0% found this document useful (0 votes)
13 views2 pages

We

Cybersecurity involves protecting systems and data from threats like hacking and phishing, with various regulations and corporate policies in place to mitigate risks. Key challenges include data breaches, evolving threats, and lack of user awareness, while cybersecurity measures include firewalls, encryption, and two-factor authentication. The document also discusses the architecture of cyberspace and the importance of cloud security services in safeguarding digital assets.

Uploaded by

trjmeitei
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views2 pages

We

Cybersecurity involves protecting systems and data from threats like hacking and phishing, with various regulations and corporate policies in place to mitigate risks. Key challenges include data breaches, evolving threats, and lack of user awareness, while cybersecurity measures include firewalls, encryption, and two-factor authentication. The document also discusses the architecture of cyberspace and the importance of cloud security services in safeguarding digital assets.

Uploaded by

trjmeitei
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

1.

What do you mean by Explain the threats of cyber security in


cyber security? Explain the detail along with an
issues and the challenges Regulation of Cyberspace:..National example…Cybersecurity threats are
of cyber security. Laws: Governments enact malicious activities intended to
cybersecurity laws to protect users compromise the security of
Cyber Security refers to the practice of and data (e.g., India’s IT Act, information systems…Types of
protecting systems, networks, and 2000)…International Regulations: Cybersecurity Threats:…Phishing:
data from cyber threats such as Treaties and organizations like GDPR Fraudulent emails or messages trick
hacking, malware, ransomware, (EU) regulate data protection users into revealing sensitive
phishing, and data breaches. It globally….Corporate Policies: information…Example: A fake email
involves implementing technologies, Companies enforce security pretending to be from a bank asking
processes, and policies to secure measures through policies like for login credentials….Ransomware:
digital assets…Issues and Challenges firewalls and encryption…Example: Malicious software encrypts data and
of Cyber Security:..Data Breaches: The GDPR (General Data Protection demands ransom for
Unauthorized access to sensitive data Regulation) in the European Union decryption….Example: The WannaCry
can lead to financial and reputational ensures user privacy by regulating ransomware attack in 2017 affected
loss…Phishing Attacks: how companies collect and use thousands of organizations…Denial-
Cybercriminals trick individuals into personal data. of-Service (DoS) Attacks: Overloading
providing personal or financial a website with traffic to make it
information…Malware & What do you mean by the World Wide
inaccessible…Example: A
Ransomware: Malicious software can Web? Explain the World Wide Web
cybercriminal floods an e-commerce
disrupt systems or demand ransom to with its privacy, security, and blocking
site, making it crash during a
regain access…IoT Security Risks: features with examples.World Wide
sale….Man-in-the-Middle (MitM)
Weak security in smart devices makes Web (WWW) is a system of interlinked
Attack: Intercepting communication
them vulnerable to attacks…Lack of web pages and resources accessible
between two parties…Example:
Awareness: Many users are unaware via the internet. It operates using
Hackers intercept online banking
of cyber threats, leading to security HTTP/HTTPS protocols and is
transactions to steal
lapses…Evolving Threats: Hackers accessed through web
information…SQL Injection: Attackers
constantly develop new attack browsers…Privacy Features of
exploit vulnerabilities in databases to
methods, making defense WWW:..Private Browsing: Prevents
access confidential data..Example: A
challenging…Weak Authentication: browsers from storing history (e.g.,
hacker inserts malicious SQL code
Poor password management Chrome’s Incognito Mode)…Cookies
into a website’s login form to access
increases the risk of unauthorized Control: Users can manage or block
user data.
access. cookies that track online
activities…End-to-End Encryption: What do you mean by cloud security?
What do you mean by cyberspace? Services like WhatsApp ensure data Explain the different types of cloud
Explain the architecture and privacy…Security Features of security services in detail along with
regulation of cyberspace in detail WWW:..SSL/TLS Encryption: HTTPS an example…Cloud Security refers to
along with an example..Cyberspace encrypts data for secure the set of policies, technologies, and
refers to the virtual environment communication…Firewalls & controls designed to protect data,
created by computer networks, the Antivirus: Protect systems from cyber applications, and infrastructure in
internet, and digital communication threats…Two-Factor Authentication cloud computing environments.Types
technologies. It enables online (2FA): Adds an extra layer of of Cloud Security Services:…Identity
interactions, transactions, and data security..Blocking Features of and Access Management (IAM):
exchange…Architecture of WWW:..Content Filtering: Schools or Controls user access to cloud
Cyberspace:..Physical Layer: Includes organizations block access to harmful resources…Example: Multi-factor
hardware, data centers, servers, and websites…Geo-Blocking: Streaming authentication (MFA) in Google
network cables…Network Layer: services restrict content based on Cloud.Data Encryption: Protects
Handles data transmission through location…Parental Controls: Protect sensitive data stored or transmitted in
protocols like TCP/IP….Application children from inappropriate the cloud.hExample: AWS encrypts
Layer: Includes web services, email, content…Example: Google Safe stored data using AES-256 encryption.
and cloud applications…User Layer: Browsing alerts users about malicious
Represents individuals and websites to prevent cyber threats.
organizations interacting within
cyberspace.
1. Security Information and 1. Early Internet & Basic
Event Management (SIEM): Security (1990s):
Monitors cloud activities for
threats.
Example: AI-powered Cyber Threat
Firewalls and antivirus software were Intelligence (CTI) helps businesses
introduced. prevent cyberattacks by analyzing
Example: Microsoft Azure Sentinel patterns in internet traffic.
detects and prevents cyberattacks.
Basic encryption methods like SSL
were implemented.

2. Cloud Firewall: Protects


cloud-based applications 2. Growth of E-commerce &
from cyber threats. Banking (2000s):

Example: Cloudflare provides DDoS Online transactions led to the rise of


protection for websites. phishing and identity theft.

Two-factor authentication (2FA) was


introduced for banking security.

3. Disaster Recovery &


Backup: Ensures data
recovery in case of cyber
3. Social Media & Mobile
incidents.
Devices (2010s):

Example: Google Drive automatically


Increase in cyber threats like social
backs up user files.
engineering and mobile malware.

Cloud security measures became


essential.

4. AI & Advanced Threat


Detection (2020s –
4. Explain the advent of the Present):
internet used in cyber
security.
AI and machine learning help detect
cyber threats in real-time.
The advent of the internet
revolutionized cyber security, bringing
both advancements and challenges: Zero-trust security models and
blockchain enhance cybersecurity.

You might also like