Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
10 views15 pages

Intro

The document provides an introduction to cyber security, outlining its objectives, principles, and the differences between information security and cyber security. Key objectives include confidentiality, integrity, availability, authentication, non-repudiation, access control, incident response, and risk management, each with definitions, importance, types, applications, and potential failures. Real-life incidents are also discussed to illustrate the consequences of breaches in these areas.

Uploaded by

gamerparvesh929
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views15 pages

Intro

The document provides an introduction to cyber security, outlining its objectives, principles, and the differences between information security and cyber security. Key objectives include confidentiality, integrity, availability, authentication, non-repudiation, access control, incident response, and risk management, each with definitions, importance, types, applications, and potential failures. Real-life incidents are also discussed to illustrate the consequences of breaches in these areas.

Uploaded by

gamerparvesh929
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Introduction to Cyber Security

Unit -1

Introduction to Cyber Security-Cyber security objectives, roles, differences between information


security and cyber security, Cyber security principles-confidentiality, integrity, availability,
authentication and non repudiation

Cyber Security Objectives

Cyber Security Objectives are the main goals or purposes of cyber security. They define what needs to
be protected and why, in order to keep data and systems safe, accurate, and available.

Some cyber security objectives are :

1. Confidentiality
2. Integrity
3. Availability
4. Authentication
5. Non-Repudiation
6. Access Control
7. Incident Response
8. Risk Management
9. Security Awareness

Confidentiality

Definition : confidentiality in cybersecurity ensures that information is not disclosed to


unauthorized individuals, entities, or processes. It protects sensitive data from being accessed,
shared, or stolen.

Confidentiality means keeping data secret and private — only those who are allowed to see it should
be able to see it.

2. Importance of Confidentiality

 Protecting personal information (e.g., passwords, medical records)


 Ensuring business secrets and intellectual property are not leaked
 Maintaining data privacy in communications (e.g., emails, messages)
 Securing government and military data
 Supporting secure financial transactions and banking operations

3. Types of Confidentiality

1. Data Confidentiality – Ensuring data is accessed only by authorized people.


2. Communication Confidentiality – Protecting the content of messages in transit.
3. Storage Confidentiality – Securing stored data from unauthorized access.
4. Device Confidentiality – Securing end-user devices from leaks or breaches.
5. Network Confidentiality – Protecting data as it moves across networks.

4. Applications of Confidentiality

Real-Life Usecases How Confidentiality Is Protected


Hospitals keep patient reports safe Only doctors and nurses with permission can see the reports
Logging in to your bank account Uses password and OTP to keep your account safe
online
Sending a private email The email is locked so only the receiver can read it
HR handling employee salary The file is kept in a folder only HR can open
information
Chatting on WhatsApp Messages are encrypted so only you and the other person can
read them

5.What If Confidentiality Fails?

1. Sensitive data is exposed – Personal, financial, or business information becomes public or


stolen.
2. Identity theft and fraud – Attackers can misuse personal info for fake accounts, loans, or
scams.
3. Financial and business loss – Leaked data can lead to loss of money, customers, or business
secrets.
4. Legal actions and penalties – Companies may face lawsuits and fines for not protecting user
data.
5. Loss of trust and reputation – Users, clients, or the public may stop trusting the organization.

5. Real-Life Incidents Where Confidentiality Breaks

1. Facebook–Cambridge Analytica Scandal (2018)


o Millions of users' private data was accessed and used for political profiling.
2. Yahoo Data Breach (2013–14)
o Hackers stole data from over 3 billion accounts, compromising usernames, emails,
and passwords.
3. Sony Pictures Hack (2014)
o Confidential employee data, emails, and unreleased films were leaked.
4. Medical Records Exposure
o Many hospitals face attacks that leak patient health information due to poor
confidentiality measures.

Integrity

Definition : Integrity means protecting information from being modified, altered, or tampered with —
either accidentally or maliciously — by unauthorized individuals.

Importance of Integrity

 Ensures data accuracy and reliability


 Maintains trust in systems, records, and databases
 Supports decision-making with correct data
 Essential in financial systems, healthcare, government data
 Protects the outcome of transactions, logs, or messages

Types of Integrity

Type Description
Data Integrity Ensures the correctness of stored or transmitted data
System Integrity Ensures software and hardware perform as expected
Message Integrity Ensures messages are not changed in transit
Database Integrity Ensures database entries are consistent and error-free

Applications of Integrity in Action

Scenario How Integrity Is Applied


Banking Your account balance must be accurate and reflect real transactions
Medical Records A patient’s medical report must not be altered by unauthorized users
Stock Market Share prices and transactions must be free from manipulation
E-voting Votes must not be changed or deleted
Emails Messages should be received exactly as they were sent

What If Integrity Fails?

