cyber security unit-1
cyber security unit-1
Cyber security, short for "cyber security," is a field dedicated to protecting computer systems,
networks, and data from unauthorized access, attacks, damage, or theft. As our world
becomes increasingly digital, the importance of cyber security has grown exponentially.
Cyber security measures are essential for ensuring the confidentiality, integrity, and
availability of information in the face of a wide range of cyber threats.
Cyber security is a field dedicated to protecting computer systems, networks, programs, and
data from digital attacks, damage, theft, and unauthorized access. As our world becomes
increasingly digitized, the importance of cyber security has grown exponentially. The
interconnected nature of modern technology exposes individuals, organizations, and
governments to various cyber threats, making robust cyber security measures crucial for
safeguarding sensitive information and maintaining the integrity of digital systems.
The term “cyber space” was coined by science fiction author William Gibson in his 1984
novel “Neuromancer” and has since become widely used term to describe the interconnected
digital realm.
Cyberspace refers to the virtual computer world, and more specifically, an electronic medium
that is used to facilitate online communication. Cyberspace typically involves a large
computer network made up of many worldwide computer sub networks that employ TCP
(Transmission Control Protocol)/IP protocol to aid in communication and data exchange
activities.
OR
Cyber security, often spelled as "cyber security," is the practice of protecting computer
systems, networks, programs, and data from digital attacks, unauthorized access, and damage.
The primary goal of cyber security is to ensure the confidentiality, integrity, and availability
of information in the digital realm. It involves implementing a set of measures, technologies,
and best practices to safeguard computer systems and data from a wide range of cyber threats.
Computer and web technology are integral components of the digital age, shaping the way we
communicate, work, access information, and conduct various activities. Here's an overview
of computer and web technology:
Computer Technology:
1. Hardware:
o Central Processing Unit (CPU): The brain of the computer that executes
instructions.
o Memory (RAM): Temporary storage for data and program instructions.
o Storage Devices: Hard drives, SSDs, and other devices for long-term data
storage.
2. Software:
o Operating Systems: Software that manages computer hardware and provides
common services.
o Applications: Programs designed for specific tasks, such as word processors,
web browsers, and design tools.
3. Networking:
o Local Area Networks (LANs) and Wide Area Networks (WANs):
Connectivity solutions for linking computers and devices.
o Internet: A global network connecting millions of computers worldwide.
4. Security:
o Antivirus Software: Protects against malware and viruses.
o Firewalls: Control incoming and outgoing network traffic for security.
5. Emerging Technologies:
o Artificial Intelligence (AI) and Machine Learning (ML): Computers
mimicking human intelligence for tasks like image recognition and language
processing.
o Quantum Computing: Leveraging quantum bits (quits) for advanced
computational capabilities.
Web Technology:
Web technology refers to the set of tools, languages, protocols, and software solutions used to
create, manage, and deliver content on the World Wide Web. It encompasses the entire
process of building and maintaining websites, web applications, and online services. Web
technology plays a critical role in enabling the functionality and interactivity of the internet,
providing the infrastructure for communication, information dissemination, and collaboration
on a global scale.
Web technology encompasses a broad range of tools, languages, protocols, and frameworks
that facilitate the development, design, and functionality of websites and web applications.
Here are key components of web technology:
These components work together to create a seamless and interactive web experience,
enabling the development of diverse and feature-rich websites and applications. Advances in
web technology continue to shape the online landscape and improve the efficiency and
functionality of digital platforms.
A) World Wide Web (WWW): The World Wide Web is based on several different
technologies web browsers, hypertext Markup language (HTML) and Hypertext
Transfer protocol (HTTP).
B) Web Browser: The web browser is application software to explore WWW. It
provides an interface between the server and the client and requests to the server
for web documents and services.
C) Web server: web server is a program which processes the network requests of the
users and serves them with files that create web pages. This exchange takes place
using Hypertext Transfer protocol.
D) Web Pages: A web page is a digital document that is linked to the World Wide
Web and viewable by anyone connected to the internet has a web browser.
E) Web Development: web development refers to the building, creating and
maintaining of websites. It includes aspects such as web design, web publishing,
web programming, and database management. It is the creation of an application
that works over the internet that is websites.
