Cyber Security UNIT-1
Cyber Security UNIT-1
Cyberspace can be viewed as three layers (physical, logical, and social) made up of five
components (geographic, physical network, logical network, cyber persona, and persona).
Physical:
The physical layer includes the geographic component and the physical network component.
The geographic component is the physical location of elements of the network. While
geopolitical boundaries can easily be crossed in cyberspace at a rate approaching the speed of
light, there is still a physical aspect tied to the other domains. The physical network
component includes all the hardware and infrastructure (wired, wireless, and optical) that
supports the network and the physical connectors (wires, cables, radio frequency, routers,
servers, and computers)
Logical:
The logical layer contains the logical network component, which is technical and consists of
the logical connections that exist between network nodes. Nodes are any devices connected to
a computer network. Nodes can be computers, personal digital assistants, cell phones, or
various other network appliances. On an Internet protocol (IP) network, a node is any device
with an IP address.
Social:
The social layer comprises the human and cognitive aspects, including the cyber persona and
persona components. The cyber persona component includes a person’s identification or
persona on the network (e-mail address, computer IP address, cell phone number, and others).
The persona component consists of the people actually on the network. An individual can
have multiple cyber personas (for example, different e-mail accounts on different computers)
and a single cyber persona can have multiple users.
World Wide Web (WWW): The World Wide Web is based on several different
technologies: Web browsers, Hypertext Markup Language (HTML), and Hypertext
Transfer Protocol (HTTP).
Web Browser: The web browser is an application software to explore www (World
Wide Web). It provides an interface between the server and the client and requests to the
server for web documents and services.
Web Server: Web server is a program which processes the network requests of the users
and serves them with files that create web pages. This exchange takes place using
Hypertext Transfer Protocol (HTTP).
Web Pages: A webpage is a digital document that is linked to the World Wide Web and
viewable by anyone connected to the internet has a web browser.
Web Development: Web development refers to the building, creating, and maintaining
of websites. It includes aspects such as web design, web publishing, web programming,
and database management. It is the creation of an application that works over the internet
i.e. websites.
Frontend Development: The part of a website that the user interacts directly is termed as
front end. It is also referred to as the ‘client side’ of the application.
Frontend Languages: The front-end portion is built by using some languages which are
discussed below:
HTML: HTML stands for Hypertext Markup Language. It is used to design the front-
end portion of web pages using a markup language. HTML is the combination of
Hypertext and Markup language. Hypertext defines the link between the web pages.
The markup language is used to define the text documentation within the tag which
defines the structure of web pages.
CSS: Cascading Style Sheets fondly referred to as CSS is a simply designed language
intended to simplify the process of making web pages presentable. CSS allows you to
apply styles to web pages. More importantly, CSS enables you to do this independent of
the HTML that makes up each web page.
JavaScript: JavaScript is a famous scripting language used to create magic on the sites
to make the site interactive for the user. It is used to enhancing the functionality of a
website to running cool games and web-based software.
AJAX: Ajax is an acronym for Asynchronous Javascript and XML. It is used to
communicate with the server without refreshing the web page and thus increasing the
user experience and better performance.
Backend Development: Backend is the server side of a website. It is the part of the website
that users cannot see and interact. It is the portion of software that does not come in direct
contact with the users. It is used to store and arrange data..
Backend Languages: The back end portion is built by using some languages which are
discussed below:
PHP: PHP is a server-side scripting language designed specifically for web
development. Since PHP code executed on the server-side, so it is called a server-side
scripting language.
Node.js: Node.js is an open-source and cross-platform runtime environment for
executing JavaScript code outside a browser. You need to remember that NodeJS is not
a framework, and it’s not a programming language. Most people are confused and
understand it’s a framework or a programming language. We often use Node.js for
building back-end services like APIs like Web App or Mobile App. It’s used in
production by large companies such as Paypal, Uber, Netflix, Wallmart, and so on.
Python: Python is a programming language that lets you work quickly and integrate
systems more efficiently.
Ruby: Ruby is a dynamic, reflective, object-oriented, general-purpose programming
language. Ruby is a pure Object-Oriented language developed by Yukihiro Matsumoto.