1. Wrong or tampered data is used – Information gets changed, leading to false decisions or
actions.
2. Loss of trust in systems – People can’t rely on the accuracy of reports, records, or results.
3. Financial and operational damage – Altered data in banking, healthcare, or business can
cause huge losses.
4. Security and safety risks – Tampered data in control systems (e.g., power plants, medical
devices) can be dangerous.
5. Legal and compliance issues – Companies may face audits, fines, or legal trouble for
inaccurate records.

Real-Life Incidents Where Integrity Breaks

1. Stuxnet Attack (2010)

 Virus changed machine data in Iran’s nuclear plant.


 Made machines fail while showing everything was fine.

2. Volkswagen Scandal (2015)

 Software faked pollution test results in cars.


 Data was altered to show false emissions.
3. Equifax Breach (2017)

 Hackers accessed credit data.


 Risk of data being changed or damaged.

Availability

Definition: Availability means that data, systems, and services are always ready and working when
users need them — without delays or downtime.

Importance of Availability

 Keeps websites, apps, and services running 24/7


 Ensures business continuity and smooth operations
 Prevents downtime, loss of money, and frustrated users
 Essential for critical systems like banking, healthcare, and emergency services

Types of Availability

Type Description
System Availability Servers, networks, and software are up and responsive
Data Availability Files and information are accessible when needed
Network Availability Internet and internal networks work without interruption
Service Availability Applications and online services are available to users

Applications of Availability

 Banking apps working without interruption


 Online shopping sites being open 24/7
 Emergency services systems (e.g., 911 or ambulance dispatch)
 Healthcare systems accessing patient data quickly
 Educational platforms running smoothly during online exams or classes

What If Availability Fails?

1. Users can’t access data or services – causing delays or losses


2. Business operations stop – leading to financial damage
3. Reputation damage – users lose trust in the system
4. Emergency systems fail – which could even cost lives
5. Legal or contractual penalties – if uptime commitments are not met

Real-Life Incidents Where Availability Broke

Incident What Happened


Amazon Web Services (AWS) Major apps and websites went down for hours due to a server issue
Outage (2020)
Facebook Outage (2021) Facebook, Instagram, and WhatsApp were unavailable for 6+ hours
due to DNS configuration error
Delta Airlines IT Outage (2016) System crash grounded hundreds of flights, causing global travel
disruptions
Bank Network Downtime Various banks have faced ATM and online service outages during
peak hours

Authentication

Definition : Authentication is the process of verifying the identity of a user, device, or system
before allowing access to data or resources.

Importance of Authentication

 Prevents unauthorized access to systems and data


 Protects user accounts, emails, bank apps, etc.
 Supports confidentiality, integrity, and availability
 Helps in tracking user actions (accountability)

Types of Authentication

Type Description
Password-based Username + password (most common)
Two-Factor Authentication (2FA) Password + another method (e.g., OTP or app code)
Biometric Authentication Uses fingerprint, face, or retina scan
Token-based Uses physical or digital tokens to verify identity
Certificate-based Uses digital certificates (common in secure websites and email)
Single Sign-On (SSO) One login gives access to multiple systems

Applications of Authentication

 Email accounts (Gmail, Outlook)


 Banking apps (PIN, biometrics, OTP)
 Social media platforms (Facebook, Instagram)
 Workplace systems (Employee login portals)
 Online exams and education platforms
 Secure websites (HTTPS with certificates)

What If Authentication Fails?

1. Unauthorized access – Hackers can log in to your accounts


2. Data theft or leaks – Sensitive data can be stolen or misused
3. Financial fraud – Bank accounts and payments can be hijacked
4. Loss of trust – Users lose confidence in a system’s security
5. Legal issues – Businesses may face fines for poor security

Real-Life Incidents Where Authentication Broke

Incident What Happened


Twitter Hack (2020) Attackers used social engineering to bypass authentication and take over
celebrity accounts
Yahoo Breach (2013–14) Weak password storage and security led to 3 billion accounts being
compromised
Facebook Credential Leak Hundreds of millions of passwords were stored in plain text and
(2019) exposed internally
SolarWinds Attack (2020) Weak internal authentication allowed attackers to insert malware into
software updates

Non-repudiation
Non-repudiation means ensuring that a person or system cannot deny having performed an
action, such as sending a message, signing a document, or making a transaction.

