Roman Saini is teaching live on Unacademy Plus
CYBER SECURITY Presented By ROMAN SAINI
IN THIS LESSON Introduction . Concept of Cyber Security . Elements Of Cyber Security . Cyber Threats Cyber Attackers Categories of Cyber Crime
INTRODUCTION Rapid and unprecedented growth of Information and Communication Technology (ICT) and media with its all-pervasive penetration has ushered in the digital age. Not only has it brought the world together through globalisation, it has become the driver for economic growth. Technology and Information have become the new mantras of this digital transformation .We are witnessing a connected world with new business and cultural orientation. Business is being transacted at the speed of light with billions of dollars transferred every day across the globe.
This transition from an industrial to an information era has created a new domain, "Cyberspace" and ushered in a new security paradigm with new threats to both national and human security. With large scale automation, rapid penetration of ICT and connectivity the developed nations are enjoying a much better quality of life that also makes them more vulnerable to cyber interventions. There exists a definite digital divide amongst the developed, developing and poor nations. This digital divide, coupled with the rising aspirations, easy access and low cost of ICT have created serious security issues wherein new threats by way of cyber-crime, cyber terrorism, cyber espionage and even cyber war have emerged making cyber security a strategic imperative at the national, regional and international levels. . .
CONCEPT OF CYBER SECURITY Cyber security or information technology security are the techniques of protecting computers, networks, programs and data from unauthorized access or attacks that are aimed for exploitation. Cyber security includes controlling physical access to system hardware, as well as protecting against harm that may be done via network access, malicious data and code injection. The field is of growing importance due to increasing reliance on computer systems, the Internet and wireless networks such as Bluetooth and Wi-Fi . Due to the growth of "smart" devices, including smartphones televisions and the various tiny devices that constitute the Internet of Things
Elements of Cyber Security Ensuring cyber security requires the coordination of efforts throughout an information system, which includes: Application security Information security Network security .Disaster recovery Application security Application security is the use of software, hardware, and procedural methods to protect applications from external threats.
Information security Protection of information and its critical elements, including the system:s and hardware that use, store, or transmit that information. Network Security It is the protection of networking components, connections, and contents. Disaster recovery It is a process that includes performing risk assessment, establishing priorities, developing recovery strategies in case of a disaster.
Cyber Threats Cyber threats present some unique challenges, when compared to its more conventional counterparts like a war or a terrorist attack. One, it is near impossible to detect the exact origin as attackers tend to use hijacked systems or networks as proxies to launch an attack, in other words, the enemy is invisible. . Two, in the matter of a few hours, it can spread across countries, causing widespread damage and potentially crippling critical digital infrastructure. So, the impact is not localized. Three, cyber attacks do not require access to expensive arms or military technology. Even a high school dropout with self-taught unethical hacking skills sitting with a run-down smartphone or tablet in a caf can wreak large-scale havoc
The Cyber Attackers .Terrorists Hackers . Hostile Nations Disgruntled Employees Criminal Groups Hacktivist
Categories of Cyber Crime Cyber- crimes are broadly categorized into three categories, namely crime against: Individual Property Government Individual: This type of cyber- crime can be in the form of cyber stalking, distributing pornography or religiously sensitive material, trafficking, recruitment for unlawful activities including terrorism, propaganda and dissemination of offensive material . Such activities have a direct impact on "Human Security". Law enforcement agencies are taking this category of cyber- crime very seriously and are joining forces internationally to reach and arrest the perpetrators.
Government: Although not as common as the other two categories, crimes against a government are referred to as cyber terrorism If successful, this category can wreak havoc and cause panic amongst the civilian population. In this category, criminals hack government websites, military websites or circulate propaganda. The perpetrators can be terrorist outfits, non-state actors or unfriendly governments of other nations.