Everything in Ruby is an object except the blocks but there are replacements too for it
i.e procs and lambda. The objective of Ruby’s development was to make it act as a
sensible buffer between human programmers and the underlying computing machinery.
Java: Java is one of the most popular and widely used programming languages and
platforms. It is highly scalable. Java components are easily available.
JavaScript: JavaScript can be used as both (front end and back end) programming.
Golang: Golang is a procedural and statically typed programming language having the
syntax similar to C programming language. Sometimes it is termed as Go Programming
Language.
C#: C# is a general-purpose, modern and object-oriented programming language
pronounced as “C sharp”.
DBMS: The software which is used to manage database is called Database
Management System (DBMS).
ARCHITECTURE OF CYBERSPACE:
Why is a cyber-security architecture needed?
Cloud
Networks
IoT
Endpoints
Mobile
Provides full visibility into an organization’s threat posture with a single, unified
management console
These pages are the primary component or building blocks of the WWW and are linked
through hyperlinks, which provide access from one specific spot in a hypertext or hypermedia
document to another spot within that document or a different one. Hyperlinks are another
defining concept of the WWW and provide its identity as a collection of interconnected
documents.
Most web documents and pages are created using Hypertext Mark-up Language (HTML), a
text-based way of describing how content within an HTML file is structured. HTML
describes the structure of web pages using elements or tags and displays the content of these
pages through a web browser.
To access one of these pages, a user and their client machine supply a universal identifier to
the web server via a browser. This identifier may be a uniform resource locator (URL) or
uniform resource identifier (URI) and is unique to each web page.
Originally, WWW was a what you see is what you get (WYSIWYG) hypertext
browser/editor that ran in the Next Step environment. In 1990, Berners-Lee demonstrated the
first web server and browser at CERN to explain his idea of a World Wide Web. The web
then entered the public eye in 1991 when Berners-Lee, who also developed hypertext,
announced his creation on the alt.hypertext newsgroup; at the same time, he created the
world's first web page with the address http://info.cern.ch/hypertext/WWW/TheProject.html.
The main difference between the World Wide Web and the Internet are:
The world wide web uses HTTP. The Internet uses IP Addresses.
Internet
The Internet is the foremost important tool and the prominent resource that is being used by
almost every person across the globe. It connects millions of computers, webpages,
websites, and servers. Using the internet we can send emails, photos, videos, and messages
to our loved ones. Or in other words, the Internet is a widespread interconnected network of
computers and electronic devices(that support Internet). It creates a communication
medium to share and get information online. If your device is connected to the Internet then
only you will be able to access all the applications, websites, social media apps, and many
more services. The Internet nowadays is considered the fastest medium for sending and
receiving information.
The hardware infrastructure of the Internet happens at layers 1 and 2 of the OSI model. Layer
1 provides the cable and radio wave media that interconnect devices, along with the network
interface controller (NIC) installed within the computing device to which media connects.
When formally connected to an Internet Protocol (IP)network the NIC becomes a node on
the network. Layer two of the OSI model provides the identification mechanisms for the
node. A computing device can have one or more than one NIC. For instance, your laptop may
be simultaneously connected to a network with both a wired Ethernet media & NIC and a
WiFi media & NIC, and your smartphone a cell radio wave media & NIC and also a WiFi
media & NIC. Each NIC is uniquely identifiable so that information is correctly disseminated
to the appropriate device. To direct the flow of information between nodes, there must be
an interconnect device or a combination of devices to facilitate communications. The only
exception is when two nodes use the NIC, node identifiers, and media to do direct peer-to-
peer communications.
Nodes interconnect with other nodes in different ways, depending on how far they reach
geographically, how many people are meant to use them, and who primarily owns or controls
them. Some cover a very small area and may be used for very specific devices, while others
are more general, cover larger areas, and are especially effective for use on the Internet.
