0% found this document useful (0 votes)
807 views30 pages

Cyber Security Vi Semester

Cyber Security : It covers 5 units . This gives an idea of what is cyber security and overview of the cyber security
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
807 views30 pages

Cyber Security Vi Semester

Cyber Security : It covers 5 units . This gives an idea of what is cyber security and overview of the cyber security
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 30

CYBER SECURITY

B.Com CA, III YEAR, VI Semester


2023-2024

Lecturer in Computer Science


Objective of the course:

 To acquire conceptual and application knowledge of


Cyber Security

 To learn cyber security, cyber security vulnerabilities ,


securing web application,services and servers,
cryptography and network securityand cyberspace and
cyber forensics.
Outcomes
On completion of the course students should be able to:
 Get Knowledge of

 Cyber security

 cyber security vulnerabilities

 how to secure web appplications,servers

 cryptography,network security

 cyberspace and cyber forensics.


SUGGESTED READINGS:

Nina Godbole & Sunit Belapure Cyber Security,Wiley


India Pvt Ltd,2012

Ramandeep Kaurangra, Cyber laws and Intellectural


Property Rights, Kalyani Publishers

Pankaj Agarwal, Information Security and Cyber Laws,


Acme Learning,2013
Unit-I: INTRODUCTION
Cybersecurity is a practice of protecting
systems,networks and programs such as
hardware,software and data from cyber threats.

These Cyber-attacks are usually aimed at accessing,


changing or destroying sensitive information extorting
money from users or interupting normal business
processes.

Cybersecurity is used by individuals and enterprises to


protect against unauthorized access to data centres and
other computized systems.
What exactly is it that cyber-criminals
look for when planning an attack
Common targes include

Internal data : Operations,salaries,research and development.

Intellectual property : Top-secret projects,formulas,plans or other


kinds of private data.Anything an attacker could sell or use to their own
benefit.

Client and customer information : Who are the clients of this


organization?How much are they paying and for what services?

Marketing and competitive intelligence : Short and long-range


marketing goals and competitor knowledge
Elements of Cybersecurity
• Application security

• Information or data security

• Network security

• Disaster recovery / business continuity planning

• Operational security

• Cloud security

• Critical infrastructure security

• Physical security

• End-user education
Benefits of Cybersecurity
• The benefits of implementing and maintaining cybersecurity practices
include

• Business protection against cyberattacks and data breaches.

• Protection of unauthorized user access

• Improved recovery time after a breach.

• Protection for end users and end point devices.

• Regulatory complaince.

• Business continuity.

• Improved confidence in the company’s reputation and trust for developers,


partners,customers,stakeholders and employees.
Cyber Threats
• Cyber Warfare

• Cyber crime

• Cyber Terrorism

• Cyber Espionage
Cyber Security Vulnerabilities
• In cybersecurity, a Vulnerability is a weakness that can be exploited by cybercriminals to gain
unauthorized access to a computer system.

• After exploiting, a vulnerability, a cyber attack can run malicious code, install malware and even
steal sensitive data.

• Cybersecurity vulnerabilities are issues or problems that make a computer system or network
susceptible to a criminal.

• Causes of Vulnerabilities

 There are many causes of vulnerabilities . Some of them are .


 Poor Password Management : Weak passwords can be broken with brute force and reusing
passwords can result in one data breach becoming many.
 Software Bugs : Programmers can accidentally or deliberately leave an exploitable bug in
software. Sometimes end users fail to update their software leaving them unpatched and
vulnerable to exploitation.
 Connectivity : The more connected a device is the higher the chance of a vulnerability.
Cyber Security Safeguards
• Cybersecurity safeguards are all kind of control
measures that support the fulfillment of requirements or
the achievement of objectives related to cybersecurity.

• Authentication : Authentication is the process of


identifying users that request access to a system,
network, or device. Access control often determines
user identity according to credentials like username and
password. Other authentication technologies like
biometrics and authentication apps are also used to
authenticate user identity.
Cyber Security Policies
• A cybersecurity policy basically lays down
the rules for employees,board members
and third-party users on practicing
computer security.
• A strong cybersecurity policy can improve
employer reputation and organizational
credibility.Everyone wants their data to be
stored safely, which guaranteed with a
computer security policy.
Types of Cybersecurity Policies
• Organizational Security Policy

• System-specific Policy

• Issue-specific Secuirty Policy


Network Architectures and its Types
• Network architecture refers to how computers
are organized in a system and how tasks are
allocated between these computers.
• Types of Networks
 Local Area Networks eg : Building
 Wide Area Networks eg : Country
 Personal Area Networks eg : Bluetooth
 Strong Area Networking eg : server’s switches &
this connection over land has no high traffic
Cryptography
• Cryptography is technique of securing information and
communications through use of codes so that only those people for
whom the information is intended can understand it and process it.
Thus, preventing unauthorized access to information.

