Cyber Security UNIT-1 PPT1
Cyber Security UNIT-1 PPT1
UNIT-I
• Introduction to Cyber Security: Basic Cyber Security Concepts, Motive of
Attackers, Active Attacks, Passive Attacks, Cyber Crime and Information
Security, Computer Criminals,
• Classification of Cyber Crimes: E-mail Spoofing, Spamming, Cyber
Defamation, Internet Time Threat, Salami Attack, Data Diddling, Forgery,
Web Jacking, Newsgroup Spam, Industrial Espionage, Hacking, Online
Frauds, Software Piracy, Computer Sabotage, Email Bombing, Usenet
Newsgroup as The Source Of Cybercrimes, Computer Network Intrusions,
Password Sniffing, Identity Theft,
• Cyber Threats-cyber Warfare, Cia Traid
Greed
Desire to gain power
Publicity
Desire for revenge
A sense of adventure
Looking for thrill to access forbidden information
Destructive mindset
Desire to sell network security services
Classifications of Cybercrimes
Forgery
Cyber terrorism
Web jacking
To deal with this type of crime, a company must implement policies and internal controls.
This may include performing regular audits, using software with built-in features to combat
such problems, and supervising employees.
RNS Reddy, Asst professor, GNITC
UNIT-I Classification Of Cyber Crimes
Forgery
The act of forging something, especially the unlawful act of counterfeiting a
document or object for the purposes of fraud or deception.
Something that has been forged, especially a document that has been copied
or remade to look like the original.
Counterfeit currency notes, postage, revenue stamps, marks sheets, etc.,
can be forged using sophisticated computers, printers and scanners.
• The advent of Google Groups, and its large Usenet archive, has
made Usenet more attractive to spammers than ever.
• Spamming of Usenet newsgroups actually predates E-Mail Spam.
Newsgroup spam is a type of spam where the targets are Usenet
newsgroups.
Usenet group may carry very offensive, harmful, inaccurate or
otherwise inappropriate material or postings that have been
misplaced or are deceptive in another way.
Confidentiality
Secure
Integrity Availability
Integrity
The ability to ensure that data is an accurate and unchanged representation of the original secure
information.
One type of security attack is to intercept some important data and make changes to it before sending it on to
the intended receiver.
Availability
It is important to ensure that the information concerned is readily accessible to the authorised viewer at
all times.
Some types of security attack attempt to deny access to the appropriate user, either for the sake of
inconveniencing them, or because there is some secondary effect.
For example, by breaking the web site for a particular search engine, a rival may become more popular.
RNS Reddy, Asst professor, GNITC
UNIT-I Introduction to Cyber Security
Comprehensive Cyber Security Policy
At country level:
Policy directives on data security and privacy protection - Compliance, liabilities and
enforcement (ex. Information Technology Act 2000)
Standards and guidelines for compliance (ex: ISO 27001, ISO 20001 & CERT-In
guidelines)
Conformity assessment infrastructure (enabling and endorsement actions concerning
security product – ISO 15408, security process – ISO 27001 and security manpower –
CISA, CISSP, ISMS-LA, DISA etc.)
Security incident - early warning and response (National cyber alert system and crisis
management)
• Information sharing and cooperation (MoUs with vendors and overseas CERTs and
security forums).
• Pro-active actions to deal with and contain malicious activities on the net by way of net
traffic monitoring, routing and gateway controls
• Lawful interceptions and Law enforcement.
• Nation wide security awareness campaign.
• Security research and development focusing on tools, technology, products and services.