Importance of Non-Repudiation

 Ensures accountability in digital actions


 Prevents users from denying their actions later
 Supports legal evidence in online agreements or transactions
 Builds trust in communication and digital systems
 Essential for auditing and dispute resolution

Types of Non-Repudiation

Type Description
Non-repudiation of Origin Proves that a message or data truly came from a specific sender
Non-repudiation of Receipt Confirms that a recipient actually received the message or data
Non-repudiation of Confirms that data was submitted to a system or service (e.g., e-form
Submission submission)
Non-repudiation of Ensures that data was successfully delivered (e.g., email receipts or
Delivery server logs)

Applications of Non-Repudiation

 Digital signatures in contracts and legal documents


 Email receipts for confirming message delivery
 Online transactions and banking (e.g., UPI confirmation)
 E-commerce purchases (proof of order and payment)
 Voting systems in online elections
 Audit trails in system logs

What If Non-Repudiation Fails?

1. Users can deny sending or receiving messages


2. Fraudulent transactions may go untraceable
3. Legal disputes become harder to resolve
4. Lack of trust in digital systems
5. Difficulty in tracking cybercriminals

Real-Life Incidents Where Non-Repudiation Broke

Incident What Happened


Email Spoofing Attacks Attackers forge sender identities, and the real sender can deny
involvement
Online Fraud Cases Fraudsters claim they didn’t make a transaction due to weak
logging or no digital signature
Sony PlayStation Hack (2011) Weak evidence made it hard to trace attacker actions and prove
user activity
Adobe Document Signature Vulnerability allowed attackers to change signed PDF content
Flaws (2019) without invalidating signature

Access control

Access Control is the process of deciding who can access what — and what they’re allowed to do
with it (view, edit, delete, etc.).

Importance of Access Control

 Prevents unauthorized access to systems and data


 Helps protect sensitive information from misuse
 Supports confidentiality, integrity, and availability
 Ensures accountability by controlling and logging access
 Required for regulatory compliance (e.g., GDPR, HIPAA)

Types of Access Control

Type Description
Discretionary Access Control The data owner decides who gets access
(DAC)
Mandatory Access Control (MAC) Access is set by strict rules and security levels (e.g.,
government systems)
Role-Based Access Control (RBAC) Access is based on a user’s job role (e.g., manager, HR)
Attribute-Based Access Control Access is based on attributes like time, location, department,
(ABAC) etc.

Applications of Access Control

 Login systems for websites and apps


 Employee access to files and folders in organizations
 Admin vs. user rights in computer systems
 Healthcare systems – only doctors can view patient data
 Cloud services – controlling who can access what files
 Banking apps – restricting who can approve or view transactions

What If Access Control Fails?

1. Unauthorized users can access sensitive data


2. Insider threats – employees may see or change things they shouldn’t
3. Data theft or manipulation
4. Loss of customer trust and legal issues
5. Full system compromise if admin controls are breached

Real-Life Incidents Where Access Control Broke

Incident What Happened


Facebook Internal Data Access Employees had access to millions of users’ passwords stored in
(2018) plain text
Capital One Data Breach Poor access control on AWS led to access of 100M+ customer
(2019) records
Twitter Employee Access Employees misused internal tools to access VIP accounts
Abuse (2020)
Snowden NSA Leak (2013) Edward Snowden accessed and leaked classified data due to weak
access restrictions
Incident Response

Incident Response is the process of detecting, investigating, and responding to cybersecurity


incidents (like hacks, data breaches, malware attacks) to reduce damage and recover quickly.

Importance of Incident Response

 Helps minimize damage during a cyberattack


 Reduces recovery time and cost
 Ensures quick containment and control of threats
 Maintains trust and business continuity
 Required for compliance with security regulations (e.g., ISO, NIST, GDPR)

Types of Incident Response Activities

Type Description
Preparation Creating a plan, tools, and trained team before an incident happens
Detection and Analysis Identifying and understanding the threat or breach
Containment Isolating affected systems to stop the spread
Eradication Removing the root cause (e.g., malware, vulnerabilities)
Recovery Restoring systems and operations to normal
Post-Incident Review Learning from the attack to improve future response

Applications of Incident Response

 Responding to malware or ransomware infections


 Handling phishing attacks on employee emails
 Reacting to unauthorized system access
 Investigating suspicious network behavior
 Recovering from DDoS or server shutdowns
 Creating audit reports after a breach

What If Incident Response Fails?

