). This is the
most common mode for VPNs.
22