The backbone of the Internet, that part serviced by Network Service Providers and Backbone
Providers, is constructed using a fiber optic cable infrastructure. To carry signals, rather than
using electrical signals, glass fibers are used to carry light, with upwards of a thousand fibers
being located within a single cable cladding. It is often the case that more fibers are included
within a cable than are needed at the time of installation (called dark fiber) to allow for
future growth without additional installation expense. Further, Wave Division Multiplexing
(WDM) is further used to allow multiple different wavelengths of light to be distributed on
each strand of fiber (multiplexed) and then later separated (de-multiplexed), transmitting
multiple communication streams simultaneously though a single light pulse. As technology
continues to improve, replacement of multiplexers for newer models is allowing for still
further data to be transferred over existing lines without additional installation expense of the
cables themselves. The data itself is transferred using pulses of light transmitted using light-
emitting diodes (LEDs) or small lasers. This can be done at very high speeds and over very
long distances with less susceptibility to interference. A few different techniques are used to
separate different wavelengths of light in ways that allow multiple communication streams,
each at high frequencies, supporting higher capacity in addition to high frequencies. This
opens up data transfer rates using fiber optics that are 20 to 1,000 times faster than cable and
outdoor WiFi Internet service and for a larger customer base. As Susan Crawford points out
in her 2018 book Fiber: The coming tech revolution—and why America might miss it, “If the
information-carrying capacity of copper wire is like a two-inch-wide pipe, fiber optic is like a
river fifteen miles wide.
Within the United States, most Internet Service Providers, on the other hand, make use of
existing communication technologies developed for phone and cable television to also
provide Internet access. Indeed, it has often been marketed as the “triple play,” a discounted
package providing these three at a discounted price compared to the purchase of each one
individually from the provider, or from several different providers. In some cases, a provider
primarily uses one technology, such as the cable Internet used by Xfinity/Comcast. On the
other hand, depending on geographic location you can get Internet service from AT&T via
copper Digital Subscriber Line (DSL) or fiber optics Internet lines, as well as via radio waves
through their wireless phone services.
For most homes, community organizations, and small office/home office contexts,
a gateway router is used that provides a WAN port used to connect the media leading to the
first router of the Internet Service Provider. While sometimes this WAN port may need to
first connect to a DSL/Cable modem or a fiber optics Optical Network Terminal (ONT), in
other cases this interconnect device is integrated into the router. Typically, a gateway router
will also incorporate both wired Ethernet switch and WiFi access point interconnect devices
for interconnectivity on the LAN side of the router. In addition, a gateway router typically
integrates a Dynamic Host Configuration Protocol (DHCP) server that dynamically or
statically assigns IP addresses to connected nodes on the LAN. The router will be configured
to route essential Internet “phone book” type lookups to a designated ISP or third-
party Domain Name System (DNS) server that contains a database of public IP
addresses and associated IP names. All of these additional services facilitate its core
function as the router between the LAN and the WAN.
INTERNET SOCIETY:
The Internet Society (ISOC) supports and promotes the development of the Internet as a
global technical infrastructure, as a resource to enrich people’s lives, and a force for good
in society.
Their work aligns with goals for the Internet to be open, globally-connected, secure, and
trustworthy. They do so by building and supporting communities that make the Internet
work; advancing the development and application of Internet infrastructure, technologies,
and open standards; and advocating for policy.
In 1991, the National Science Foundation (NSF) contract with the Corporation for National
Research Initiatives (CNRI) to operate the Internet Engineering Task Force (IETF) expired.
The then Internet Activities Board (IAB) sought to create a non-profit institution which could
take over the role. In 1992 Vint Cerf, Bob Kahn and Lyman Chapin announced the formation
of the Internet Society as "a professional society to facilitate, support, and promote the
evolution and growth of the Internet as a global research communications infrastructure,"
which would incorporate the IAB, the IETF, and the Internet Research Task Force (IRTF),
plus the organization of the annual INET meetings. By mid-2000, the Internet Society's
finances became precarious, and several individuals and organizations stepped forward to fill
the gap. Until 2001, there were also trustees elected by individual members of the Internet
Society. Those elections were "suspended" in 2001. This was ostensibly done as a fiscal
measure due to the perception that the elections were too expensive for the precarious
financial state of the organization. In later Bylaw revisions, the concept of individual
member-selected trustees went from "suspended" to being deleted altogether
In late 2001, leaders from Afilias (a domain name registry) approached the Internet Society
CEO Lynn St.Amour, to propose a novel partnership to jointly bid for the .org registry. In this
model, the Internet Society would become the new home of .org, and all technical and service
functions would be managed by Afilias. Afilias would pay for all bid expenses and would
contribute towards the Internet Society payroll while the bid was under consideration by
ICANN. The Internet Society Board approved this proposal at their Board meeting in 2001.
