0% found this document useful (0 votes)
51 views

Cyber Security 2nd Class

Uploaded by

Prince Jaiswal
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views

Cyber Security 2nd Class

Uploaded by

Prince Jaiswal
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 3

Access Control :- It is a data

security process that enables


organizations
to manage who is authorized to
access the data and resources.

Secure access control uses policies


that verity users are who they claim
to be and ensurs appropriate
controls access
levels are granted to users.

Authorization :- It is a process by which a


server
determines if the client has permission to
use a resources
or access a file.

Authentication :- It is the process


that companies use to conform that
only the right people, person, users and
apps with the
right permissions can get organizational
resources.

Physical Security :- It is the protection


of
hardware,software,networks and data from
physical actions
and events that
cause serious loss or damage to enterprise,
agency or institutions

Integrity :-
i). Backups :- It refers to the process making a copy of the
information typically stored on our desktop, laptop computer,
smartphone and tablet.

This could inculdes documents,photos,emails, address, videos,


machine images, operating system and registry files.

ii). Checksums :- Checksums are used to check files and other


data for errors or manipulation that might have occured during
data transmission or storage.

Cryptographic checksum are the basic for digital signatures


and other use causes of cryptographic and encryption.

# Codes for data correction :- Here, we will be using


hamming code for data correction.

Hamming code :- It can use to correct single - bit errors


and detect
the presence of two bit errors in a data block.

Formula - 2^p>=d+P+1, where p is the no. of party bits and


d is the no. of data bits.

=>The hamming code method is a network technique designed by


R.W.

Hamming is used for damage and errors detection during data


transmission between multiple network channels.

The hamming code method is one of the most effective ways to


detect single data bit errors in the original data at the
receiver end.

## Components of Cyber Security :-

i). Information Security


ii). Application Security
iii). Network Security
iv). End-User Security
v). Operational Security
vi). Disaster Recovery Planning

i). Information Security :- It protects sensitive information from


unauthorized activities, including inspection, modification, recording and
any destruction.

ii). Application Security :- It is the process of developing, adding and


testing security features within applications to prevent security
vulnerabilities against threats such as unauthorised Access and
modification.

iii). Network Security :- It ia an activity designed to protect the usability


and integrity of our network and data. It includes both hardware and software
technologies. It targets a variety of threats. It stops them from entering or
spreading on our network.

iv). End-User Security :- End-User security is the process of stopping unauthorized


agents and campaigns from targeting endpoints or Access points of end-users
computers such as desktops,notebooks.

v). Operational Security :- ( OPSEC ), It is a process that organizations deploy to


prevent
sensitive information from getting into wrong hands.

vi). Disaster Recovery Planning :- It is the process of recovering the information,


software failure or destruction of data.

# What is an information security policy ?


=> Information Security (INFOSEC) refers to policies processes and tools designed
and
deployed to protect sensetive business information and data assets from
unauthorized
access.
There are three core aspects of information security :-
Confidenciality,
Integrity and availability.

# Common Information security threats :-


i). Unsecure System
ii). Socal Engineering
III). Social Media Attacks
iv). Lack of Encryption
v). Security Misconfiguration
vI). Malware or EndPoints

i). Unsecure System :- A system without security protection. Not secured,


especially
not insured against loss.

ii). Socal Engineering :- It is tactic of manipulating, influencing a victim


in order to gain control over a computer system, or to steal personal and financial

information.

III). Social Media Attacks :- Attackers often use social media acconts during the
reconnaissance phase of a social engineering or phishing attack.

Linux - Tools
i). Storm-Breaker :- It is a social engineering tool
that cab be used to access the location, webcam, microphone
and Os password grabber using Ngrok Link.

Features :-
- It can get device information.
- It can provide Location.
- It can access Webcam.
- It can access the microphone.

ii). Z-Phisher :- It is a phishng tool made for ethical


hacking and instructional purposes.It became very popular now
adays and is used to do phishing attacks on target.

You might also like