Overview of Computer:
➢ Definition:
"A device used for computing, specifically, an electronic machine which, by means of stored
instructions and information, performs rapid, often complex calculations or compiles,
correlates and selects data". Webster's Dictionary
Features/Characteristics of Computer:
Today the computer plays a major role in the modern society and its development. The
characteristics that make a computer possible to play such vital role are:
(i) High Speed: Since electrical pulses cause all the operations of the computer, the
computers can perform large number of operations in just one second. The processing speed
of a computer is generally measured in Nano seconds. Since the computers are electronic
device and work with the electrical pulses which travel at incredible speed and hence their
internal speed is also virtually instantaneous. The speed of the processing varies with the
computer hardware.
(ii) Accuracy: The accuracy of the computers is consistently very high. Computers do not
make mistakes. Errors causes in computing are generally due to negligence, such as
inaccurate data, improper procedures, poor designs etc.
(iii) Storage Capacity: Computers have a very large storage capacity. The computers can
store large amount of data and information, which is expressed in terms of kilobytes,
megabytes and gigabytes in memory. Moreover, the storage capacity of the computers can be
increased by using secondary storage devices such as magnetic disk. The information stored
in the secondary storage devices can be retrieved quickly with the help of main memory
(RAM).
(iv) Reliability: The computers give very accurate results with predetermined values. They
correct and modify the parameters automatically and give suitable signals. They give
formatted results with high degree of precision.
(v) Versatility: Computers are very versatile machines with manual and automatic controls.
They are capable of solving any problem and can be applied in all sorts of business and other
activities.
(vi) Automation: The special feature of computer is automation i.e. the computer executes a
program continuously without any human intervention until completion. The central
processing unit of the computer makes it processing unit of the computer makes it possible.
Benefits from using computers are possible because computers have the advantages of speed,
reliability, consistency, storage and communications.
1. Speed: When data, instructions, and information flow along electronic circuits in a
computer, they travel at incredibly fast speeds. Many computers process billions or trillions
of operations in a single second. Processing involves computing (e.g. adding, subtracting),
sorting (e.g., alphabetizing), organizing, displaying images, recording audio, playing music
and showing a movie or video.
2. Reliability: The electronic components in modern computers are dependable and reliable
because they rarely break or fail.
3. Consistency: Given the same input and processes, a computer will produce the same results
consistently. A computing phrase known as garbage in, garbage out-points out that the
accuracy of a computer's output depends on the accuracy of the input.
4. Storage: A computer can transfer data quickly from storage to memory, process it and then
store it again for future use. Many computers store enormous amounts of data and make this
data available for processing anytime it is needed.
5. Communications: Most computers today can communicate with other computers often
wirelessly. Computers with this capability can share any of the four information processing
cycle operations - input, process, output and storage - with another computer or a user.
Limitations of Computer:
The computer can outperform human beings in speed, memory and accuracy but still the
computer has limitations. There are following limitations of a computer.
(i) Programmed by human: Though computer is programmed to work efficiently, fast and
accurately but it is programmed by human beings to do so. Without a program, computer is
nothing. A program is a set of instructions. Computer only follows these instructions. If the
instructions are not accurate the working of computer will not accurate.
(ii) Thinking: The computer cannot think itself. The concept of artificial intelligence shows
that the computer can think. But still this concept is dependent on set of instructions provided
by the human beings.
(iii) Self Care: A Computer cannot care itself like a human. A computer is dependent still to
human beings for this purpose.
(iv) Retrieval of memory: A computer can retrieve data very fast but this technique is linear.
A human being's mind does not follow this rule. A human mind can think randomly which a
computer machine cannot.
(v) Feelings: One of the main limits in the computer is of feeling. A computer cannot feel
about some like a human. A computer cannot meet human in respect of relations. Human can
feel, think and caring but a computer machine itself cannot. A computer cannot take place of
human because computer is always dependent of human.
Communication and web technology are tightly intertwined, playing a crucial role in
shaping the way individuals, businesses, and organizations connect and share
information.