In 2002 ISOC successfully bid for the .org registry and formed the Public Interest
Registry (PIR), to manage and operate it.
In 2010, ISOC launched its first community network initiative to deploy five wireless mesh
based networks in rural locations across India.[21]
In 2012, on ISOC's 20th anniversary, it established the Internet Hall of Fame, an award to
"publicly recognize a distinguished and select group of visionaries, leaders, and luminaries
who have made significant contributions to the development and advancement of the global
Internet".
In 2016 Deploy 360 extended its campaigns to include Mutually Agreed Norms for Routing
Security(MANRS) and DNS-based Authentication of Named Entities (DANE).
.
REGULATION OF CYBERSPACE:
The following are the proposed models of cyberspace regulation :
The use of code and architecture for regulating cyberspace. They believe that since internet
was invented for research and not for commerce, its founding protocols are inherently
unsecure and are primarily designed for sharing the data, rather than concealing it. This
provides a breeding ground for cybercrime activities.
However, it is argued by these scholars that the internet is, by far, the most reliable space,
since, through its architecture, it can reveal who someone is, where they are and what they
are doing. The code and architecture of the technology can very easily help in identifying the
wrongdoer by tracing the Internet Protocol (IP) address of the computer used for the
commission of cybercrime.
However, merely relying on codes and architecture can, although help in identifying the
cybercriminal, but it will not play a key role in preventing cybercrimes and ensuring
prosecution of such cybercriminals.
However, the model of governance where just the government is responsible for regulating
the cyberspace fails to take into consideration the ineffectiveness of government in
addressing the issues faced in the real world. If the state is not competent to regulate its
territorial limits itself, how can it be expected to single-handedly regulate the cyberspace,
which has no territorial limits. Further, the state might not have appropriate strategies to
tackle these issues, owing to the technical nature of such activities.
Cyber Security Basics: Cyber security is the most concerned matter as cyber threats and
attacks are overgrowing. Attackers are now using more sophisticated techniques to target the
systems. Individuals, small-scale businesses or large organization, are all being impacted. So,
all these firms whether IT or non-IT firms have understood the importance of Cyber Security
and focusing on adopting all possible measures to deal with cyber threats. What is cyber
security? "Cyber security is primarily about people, processes, and technologies working
together to encompass the full range of threat reduction, vulnerability reduction, deterrence,
international engagement, incident response, resiliency, and recovery policies and activities,
including computer network operations, information assurance, law enforcement, etc.
OR
cyber security is the body of technologies, processes, and practices designed to protect
networks, computers, programs and data from attack, damage or unauthorized access.
The term cyber security refers to techniques and practices designed to protect digital data.
The data that is stored, transmitted or used on an information system. OR Cyber security is
the protection of Internet-connected systems, including hardware, software, and data from
cyber attacks. It is made up of two words one is cyber and other is security.
Cyber is related to the technology which contains systems, network and programs or data.
Whereas security related to the protection which includes systems security, network security
and application and information security. Why is cyber security important? Listed below are
the reasons why cyber security is so important in what’s become a predominant digital world:
In addition to financial damage suffered by the business, a data breach can also inflict
untold reputational damage.
Cyber-attacks these days are becoming progressively destructive. Cybercriminals are using
more sophisticated ways to initiate cyber attacks.
Regulations such as GDPR are forcing organizations into taking better care of the personal
data they hold. Because of the above reasons, cyber security has become an important part of
the business and the focus now is on developing appropriate response plans that minimize the
damage in the event of a cyber-attack. But, an organization or an individual can develop a
proper response plan only when he has a good grip on cyber security fundamentals.
