Sign up now
to enroll in courses, follow best educators, interact with the community and track your progress.
Download
Basic Terminologies of Cybersecurity
19,869 plays

More
This lesson covers: Basic Terminologies of Cybersecurity.

Roman Saini is teaching live on Unacademy Plus

Roman Saini
Part of a great founding team at Unacademy with Gaurav, Hemesh. Movies, Guitar, Books, Teaching.

U
Unacademy user
madam plz tell the trick of syllogisms
Swapnil Agarwal
2 years ago
Please follow me as I'm working on a seperate course for syllogism
roman sir i m trying to follow your one year strategy..i m a govt emplpyee...i just want u to make one stop solution for a particular subject..so that we dont have to search for various resources.....as ancient.history by yasmin mam covers all about it and i think its sufficient.....i watched your you tube video on common mistakes by us....as usual uncomparable.....thats y i requested u for ds......thanks alot ...i had started from zero and seriously just because of unacademy i do develop a confidence n knowledge....so pls if u can make courses on all subject as a one stop solution for upsc
I have one small feedback, please assist the option for increasing playback speed more than 2x, it saves time during revision and when speed is more I think my brain is more alert. Sir please consider this suggestion it will help many.
Sunil Yadav
a year ago
I think Your app is not updated. Update it ,you will find that option.
Pankaj Kharra
a year ago
actually I am talking about speed more than 2x as mentioned in my previous comment and my app is up to date there is no option for playback speed more than 2x.
Sunil Yadav
a year ago
sorry,I didn't see more than
Sunil Yadav
a year ago
sorry,I didn't see more than
Sunil Yadav
a year ago
sorry,I didn't see more than
roman sir i m trying to follow your one year strategy..i m a govt emplpyee...i just want u to make one stop solution for a particular subject..so that we dont have to search for various resources.....as ancient.history by yasmin mam covers all about it and i think its sufficient.....i watched your you tube video on common mistakes by us....as usual uncomparable.....thats y i requested u for ds......thanks alot ...i had started from zero and seriously just because of unacademy i do develop a confidence n knowledge....so pls if u can make courses on all subject as a one stop solution for upsc
roman sir i m trying to follow your one year strategy..i m a govt emplpyee...i just want u to make one stop solution for a particular subject..so that we dont have to search for various resources.....as ancient.history by yasmin mam covers all about it and i think its sufficient.....i watched your you tube video on common mistakes by us....as usual uncomparable.....thats y i requested u for ds......thanks alot ...i had started from zero and seriously just because of unacademy i do develop a confidence n knowledge....so pls if u can make courses on all subject as a one stop solution for upsc
roman sir i m trying to follow your one year strategy..i m a govt emplpyee...i just want u to make one stop solution for a particular subject..so that we dont have to search for various resources.....as ancient.history by yasmin mam covers all about it and i think its sufficient.....i watched your you tube video on common mistakes by us....as usual uncomparable.....thats y i requested u for ds......thanks alot ...i had started from zero and seriously just because of unacademy i do develop a confidence n knowledge....so pls if u can make courses on all subject as a one stop solution for upsc
  1. CYBER SECURITY Presented By ROMAN SAINI


  2. IN THIS LESSON Introduction . Concept of Cyber Security . Elements Of Cyber Security . Cyber Threats Cyber Attackers Categories of Cyber Crime


  3. INTRODUCTION Rapid and unprecedented growth of Information and Communication Technology (ICT) and media with its all-pervasive penetration has ushered in the digital age. Not only has it brought the world together through globalisation, it has become the driver for economic growth. Technology and Information have become the new mantras of this digital transformation .We are witnessing a connected world with new business and cultural orientation. Business is being transacted at the speed of light with billions of dollars transferred every day across the globe.


  4. This transition from an industrial to an information era has created a new domain, "Cyberspace" and ushered in a new security paradigm with new threats to both national and human security. With large scale automation, rapid penetration of ICT and connectivity the developed nations are enjoying a much better quality of life that also makes them more vulnerable to cyber interventions. There exists a definite digital divide amongst the developed, developing and poor nations. This digital divide, coupled with the rising aspirations, easy access and low cost of ICT have created serious security issues wherein new threats by way of cyber-crime, cyber terrorism, cyber espionage and even cyber war have emerged making cyber security a strategic imperative at the national, regional and international levels. . .


  5. CONCEPT OF CYBER SECURITY Cyber security or information technology security are the techniques of protecting computers, networks, programs and data from unauthorized access or attacks that are aimed for exploitation. Cyber security includes controlling physical access to system hardware, as well as protecting against harm that may be done via network access, malicious data and code injection. The field is of growing importance due to increasing reliance on computer systems, the Internet and wireless networks such as Bluetooth and Wi-Fi . Due to the growth of "smart" devices, including smartphones televisions and the various tiny devices that constitute the Internet of Things


  6. Elements of Cyber Security Ensuring cyber security requires the coordination of efforts throughout an information system, which includes: Application security Information security Network security .Disaster recovery Application security Application security is the use of software, hardware, and procedural methods to protect applications from external threats.


  7. Information security Protection of information and its critical elements, including the system:s and hardware that use, store, or transmit that information. Network Security It is the protection of networking components, connections, and contents. Disaster recovery It is a process that includes performing risk assessment, establishing priorities, developing recovery strategies in case of a disaster.


  8. Cyber Threats Cyber threats present some unique challenges, when compared to its more conventional counterparts like a war or a terrorist attack. One, it is near impossible to detect the exact origin as attackers tend to use hijacked systems or networks as proxies to launch an attack, in other words, the enemy is invisible. . Two, in the matter of a few hours, it can spread across countries, causing widespread damage and potentially crippling critical digital infrastructure. So, the impact is not localized. Three, cyber attacks do not require access to expensive arms or military technology. Even a high school dropout with self-taught unethical hacking skills sitting with a run-down smartphone or tablet in a caf can wreak large-scale havoc


  9. The Cyber Attackers .Terrorists Hackers . Hostile Nations Disgruntled Employees Criminal Groups Hacktivist


  10. Categories of Cyber Crime Cyber- crimes are broadly categorized into three categories, namely crime against: Individual Property Government Individual: This type of cyber- crime can be in the form of cyber stalking, distributing pornography or religiously sensitive material, trafficking, recruitment for unlawful activities including terrorism, propaganda and dissemination of offensive material . Such activities have a direct impact on "Human Security". Law enforcement agencies are taking this category of cyber- crime very seriously and are joining forces internationally to reach and arrest the perpetrators.


  11. Government: Although not as common as the other two categories, crimes against a government are referred to as cyber terrorism If successful, this category can wreak havoc and cause panic amongst the civilian population. In this category, criminals hack government websites, military websites or circulate propaganda. The perpetrators can be terrorist outfits, non-state actors or unfriendly governments of other nations.