100% found this document useful (1 vote)
241 views

Module 1 Introduction To Cyber Space

Introduction to Cyber Space PPT

Uploaded by

Vrushank Bhatt
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
241 views

Module 1 Introduction To Cyber Space

Introduction to Cyber Space PPT

Uploaded by

Vrushank Bhatt
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 29

CYBER SECURITY

Week 1: Introduction to Cyber Security – Cyberspace –


Information Systems – Security Principles - Importance of Cyber
Security
Module 1: Introduction to Cyber Security – Fundamentals of
Cyberspace – Internet
Course Co-Ordinator Content Reviewer
Dr. Padmavathi Ganapathi Dr V Rhymend Uthariaraj
Professor-Department of Computer Professor, Department of Information
Science Technology
Avinashilingam Institute for Home Madras Institute of Technology
Science and Campus, Anna University,
Higher Education for Women Chennai-600 044.
(Deemed-to-be-University), Coimbatore [email protected]
[email protected] +919444150081
9486772744

1
Objectives

Introduce the fundamentals of cyber


security
Present about cyberspace, importance
of Cyber Security

2
Learning Outcomes
Define and Explain the concepts
of Cyberspace
Delineate the components of Cyberspace
Compare Cyberspace with Internet
Appreciate the need for Cyber Security
and Define Cyber Security

3
Outline

What is Cyberspace? : An Introduction


The Origin of Cyberspace
Levels of Cyberspace
Core Cyberspace
Extended Cyberspace
Components of Cyberspace
Cyber Domain Characteristics
Driving forces of Cyberspace
Advantages and Shortcomings of
Cyberspace 4
Outline
What is Internet?
Comparing and Contrasting Internet
with Cyberspace
Introduction to Cyber Security –
What is Cyber Security?
Importance of Cyber Security
Common tools of Cyber Security
Key Elements of Cyber Security
Application Security
Information Security
Network Security
Disaster Recovery
Operational Security
End-User Education 5
Cyberspace- Definition
“Cyberspace refers to the virtual space that
provides the infrastructure, electronic medium
and related elements necessary for online
global communication”.

6
Cybernauts

• Cybernaut are who are


s People actively for all
engaged Cyberspac their
in e social
experienc
e

7
Levels of Cyberspace

Core Cyberspace

Extended Cyberspace

8
Core Cyberspace and Extended
Cyberspace
• Core cyberspace covers all electronic
devices, transmission medium or
connecting medium
• Extended Cyberspacecovers everything
that surrounds the core
• Anybody can access the core through
this extended space

9
Components of Cyberspace

Physical Devices Computer and Data


Software

Networks

Intermediaries

Network of

10
Networks
Layers of Cyberspace

Cyber Personal Layer

Logical Layer

Physical Layer

11
Layers of Cyberspace

• Physical Layer – comprises of the


physical and geographical network
components
• Logical Layer – consists of the
network elements
• Cyber Personal Layer – involves people
actually present on the network

12
Cyber Domain Characteristics

Major Characteristics of Cyber Domain

Virtuality Expansion Ambiguity Interactivity


Connectivity

13
Driving forces of Cyberspace

Efficiency
Time Space
The key
Vital and Interlinked efficiency
irreplaceab with time element in
le into a cyberspace is
Action, complex that
tapestry simultaneous
preparatio
n, The Initiation actions in
realization of Cyber- different
takes time attack is dimensionalities
from digital are performed
In cyberspace, battle space by the operators
actions occur in
the blink of anAsymmetry Anonymity
eye Opponent's weak
Cyberspace and
point exploitation its operations
by claiming are to be
competitive identified
advantage in the
most optimal way Difficulty to
detonate the
Asymmetrical location of the
warfare operator with
opportunities are their identity
the sources found in
created by cyberspace
cyberspace
14
What is Internet?
• Internet is a network of networks
• The Internet is the global system of
interconnected computer networks that
use the Internet protocol suite (TCP/IP) to
link devices worldwide

15
Contrasting Internet & Cyberspace

Cyberspace Internet
• It is a symbolic and • The design of
figurative space Internet results in a
that exists within cyberspace built out
Internet of components
• It supports • It provides services
multitude of designed to form
business, more complex
government and services
social interactions
through information
exchange
16
Introduction to Cyber Security

• Cyber Security is protection against the


criminal or unauthorized use of electronic
data
• Preventative methods used to protect
information from being attacked
• Cyber Security strategies include
• Identity management,
• Risk management and
• Incident management

17
Importance of Cyber Security

• The security properties are realized and


maintained by the Organization
• Ensures protection of resources from
attacks, damage and authorized access on
networks, computers and programs
• Enforces Integrity, Confidentiality and
Authenticity

18
Tools used for Cyber Security

Passwords

Anti-Virus/ Anti-Malware
Software

Software Patches

Common
tools used to
Firewalls
prevent Data
Leakage
Authentication

Encryption

19
Key elements of Cyber Security

Applicatio
n
Security

End- Informati
user on
Educatio Security
n
Key
Elements
of Cyber
Security

Operation Networ
al k
Security Securit
y
Disaste
r
Recover
y
20
Application Security

• Input parameter validation


• User/Role Authentication and
Authorization
• Session management, parameter
manipulation and exception
management
• Security Auditing and Log Analysis

21
Information Security
• It protects information from unauthorized
access
• Helps to avoid identity theft
• Promotes Information privacy
• Major techniques used are
• Identification, Authentication and
authorization of users
• Cryptographic techniques

22
Network Security

• It identifies threats and stops them


from entering or spreading into the
network
• Network security components include:
• Anti-virus and anti-spyware
• Firewall
• Intrusion prevention systems (IPS)
• Virtual Private Networks (VPNs)

23
Network Security

24
Disaster Recovery

• It is a development process used


to assess various types of risks
• Establishes different priorities thereby
evolving disaster recover strategies
• Every organizations must prope
r disaster recovery strategies to
develop
themselves from
protect
damage

25
Operational Security and End-user
Education

• Operational security is a process that is


used to identify critical actions in an
organization
• End-user education is must for an
organization to avoid unnecessary
incidents against security

26
Cyber Security Questions

• The questions to be addressed on


securing the operations in cyberspace are
• From what to protect? – Deciding
on what or from what
• What to protect? – Identifying
possible threats entering the system
• How to protect? – The measures
and implementation procedures to be
used

27
Conclusion

• We are living in digital era and digital


technology has transformed our lives
promoting the need for Cyber Security
• This module of week-1 has discussed
about the introduction to Cyber Security,
fundamentals of cyberspace, importance
of cyberspace and Internet etc.

28
Thank you

29

You might also like