Confidentiality:
Integrity
Availability
Availability is making sure that authorized parties are able to access the information when
needed. Standard measures to guarantee availability include: Backing up data to external
drives Implementing firewalls Having backup power supplies Data redundancy
Issues :
1. Social Engineering
2. Third-Party Exposure
3. Configuration Mistakes
4. Poor Cyber Hygiene
5. Cloud Vulnerabilities
6. Mobile Device Vulnerabilities
7. Internet of Things
8. Ransom ware
9. Poor Data Management
10. Inadequate Post-Attack Procedures
CYBER SECURITY CHALLENGES
Today cybersecurity is the main component of the country's overall national security and
economic security strategies. In India, there are so many challenges related to cybersecurity.
With the increase of the cyber-attacks, every organization needs a security analyst who makes
sure that their system is secured. These security analysts face many challenges related to
cybersecurity such as securing confidential data of government organizations, securing the
private organization servers, etc.
1. Ransomware Evolution
Ransomware is a type of malware in which the data on a victim's computer is locked, and
payment is demanded before the ransomed data is unlocked. After successful payment, access
rights returned to the victim. Ransomware is the bane of cybersecurity, data professionals, IT,
and executives.
Ransomware attacks are growing day by day in the areas of cybercrime. IT professionals and
business leaders need to have a powerful recovery strategy against the malware attacks to
protect their organization. It involves proper planning to recover corporate and customers'
data and application as well as reporting any breaches against the Notifiable Data Breaches
scheme. Today's DRaaS solutions are the best defence against the ransomware attacks. With
DRaaS solutions method, we can automatically back up our files, easily identify which
backup is clean, and launch a fail-over with the press of a button when malicious attacks
corrupt our data.
2. Blockchain Revolution
Blockchain technology is the most important invention in computing era. It is the first time in
human history that we have a genuinely native digital medium for peer-to-peer value
exchange. The blockchain is a technology that enables cryptocurrencies like Bitcoin. The
blockchain is a vast global platform that allows two or more parties to do a transaction or do
business without needing a third party for establishing trust.
It is difficult to predict what blockchain systems will offer in regards to cybersecurity. The
professionals in cybersecurity can make some educated guesses regarding blockchain. As the
application and utility of blockchain in a cybersecurity context emerges, there will be a
healthy tension but also complementary integrations with traditional, proven, cybersecurity
approaches.
3. IoT Threats
IoT stands for Internet of Things. It is a system of interrelated physical devices which can be
accessible through the internet. The connected physical devices have a unique identifier
(UID) and have the ability to transfer data over a network without any requirements of the
human-to-human or human-to-computer interaction. The firmware and software which is
running on IoT devices make consumer and businesses highly susceptible to cyber-attacks.
When IoT things were designed, it is not considered in mind about the used in cybersecurity
and for commercial purposes. So every organization needs to work with cybersecurity
professionals to ensure the security of their password policies, session handling, user
verification, multifactor authentication, and security protocols to help in managing the risk.
4. AI Expansion
It is an area of computer science which is the creation of intelligent machines that do work
and react like humans. Some of the activities related to artificial intelligence include speech
recognition, Learning, Planning, Problem-solving, etc. The key benefits with AI into our
cybersecurity strategy has the ability to protect and defend an environment when the
malicious attack begins, thus mitigating the impact. AI take immediate action against the
malicious attacks at a moment when a threats impact a business. IT business leaders and
cybersecurity strategy teams consider AI as a future protective control that will allow our
business to stay ahead of the cybersecurity technology curve.
The serverless apps do nothing to keep the attackers away from our data. The serverless
application doesn't help if an attacker gains access to our data through a vulnerability such as
leaked credentials, a compromised insider or by any other means then serverless.
We can run software with the application which provides best chance to defeat the
cybercriminals. The serverless applications are typically small in size. It helps developers to
launch their applications quickly and easily. They don't need to worry about the underlying
infrastructure. The web-services and data processing tools are examples of the most common
serverless apps.