• The prefix “crypt” means “hidden” and suffix graphy means “writing”.

• In cryptography the techiques which are used to protect information


are obtained from mathematical concepts and algorithms to convert
messages in ways to make it hard to decode it.

• Algorithms are used for cryptographic key generations,digital


signing,verification to protect data privacy,web browsing on internet
and to protect confidential transactions such as credit card and debit
card transactions.
Hackers and Types of Hackers
• Hacker : A hacker is a person who solves a technical issue by using a
computer, networking, or even other abilities. Anyone who uses their skills to
gain access to a system or networks in application to break laws is referred to
as a hacker.
Types of Hackers
 White hat hackers (ethical hackers) : They break into our system with good
intention fo finding velnerabilities and assisting you in removing viruses and
malware
 Black hat hackers : The agenda of a black hat hacker is monetary.They can
back into your network and gain access to your personal ,business and
financial information by exploiting any loopholes they find.
 Grey hat hackers : They are in between White and black hat hackers.Grey hat
hackers may not use their skills for personal gain, they can however have both
good and bad intentions. For instance , a hacker who hacks into an
organization and finds some vulnerabilitiy may leak it over the internet or
inform the organization about it.
Unit-I : Objectives
 This unit gives the idea of concepts on Cyber
Security,Cyber Security Vulnerailities,Cyber Security
Safeguards

 Be able to understand Advantages and Disadvantages


of implementing Cyber Security.

 Be able to learn how to protect computers and networks


from cyber attacks.
Unit-II: Securing Web Applications,Services and Servers

 Securing Web Applications, Services and Servers :


 Introduction , Basic security for HTTP Applications and
Services

 Basic Security for SOAP Services.

 Identity Management and Web Services

 Authorization Patterns-security Considerations,


Challenges.
Unit-II: INTRODUCTION
• Seuring web applications is the process of protecting websites and online
services against different security threats that exploit vulnerabilities in an
application’s code.

• Common targets for web application attacks are content mangement


systems,database administration tools and SaaS applications.

• Web application security breaches can be very profitable for cyber criminals.

• Data breaches are often deployed stalthily and can go undetected for
months,exposing customers personal records and causing last damage to
businesses.

• Monintoring web application security threats are critical to detecting signs of


a web application security breach

• Signs of a breach include application malfunctioning and slow down,


unexpected log messages, alter files and browser warnings.
Common Web application attacks

 Cross Site Scriptiing(XSS)

 SQL Injection (SQLi)

 Cross-site Request Forgery (CSRF)

 Denial-of-Service (DoS)

 Distributed Denial-of-Service(DDoS)
• In the event of a web application security
breach. IT security teams should be
equipped with a well-defined incident
response plan.These includes.

 Identification
 Containment
 Eradication
 Recovery
 Lessons learned
Unit-2 : Objectives

 This unit gives the idea of Framework of E-Commerce,

Application services, Interface Layers, Network


Infrastructure & network security.

 Data Encryption , Decryption Techniques


Unit-III: Consumer Oriented E-Commerce
Applications

Mercantile Process Model : Consumers perspective


and Merchant’s perspective

Electronic Payment Systems : Legal Issues & Digital


Currency

E-cash & E-Cheque , Electronic Fund Transfer

Advantages and Risks – Digital Token-Based


E-payment system – Smart Cards.
Unit-III : objectives

• The unit gives the idea of Mercantile process model


(Consumers perspective and Merchant’s Perspective)

• Learning of Electronic Payment System, Legal Issues,


Digital currency- E-cash and E-Cheque, Electronic Fund
Transfer

• Learning of E-Payment System – Smart cards.


Unit-IV: Electronic Data Interchange
• Introduction : EDI Standards , Types of EDI, EDI
Applications in Business

• Legal – Security and privacy issues if EDI –EDI and E-


Commerce – EDI Software Implementation.
Unit -IV: objectives

• This unit gives the idea of EDI(electronic data


interchange) standards, Types of EDI

• Learning about Legal Security and Privacy issues if


EDI-EDI and E-Commerce – EDI Software
Implementation.
Unit-V: E-Marketing Techniques
 Introduction – New age of Information – Based Marketing –
Influence on Marketing

 Search Engines and Directory Services

 Charting the On-line Marketing Process – Chain Letters

 Application of 5P’s (Product, Price, Place, Promotion,


People)

 E-Advertisement – Virual Reality and Consumer Experience

 Role of Digital Marketing.


Unit-V : Objectives

• This unit gives the idea of E-Marketing


Techniques, Search Engines .

• Applications of 5P’s (Product, Price, Place,


Promotion, People)

• E-Advertisment

• Role of Digital Marketing in E-commerce


Thank you

You might also like