Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
50 views29 pages

Week1 Module1

The document outlines an introductory course on Cyber Security, detailing the fundamentals of cyberspace, its components, and the importance of cyber security. It covers key topics such as the definition of cyberspace, the distinction between cyberspace and the internet, and various elements of cyber security including application, information, and network security. The course aims to educate participants on the significance of protecting electronic data and the tools available for ensuring cyber security.

Uploaded by

sachinvanjara
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views29 pages

Week1 Module1

The document outlines an introductory course on Cyber Security, detailing the fundamentals of cyberspace, its components, and the importance of cyber security. It covers key topics such as the definition of cyberspace, the distinction between cyberspace and the internet, and various elements of cyber security including application, information, and network security. The course aims to educate participants on the significance of protecting electronic data and the tools available for ensuring cyber security.

Uploaded by

sachinvanjara
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

CYBER SECURITY

Week 1: Introduction to Cyber Security – Cyberspace –


Information Systems – Security Principles - Importance of Cyber
Security
Module 1: Introduction to Cyber Security – Fundamentals of
Cyberspace – Internet
Course Co-Ordinator Content Reviewer
Dr. Padmavathi Ganapathi Dr V Rhymend Uthariaraj
Professor-Department of Computer Professor, Department of Information
Science Technology
Avinashilingam Institute for Home Madras Institute of Technology Campus,
Science and Anna University,
Higher Education for Women Chennai-600 044.
(Deemed-to-be-University), Coimbatore [email protected]
[email protected] +919444150081
9486772744

1
Objectives

✓Introduce the fundamentals of cyber security


✓Present about cyberspace, importance of
Cyber Security

2
Learning Outcomes

✓Define and Explain the concepts of


Cyberspace
✓Delineate the components of Cyberspace
✓Compare Cyberspace with Internet
✓Appreciate the need for Cyber Security and
Define Cyber Security

3
Outline

What is Cyberspace? : An Introduction


The Origin of Cyberspace
Levels of Cyberspace
Core Cyberspace
Extended Cyberspace
Components of Cyberspace
Cyber Domain Characteristics
Driving forces of Cyberspace
Advantages and Shortcomings of Cyberspace
4
Outline
What is Internet?
Comparing and Contrasting Internet with
Cyberspace
Introduction to Cyber Security – What is Cyber
Security?
Importance of Cyber Security
Common tools of Cyber Security
Key Elements of Cyber Security
Application Security
Information Security
Network Security
Disaster Recovery
Operational Security
End-User Education 5
Cyberspace- Definition
“Cyberspace refers to the virtual space that
provides the infrastructure, electronic medium
and related elements necessary for online global
communication”.

6
Cybernauts

• Cybernauts are People who are actively


engaged in Cyberspace for all their social
experience

7
Levels of Cyberspace

Core Cyberspace

Extended Cyberspace

8
Core Cyberspace and Extended
Cyberspace

• Core cyberspace covers all electronic devices,


transmission medium or connecting medium
• Extended Cyberspace covers everything that
surrounds the core
• Anybody can access the core through this
extended space

9
Components of Cyberspace

Physical Devices Computer and Software Data

Networks

Intermediaries

Network of Networks

10
Layers of Cyberspace

Cyber Personal Layer

Logical Layer

Physical Layer

11
Layers of Cyberspace

• Physical Layer – comprises of the physical and


geographical network components
• Logical Layer – consists of the network
elements
• Cyber Personal Layer – involves people actually
present on the network

12
Cyber Domain Characteristics

Major Characteristics of Cyber Domain

Virtuality Expansion Ambiguity Interactivity


Connectivity

13
Driving forces of Cyberspace

Efficiency
Time Space
The key efficiency
Vital and Interlinked with element in
irreplaceable time into a
cyberspace is that
complex
Action, preparation, simultaneous
tapestry actions in different
realization takes time
The Initiation of dimensionalities are
In cyberspace,
Cyber-attack is performed by the
actions occur in the
from digital operators
blink of an eye
battle space

Asymmetry Anonymity
Opponent's weak Cyberspace and its
point exploitation by operations are to be
claiming competitive identified
advantage in the
most optimal way Difficulty to detonate
the location of the
Asymmetrical warfare operator with their
opportunities are the identity found in
sources created by cyberspace
cyberspace

14
What is Internet?

• Internet is a network of networks


• The Internet is the global system of
interconnected computer networks that use the
Internet protocol suite (TCP/IP) to link devices
worldwide

15
Contrasting Internet & Cyberspace

Cyberspace Internet
• It is a symbolic and • The design of Internet
figurative space that results in a cyberspace
exists within Internet built out of components
• It supports multitude of • It provides services
business, government designed to form more
and social interactions complex services
through information
exchange

16
Introduction to Cyber Security

• Cyber Security is protection against the criminal


or unauthorized use of electronic data
• Preventative methods used to protect information
from being attacked
• Cyber Security strategies include
• Identity management,
• Risk management and
• Incident management

17
Importance of Cyber Security

• The security properties are realized and


maintained by the Organization
• Ensures protection of resources from attacks,
damage and authorized access on networks,
computers and programs
• Enforces Integrity, Confidentiality and
Authenticity

18
Tools used for Cyber Security

Passwords

Anti-Virus/ Anti-Malware Software

Software Patches

Common tools
used to prevent
Firewalls
Data Leakage

Authentication

Encryption

19
Key elements of Cyber Security

Application
Security

End-user Information
Education Security

Key
Elements of
Cyber
Security

Operational Network
Security Security

Disaster
Recovery

20
Application Security

• Input parameter validation


• User/Role Authentication and Authorization
• Session management, parameter manipulation
and exception management
• Security Auditing and Log Analysis

21
Information Security

• It protects information from unauthorized access


• Helps to avoid identity theft
• Promotes Information privacy
• Major techniques used are
• Identification, Authentication and authorization
of users
• Cryptographic techniques

22
Network Security

• It identifies threats and stops them from


entering or spreading into the network
• Network security components include:
• Anti-virus and anti-spyware
• Firewall
• Intrusion prevention systems (IPS)
• Virtual Private Networks (VPNs)

23
Network Security

24
Disaster Recovery

• It is a development process used to assess


various types of risks
• Establishes different priorities thereby evolving
disaster recover strategies
• Every organizations must develop proper
disaster recovery strategies to protect
themselves from damage

25
Operational Security and End-user
Education

• Operational security is a process that is used to


identify critical actions in an organization
• End-user education is must for an organization
to avoid unnecessary incidents against security

26
Cyber Security Questions

• The questions to be addressed on securing the


operations in cyberspace are
• From what to protect? – Deciding on what or
from what
• What to protect? – Identifying possible threats
entering the system
• How to protect? – The measures and
implementation procedures to be used

27
Conclusion

• We are living in digital era and digital


technology has transformed our lives promoting
the need for Cyber Security
• This module of week-1 has discussed about the
introduction to Cyber Security, fundamentals of
cyberspace, importance of cyberspace and
Internet etc.

28
Thank you

29

You might also like