Internet:
The term "Internet" refers to a global network of interconnected computers and computer
networks that communicate with each other using a standardized set of protocols. The
Internet allows the exchange of information, data, and resources on a global scale. It is a
decentralized network that connects millions of private, public, academic, business, and
government networks.
1. Interconnected Networks: The Internet is not a single, centralized network but rather
a vast collection of interconnected networks. These networks use various
technologies, such as wired and wireless connections, to facilitate communication.
2. Protocols: The Internet relies on a set of standardized protocols, including the
Transmission Control Protocol (TCP) and the Internet Protocol (IP), commonly
referred to as TCP/IP. These protocols ensure the reliable transmission of data across
diverse networks.
3. World Wide Web (WWW): The World Wide Web is a system of interlinked
hypertext documents and multimedia content accessed through the Internet. It is a
popular service on the Internet, allowing users to navigate between web pages using
hyperlinks.
4. Web Browsers: Web browsers, such as Chrome, Firefox, Safari, and Edge, are
software applications that allow users to access and navigate the World Wide Web.
They interpret HTML, CSS, and JavaScript to display web content.
5. Email: Electronic mail (email) is a widely used communication tool on the Internet. It
allows individuals and organizations to send and receive messages, documents, and
multimedia content over the network.
6. Search Engines: Search engines, like Google, Bing, and Yahoo, enable users to
search for information on the Internet. They index web pages and provide relevant
results based on user queries.
7. Online Services: The Internet hosts a variety of online services, including social
media platforms, online shopping, streaming services, cloud computing, and more.
These services contribute to the diverse and dynamic nature of online interactions.
8. Domain Names and IP Addresses: Websites on the Internet are identified by domain
names (e.g., www.example.com) and associated IP addresses. Domain names provide
a human-readable format for accessing websites, while IP addresses are numerical
identifiers.
9. ISP (Internet Service Provider): ISPs are companies that provide individuals and
organizations with access to the Internet. They offer various types of connectivity,
including broadband, DSL, and dial-up.
10. Global Accessibility: One of the defining characteristics of the Internet is its global
reach. Users can access information and communicate with others worldwide,
transcending geographical boundaries.
The Internet has become an integral part of modern life, influencing how people
communicate, work, access information, and engage with digital content. It has played a
transformative role in shaping various aspects of society, economy, education, and culture.
Advent of Internet:
The advent of the Internet represents a transformative milestone in the history of technology
and communication. The Internet's origins can be traced back to the late 1960s, and its
development over subsequent decades has had a profound impact on various aspects of
society. Here is an overview of the advent of the Internet:
1. Origins (1960s-1970s):
o The concept of a decentralized computer network was first proposed in the
1960s. The U.S. Department of Defense's Advanced Research Projects
Agency (ARPA) developed the ARPANET, the precursor to the modern
Internet.
o ARPANET, established in 1969, aimed to create a robust and resilient
communication network that could withstand partial outages, making it a more
reliable system than traditional centralized networks.
2. Early Protocols and Standards:
o The development of key protocols laid the foundation for the Internet. The
Transmission Control Protocol (TCP) and the Internet Protocol (IP) were
introduced in the 1970s, forming the basis of the TCP/IP protocol suite.
o TCP/IP allowed for the standardization of communication between different
types of computer systems, ensuring interoperability.
3. Expansion and Commercialization (1980s):
o In the 1980s, the use of TCP/IP expanded beyond military and research
institutions to include universities and eventually commercial entities.
o The Domain Name System (DNS) was introduced to simplify the process of
assigning and remembering IP addresses, replacing the need to memorize
numerical addresses with human-readable domain names.
4. World Wide Web (1990s):
o The World Wide Web, created by Sir Tim Berners-Lee in 1989, became
publicly accessible in the early 1990s. It introduced concepts like hypertext
and provided a user-friendly interface for accessing information on the
Internet.
o The development of web browsers, such as Mosaic and Netscape, made the
World Wide Web more accessible to the general public.
5. Commercialization and Dot-Com Boom (1990s-2000s):
o The 1990s saw a surge in commercial activity on the Internet, known as the
dot-com boom. Many companies emerged, offering online services, e-
commerce, and web-based applications.
o The proliferation of broadband Internet access further fueled the growth of
online content, services, and communication.