1. Wider spread of attacks – more systems and data get compromised


2. Increased financial loss and downtime
3. Delayed detection of breaches
4. Poor recovery and loss of critical data
5. Reputation and legal damage

Real-Life Incidents Where Incident Response Was Weak or Delayed

Incident What Happened


Equifax Breach (2017) Took months to detect and respond — 147 million records
exposed
Target Breach (2013) Slow response to alerts led to theft of 40 million credit card
numbers
Sony Pictures Hack (2014) Response was not fast enough to prevent major data leak and
system destruction
Colonial Pipeline Ransomware Attack caused shutdown of oil supply; late response worsened the
(2021) crisis

Risk Management

Definition: Risk Management is the process of identifying, assessing, and reducing cybersecurity
risks to protect systems, data, and operations.

“Find the risks, understand them, and stop them before they cause damage.”

Importance of Risk Management

 Helps prevent cyberattacks and data loss


 Protects business operations and customer trust
 Saves time, money, and resources
 Helps in meeting legal and security compliance
 Allows better decision-making and planning

Types of Cybersecurity Risks

Risk Type Example


Operational Risk System failure, outdated software
Technical Risk Weak passwords, software bugs
Human Risk Phishing, employee mistakes
Physical Risk Theft or damage of hardware
Legal/Compliance Risk Not following data protection laws

Applications of Risk Management

 Identifying vulnerabilities in networks and systems


 Performing security audits and assessments
 Setting up controls and firewalls to reduce risk
 Creating incident response plans
 Deciding what risks to accept, reduce, or avoid
 Buying cyber insurance as risk transfer

What If Risk Management Fails?

1. Cyberattacks go undetected
2. Loss of sensitive data or money
3. Business shutdown or disruption
4. Legal penalties and investigations
5. Damage to brand and customer trust

Real-Life Incidents Where Risk Management Failed


Incident What Happened
Equifax Breach (2017) Failed to patch known software vulnerability; 147M records stolen
Target Breach (2013) Ignored early alerts; hackers accessed customer payment data
Maersk Ransomware Attack No strong backup or protection; global shipping was disrupted
(2017)
Capital One Breach (2019) Misconfigured firewall in cloud environment exposed 100M+
customer records

Security awareness

Definition: Security Awareness means educating and training people (especially employees) to
recognize, avoid, and respond to cyber threats like phishing, malware, or social engineering.

“Knowing what to do — and what not to do — to stay safe online.”

Importance of Security Awareness

 Prevents human errors, which are the biggest cause of cyberattacks


 Helps identify phishing emails, suspicious links, or scams
 Builds a security-first culture in organizations
 Reduces risk of data breaches and insider threats
 Ensures compliance with security policies and laws

Types of Security Awareness

Type Focus Area


Phishing Awareness Spotting fake emails or websites
Password Security Using strong, unique passwords and 2FA
Social Engineering Awareness Avoiding manipulation or trickery from attackers
Device & Data Protection Safe handling of files, USBs, and mobile devices
Physical Security Preventing unauthorized physical access to systems
Applications of Security Awareness

 Training programs for employees


 Security posters and emails in offices
 Simulated phishing attacks to test awareness
 Workshops and online courses
 Onboarding sessions for new staff
 Cybersecurity awareness month campaigns

What If Security Awareness Fails?

1. Employees fall for phishing scams


2. Weak passwords and poor data handling
3. Increased risk of insider threats
4. Financial loss and system compromise
5. Legal trouble for non-compliance

Real-Life Incidents Where Security Awareness Failed

Incident What Happened


Twitter Hack (2020) Attackers tricked employees into giving internal access
Google and Facebook Scam Employees were tricked via phishing emails; $100M+ lost
(2013–15)
Sony Pictures Hack (2014) Employees clicked on malicious links; major data leaked
Ubiquiti Networks (2021) Phishing email led to $46M wire fraud due to poor employee
awareness

You might also like