Cyber Security is the body of technologies, processes, and practices designed to protect
networks, devices, programs, and data from attack, theft, damage, modification, or unauthorized
access.
This includes using special programs to check for harmful software and learning how to
recognize and avoid online scams
It’s also known as Information Security (INFOSEC), Information Assurance (IA), or System
Security.
Cyber Security proper began in 1972 with a research project on ARPANET (The Advanced
Research Projects Agency Network), a precursor to the internet. ARPANET developed protocols
for remote computer networking.
Different Types of Cybersecurity
Network Security
Focuses on securing computer networks from unauthorized access, data breaches, and other
network-based threats. It involves technologies such as Firewalls, Intrusion detection
systems (IDS), Virtual private networks (VPNs), and Network segmentation.
Application Security
Concerned with securing software applications and preventing vulnerabilities that could be
exploited by attackers. It involves secure coding practices, regular software updates and patches,
and application-level firewalls.
Information or Data Security
Focuses on protecting sensitive information from unauthorized access, disclosure, alteration, or
destruction. It includes Encryption, Access controls, Data classification, and Data loss prevention
(DLP) measures.
Promoting security awareness among users is essential for maintaining information security. It
involves educating individuals about common security risks, best practices for handling sensitive
information, and how to identify and respond to potential threats like phishing attacks or social
engineering attempts.
Cloud Security
It involves securing data, applications, and infrastructure hosted on cloud platforms, and
ensuring appropriate access controls, data protection, and compliance. It uses various cloud
service providers such as AWS, Azure, Google Cloud, etc., to ensure security against multiple
threats.
Internet of Things (IoT) Security
Devices frequently run on old software, leaving them vulnerable to recently identified security
vulnerabilities. This is generally the result of connectivity problems or the requirement for end
users to manually download updates from a C&C center.
Cryptography is a technique of securing information and communications through the use of
codes so that only those persons for whom the information is intended can understand and
process it. Thus preventing unauthorized access to information. The prefix “crypt” means
“hidden” and the suffix “graphy” means “writing”. In Cryptography, the techniques that are
used to protect information are obtained from mathematical concepts and a set of rule-based
calculations known as algorithms to convert messages in ways that make it hard to decode
them. These algorithms are used for cryptographic key generation, digital signing, and
verification to protect data privacy, web browsing on the internet and to protect confidential
transactions such as credit card and debit card transactions.
Features Of Cryptography
Confidentiality: Information can only be accessed by the person for whom it is intended and
no other person except him can access it.
Integrity: Information cannot be modified in storage or transition between sender and intended
receiver without any addition to information being detected.
Non-repudiation: The creator/sender of information cannot deny his intention to send
information at a later stage.
Authentication: The identities of the sender and receiver are confirmed. As well
destination/origin of the information is confirmed.
Interoperability: Cryptography allows for secure communication between different systems
and platforms.
Adaptability: Cryptography continuously evolves to stay ahead of security threats and
technological advancements.
Types of Cryptography Algorithm
Advanced Encryption Standard (AES): AES (Advanced Encryption Standard) is a popular
encryption algorithm which uses the same key for encryption and decryption It is a symmetric
block cipher algorithm with block size of 128 bits, 192 bits or 256 bits. AES algorithm is
widely regarded as the replacement of DES (Data encryption standard) algorithm.
RSA: RSA is an basic asymmetric cryptographic algorithm which uses two different keys for
encryption. The RSA algorithm works on a block cipher concept that converts plain text into
cipher text and vice versa.
Secure Hash Algorithm (SHA): SHA is used to generate unique fixed-length digital
fingerprints of input data known as hashes. SHA variations such as SHA-2 and SHA-3 are
commonly used to ensure data integrity and authenticity. The tiniest change in input data
drastically modifies the hash output, indicating a loss of integrity. Hashing is the process of
storing key value pairs with the help of a hash function into a hash table.
Data Encryption
Data Encryption is a method of preserving data confidentiality by transforming it into
ciphertext, which can only be decoded using a unique decryption key produced at the time of
the encryption or before it. The conversion of plaintext into ciphertext is known as encryption.
Types of Data Encryption
There are multiple encryption techniques, each of which have been developed with various
security requirements in mind. Symmetric and Asymmetric encryption are the two types of
data encryption.
1. Symmetric Key Encryption
There are a few strategies used in cryptography algorithms. For encryption and decryption
processes, some algorithms employ a unique key. In such operations, the unique key must be
secured since the system or person who knows the key has complete authentication to decode
the message for reading. This approach is known as “symmetric encryption” in the field of
network encryption.
2. Asymmetric Key Encryption
Some cryptography methods employ one key for data encryption and another key for data
decryption. As a result, anyone who has access to such a public communication will be unable
to decode or read it. This type of cryptography, known as “public-key” encryption, is used in
the majority of internet security protocols. The term “asymmetric encryption” is used to
describe this type of encryption.