6. Social Media and Web 2.0 (2000s-2010s):
o The 2000s witnessed the rise of social media platforms such as Facebook,
Twitter, and LinkedIn, transforming the way people connect and share
information.
o Web 2.0 emerged as a concept, emphasizing user-generated content,
collaboration, and interactive web experiences.
7. Mobile Internet and Connectivity (2010s-2020s):
o The widespread adoption of smartphones and mobile devices has brought the
Internet to a global audience, enabling access anytime, anywhere.
o The Internet of Things (IoT) has further expanded connectivity, with devices
and objects being interconnected for data exchange.
8. Emergence of New Technologies:
o Technologies like cloud computing, artificial intelligence, and blockchain
have integrated with the Internet, shaping new possibilities for storage,
computation, and decentralized applications.
The advent of the Internet has revolutionized communication, commerce, education, and
various other aspects of society, fostering connectivity and information exchange on a global
scale. It continues to evolve, presenting new opportunities and challenges in the digital age.
Uses of Internet:
The Internet has become an indispensable part of daily life, playing a crucial role in various
aspects of communication, information access, business, education, entertainment, and more.
Here are some key uses of the Internet:
1. Communication:
o Email: Electronic mail enables fast and efficient communication, allowing
individuals and organizations to send messages, documents, and multimedia
content.
o Instant Messaging: Platforms like WhatsApp, Facebook Messenger, and
Telegram facilitate real-time text, voice, and video communication.
2. Information Access:
o Web Browsing: The World Wide Web provides a vast repository of
information on virtually every topic, accessible through web browsers like
Chrome, Firefox, and Safari.
o Search Engines: Google, Bing, and other search engines help users find
specific information quickly by indexing and ranking web pages.
3. Education:
o Online Learning: Educational platforms and institutions offer online courses,
webinars, and degree programs, providing flexible learning opportunities.
o Research: Students and researchers can access academic journals, databases,
and libraries online to gather information and conduct research.
4. Business and Commerce:
o E-commerce: Online shopping platforms, such as Amazon, eBay, and
Alibaba, allow consumers to purchase goods and services from anywhere in
the world.
o Digital Marketing: Businesses use the Internet for advertising, social media
marketing, and reaching a global audience.
5. Social Networking:
o Social Media: Platforms like Facebook, Twitter, Instagram, and LinkedIn
enable users to connect, share content, and communicate with friends,
colleagues, and communities.
o Blogging and Content Creation: Individuals and businesses use platforms
like WordPress, Medium, and YouTube to create and share content.
6. Entertainment:
o Streaming Services: Platforms like Netflix, Hulu, and Spotify offer on-
demand streaming of movies, TV shows, music, and podcasts.
o Online Gaming: Multiplayer online games and gaming platforms connect
players worldwide for interactive gaming experiences.
7. Remote Work and Collaboration:
o Video Conferencing: Tools like Zoom, Microsoft Teams, and Skype facilitate
virtual meetings and collaboration among remote teams.
o Cloud Computing: Services like Google Workspace and Microsoft 365
enable collaborative document editing and storage.
8. Healthcare:
o Telemedicine: Patients can consult with healthcare professionals remotely,
accessing medical advice and services online.
o Health Information: Individuals can find information on medical conditions,
treatments, and healthy living through reputable online sources.
9. News and Information Sharing:
o Online News: News websites and portals provide up-to-date information on
global events, politics, and various topics.
o Blogs and Forums: Platforms like Reddit and Quora allow users to share
opinions, ask questions, and participate in discussions.
10. Government Services:
o Online Services: Many government services, such as tax filing, permit
applications, and voting registration, are accessible through official websites.
The uses of the Internet continue to evolve as technology advances, offering new
opportunities for communication, collaboration, and access to information across the globe.
The World Wide Web (WWW or Web) refers to an information space where documents and
resources are identified by Uniform Resource Locators (URLs) and can be accessed via the
Internet. It is a system of interlinked hypertext documents and multimedia content that is
browsed and navigated using web browsers. The WWW is a subset of the broader Internet,
and it plays a central role in providing a user-friendly interface for accessing and sharing
information globally.
