CYBER SECURITY
Week 1: Introduction to Cyber Security – Cyberspace –
Information Systems – Security Principles - Importance of Cyber
Security
Module 1: Introduction to Cyber Security – Fundamentals of
Cyberspace – Internet
Course Co-Ordinator Content Reviewer
Dr. Padmavathi Ganapathi Dr V Rhymend Uthariaraj
Professor-Department of Computer Professor, Department of Information
Science Technology
Avinashilingam Institute for Home Madras Institute of Technology Campus,
Science and Anna University,
Higher Education for Women Chennai-600 044.
(Deemed-to-be-University), Coimbatore
[email protected][email protected] +919444150081
9486772744
1
Objectives
✓Introduce the fundamentals of cyber security
✓Present about cyberspace, importance of
Cyber Security
2
Learning Outcomes
✓Define and Explain the concepts of
Cyberspace
✓Delineate the components of Cyberspace
✓Compare Cyberspace with Internet
✓Appreciate the need for Cyber Security and
Define Cyber Security
3
Outline
What is Cyberspace? : An Introduction
The Origin of Cyberspace
Levels of Cyberspace
Core Cyberspace
Extended Cyberspace
Components of Cyberspace
Cyber Domain Characteristics
Driving forces of Cyberspace
Advantages and Shortcomings of Cyberspace
4
Outline
What is Internet?
Comparing and Contrasting Internet with
Cyberspace
Introduction to Cyber Security – What is Cyber
Security?
Importance of Cyber Security
Common tools of Cyber Security
Key Elements of Cyber Security
Application Security
Information Security
Network Security
Disaster Recovery
Operational Security
End-User Education 5
Cyberspace- Definition
“Cyberspace refers to the virtual space that
provides the infrastructure, electronic medium
and related elements necessary for online global
communication”.
6
Cybernauts
• Cybernauts are People who are actively
engaged in Cyberspace for all their social
experience
7
Levels of Cyberspace
Core Cyberspace
Extended Cyberspace
8
Core Cyberspace and Extended
Cyberspace
• Core cyberspace covers all electronic devices,
transmission medium or connecting medium
• Extended Cyberspace covers everything that
surrounds the core
• Anybody can access the core through this
extended space
9
Components of Cyberspace
Physical Devices Computer and Software Data
Networks
Intermediaries
Network of Networks
10
Layers of Cyberspace
Cyber Personal Layer
Logical Layer
Physical Layer
11
Layers of Cyberspace
• Physical Layer – comprises of the physical and
geographical network components
• Logical Layer – consists of the network
elements
• Cyber Personal Layer – involves people actually
present on the network
12
Cyber Domain Characteristics
Major Characteristics of Cyber Domain
Virtuality Expansion Ambiguity Interactivity
Connectivity
13
Driving forces of Cyberspace
Efficiency
Time Space
The key efficiency
Vital and Interlinked with element in
irreplaceable time into a
cyberspace is that
complex
Action, preparation, simultaneous
tapestry actions in different
realization takes time
The Initiation of dimensionalities are
In cyberspace,
Cyber-attack is performed by the
actions occur in the
from digital operators
blink of an eye
battle space
Asymmetry Anonymity
Opponent's weak Cyberspace and its
point exploitation by operations are to be
claiming competitive identified
advantage in the
most optimal way Difficulty to detonate
the location of the
Asymmetrical warfare operator with their
opportunities are the identity found in
sources created by cyberspace
cyberspace
14
What is Internet?
• Internet is a network of networks
• The Internet is the global system of
interconnected computer networks that use the
Internet protocol suite (TCP/IP) to link devices
worldwide
15
Contrasting Internet & Cyberspace
Cyberspace Internet
• It is a symbolic and • The design of Internet
figurative space that results in a cyberspace
exists within Internet built out of components
• It supports multitude of • It provides services
business, government designed to form more
and social interactions complex services
through information
exchange
16
Introduction to Cyber Security
• Cyber Security is protection against the criminal
or unauthorized use of electronic data
• Preventative methods used to protect information
from being attacked
• Cyber Security strategies include
• Identity management,
• Risk management and
• Incident management
17
Importance of Cyber Security
• The security properties are realized and
maintained by the Organization
• Ensures protection of resources from attacks,
damage and authorized access on networks,
computers and programs
• Enforces Integrity, Confidentiality and
Authenticity
18
Tools used for Cyber Security
Passwords
Anti-Virus/ Anti-Malware Software
Software Patches
Common tools
used to prevent
Firewalls
Data Leakage
Authentication
Encryption
19
Key elements of Cyber Security
Application
Security
End-user Information
Education Security
Key
Elements of
Cyber
Security
Operational Network
Security Security
Disaster
Recovery
20
Application Security
• Input parameter validation
• User/Role Authentication and Authorization
• Session management, parameter manipulation
and exception management
• Security Auditing and Log Analysis
21
Information Security
• It protects information from unauthorized access
• Helps to avoid identity theft
• Promotes Information privacy
• Major techniques used are
• Identification, Authentication and authorization
of users
• Cryptographic techniques
22
Network Security
• It identifies threats and stops them from
entering or spreading into the network
• Network security components include:
• Anti-virus and anti-spyware
• Firewall
• Intrusion prevention systems (IPS)
• Virtual Private Networks (VPNs)
23
Network Security
24
Disaster Recovery
• It is a development process used to assess
various types of risks
• Establishes different priorities thereby evolving
disaster recover strategies
• Every organizations must develop proper
disaster recovery strategies to protect
themselves from damage
25
Operational Security and End-user
Education
• Operational security is a process that is used to
identify critical actions in an organization
• End-user education is must for an organization
to avoid unnecessary incidents against security
26
Cyber Security Questions
• The questions to be addressed on securing the
operations in cyberspace are
• From what to protect? – Deciding on what or
from what
• What to protect? – Identifying possible threats
entering the system
• How to protect? – The measures and
implementation procedures to be used
27
Conclusion
• We are living in digital era and digital
technology has transformed our lives promoting
the need for Cyber Security
• This module of week-1 has discussed about the
introduction to Cyber Security, fundamentals of
cyberspace, importance of cyberspace and
Internet etc.
28
Thank you
29