This protocol is used to transfer hypertexts (special format of the text that can contain links
to other texts) over the internet and it is defined by the www (World Wide Web) for
information transfer. This protocol defines how the information needs to be formatted
and transmitted and the various actions the web browsers should take in response to the calls
made to access a particular web page.
Whenever a user opens their web browser, the user will indirectly use HTTP as this is the
protocol that is being used to share text, images, and other multimedia files on the World
Wide Web.
HTTP therefore enables users to access web pages by standardizing communications and data
transfer between the internet’s servers and clients.
2. Uniform Resource Locator (URL): A URL is a web address used to locate specific
resources on the internet. It consists of several parts, including the protocol (eg., http:// or “
https://”), domain name (eg., “www. Example.com”), and an optional path to a specific web
page or resource (eg., “about”.) URLs make it easy for users to access websites and web
pages by specifying their unique addresses.
3. Web pages: web pages are the fundamental building blocks of the www. These documents
contain text, images, multimedia elements, and hyperlinks that allow users to navigate to
other web pages. They are typically written in HTML (Hyper Markup Language) and are
displayed in web browsers like chrome, Firefox, or safari. Web pages can range from simple
text-based documents to complex, interactive applications.
4. Hyperlinks: Hyperlinks, often referred to as links, are connections between web pages.
They are highlighted text or elements (such as buttons or images) that, when clicked, take
users to another web page or resource. Hyperlinks enable seamless navigation within the
web, allowing users to explore related content or follow a trail of information across different
websites.
5. Web browsers: web browsers are software applications that allow users to access and
view web pages. They interpret HTML and other web technologies, rendering web content in
a readable and interactive format. Popular web browsers include Google chrome, Mozilla
Firefox, Microsoft Edge, and Apple safari. They are essential tools for navigating and
interacting with the WWW.
6. Web servers: web servers are computers or software programs that store and serve web
pages to user’s web browsers upon request. They play a central role in delivering web content
across the internet. Web servers use the Hypertext Transfer protocol to transmit data to
clients (web browsers) and are responsible for processing requests and responses.
7. Hypermedia and Multimedia: While text based content is essential the web also includes
hypermedia and multimedia elements. Hypermedia incorporates links to other web resources,
enriching the browsing experience by allowing users to access images, videos, audio files,
interactive applications, and more. These multimedia elements make web content more
engaging and informative.
The term "Internet Society" can refer to two related but distinct concepts:
In summary, the Internet Society encompasses both a specific organization, the Internet
Society (ISOC), and a broader concept of a global community of individuals and entities
working collaboratively to ensure the open, accessible, and beneficial development and use of
the internet.
The Internet has had a profound impact on society across various domains:
Benefits of Internet Society:
1. Advocacy for an open Internet: ISOC advocates for policies and practices that up
hold the principles of a free and open Internet. It promotes net neutrality, digital
rights, privacy protection, and accessibility for all, ensuring that the internet remains a
global resource that benefits everyone.
2. Global Internet standards and interoperability: ISOC actively participates in the
development and promotion of internet standards and protocols through organizations
like the Internet Engineering Task force (IETF). This ensures that the internet’s
technical foundations are robust, reliable, and interoperable, allowing seamless
communication across diverse networks and devices.
3. Capacity building and education: ISOC provides educational resources and training
programs to enhance internet knowledge and expertise. These initiatives help
individuals and communities better understand the internet’s complexities,
opportunities, and risks.
4. Research and policy Analysis: ISOC conducts research on various internet related
topics, offering valuable insights and analysis to inform policy decisions. Its research
helps policy makers and stake holders make informed choices regarding internet
governance, infrastructure development and cyber security.
5. Promotion of digital inclusion: ISOC actively works to bridge the digital divide by
promoting policies and initiatives that expands internet access to underserved and
marginalized populations. This includes efforts to connect and remote rural areas and
ensures the benefits of internet are accessible to all.
6. Global impact and influence: ISOC global reach and influence allow it to shape the
internet development and governance by participating in International Forums,
engaging with policy makers, and collaborating with other stake holders to address
emerging challenges and opportunities.
Regulating cyberspace involves establishing rules, standards, and laws to govern the conduct
and interactions of individuals, organizations, and entities in the digital realm. The challenges
of regulating cyberspace include the global nature of the internet, the rapid pace of
technological advancements, and the need to balance innovation and security. Here are some
key aspects of regulations in cyberspace:
Cyber security refers to the practice of protecting computer systems, networks, programs,
and data from digital attacks, unauthorized access, damage, or theft. It involves the
implementation of measures, technologies, processes, and best practices to ensure the
confidentiality, integrity, and availability of information in the digital space. Cyber security is
crucial in safeguarding individuals, organizations, and governments from the evolving
landscape of cyber threats.
1. Confidentiality:
o Protection of Sensitive Information: Cyber security aims to prevent
unauthorized access to sensitive data, ensuring that only authorized individuals
or systems can access and view confidential information.
2. Integrity:
o Data Integrity Assurance: Cyber security measures are implemented to
ensure that data remains accurate, unaltered, and trustworthy. This involves
protecting against unauthorized modifications or manipulations of data.
3. Availability:
o Maintaining System Uptime: Cyber security seeks to ensure the availability
of information and services, preventing disruptions caused by cyber- attacks or
technical failures.
4. Authentication:
o Verification of User Identity: Authentication mechanisms, such as
passwords, biometrics, and multi-factor authentication, are employed to verify
the identity of users and prevent unauthorized access.
5. Authorization:
o Access Control: Authorization mechanisms determine the level of access that
users, systems, or applications have to specific resources, ensuring that
individuals can only access information relevant to their roles.
6. Risk Management:
o Identification and Mitigation of Risks: Cyber security involves identifying
potential threats and vulnerabilities, assessing their impact, and implementing
measures to manage and mitigate risks effectively.
7. Encryption:
o Secure Data Transmission: Encryption is used to convert sensitive data into
a coded format, making it unreadable to unauthorized entities. It is crucial for
securing data during transmission and storage.
8. Firewalls and Intrusion Detection/Prevention Systems (IDS/IPS):
o Network Security Measures: Firewalls and IDS/IPS systems are deployed to
monitor and control network traffic, detect suspicious activities, and prevent or
mitigate potential cyber threats.
9. Security Awareness and Training:
o Human Factor: Cyber security includes educating users about security best
practices, raising awareness of potential risks, and providing training to
minimize the human factor in security vulnerabilities.
10. Incident Response and Recovery:
o Preparedness for Cyber Incidents: Organizations develop incident response
plans to efficiently detect, respond to, and recover from cyber security
incidents, minimizing the impact on operations.
11. Endpoint Security:
o Protection of End User Devices: Endpoint security involves securing
individual devices (e.g., computers, smartphones) from cyber threats through
antivirus software, anti-malware tools, and other protective measures.
12. Patch Management:
o Software and System Updates: Regularly updating software and systems
helps address vulnerabilities and ensures that security patches are applied to
protect against known threats.
13. Security Governance and Compliance:
o Regulatory Compliance: Cyber security frameworks and regulations guide
organizations in establishing governance structures, policies, and procedures
to meet compliance requirements and industry standards.
14. Cyber Threat Intelligence:
o Monitoring and Analysis of Threats: Gathering and analyzing information
about potential cyber threats, including emerging attack vectors and tactics,
helps organizations stay ahead of evolving risks.
Cyber security is an on-going process that requires a multi-layered and adaptive approach. As
technology evolves and cyber threats become more sophisticated, organizations must
continually assess and enhance their cyber security measures to effectively protect against
potential risks and vulnerabilities.
Cyber security faces a range of complex issues and challenges due to the dynamic nature of
the digital landscape, the increasing sophistication of cyber threats, and the widespread
reliance on technology. Here are some key issues and challenges in the field of cyber
security:
Addressing these cyber security challenges requires a comprehensive and proactive approach,
involving a combination of technology, policies, education, collaboration, and on-going
adaptation to the evolving threat landscape.
Difference between Internet and WWW