0% found this document useful (0 votes)
33 views31 pages

Module 1

Cryptography and Cyber Security

Uploaded by

sadhana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views31 pages

Module 1

Cryptography and Cyber Security

Uploaded by

sadhana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 31

Cryptography and Cyber Security

Subject Code: 23MCPE5263


Course Learning Objectives:
This course is designed to:Th c
1. To learn basic concepts of Computer security and cryptography
and understand various Symmetric and Asymmetric
cryptographic algorithms.
2. To gain knowledge of public-key cryptography and understand
Message Authentication Algorithms and Hash Functions.
3. To familiarize various types of cyber-attacks and cyber-crimes
and give an overview of the cyber laws.
4. To study cyber security challenges and implications and know
about Cyber Crime.
What is Cyber Security?

 Definition of Cyber Security


 Cyber security refers to the practice of protecting
systems, networks, and programs from digital attacks.
 These cyber attacks are usually aimed at accessing,
changing, or destroying sensitive information, extorting
money from users, or interrupting normal business
processes.
Importance of Cyber Security in Today's Digital Age

 Increasing Dependence on Digital Systems


 Growing Threat Landscape
 Data Protection
 Financial Consequences
 Regulatory Compliance
 Reputation Management
Importance of Cyber Security in Today's Digital Age

 Increasing Dependence on Digital Systems


 Our reliance on technology for everyday activities has skyrocketed.
 From personal communications to financial transactions and critical
infrastructure, digital systems play a crucial role.
 Growing Threat Landscape
 Cyber threats are becoming more sophisticated and widespread.
 Attackers use advanced techniques to breach security measures,
making it essential to stay ahead with robust cyber security
practices.
Importance of Cyber Security in Today's Digital Age

 Data Protection
 Personal and organizational data is valuable.
 Protecting this data from breaches is critical to maintain privacy
and trust.
 Financial Consequences
 Cyber attacks can lead to significant financial losses.
 This includes direct theft, ransom payments, and the costs
associated with mitigating breaches and restoring systems.
Importance of Cyber Security in Today's Digital Age

 Regulatory Compliance
 Many industries are subject to regulations that mandate stringent
data protection measures.
 Non-compliance can result in hefty fines and legal consequences.
 Reputation Management
 A cyber attack can severely damage an organization’s
reputation, leading to loss of customer trust and business
opportunities.
The Need for Cyber Security

 Growing Threats

1. Increase in Cyber Attacks


Statistics: The number of cyber attacks is rising every
year.
According to various reports, there has been a
significant increase in the frequency and sophistication
of cyber attacks.
The Need for Cyber Security

 Growing Threats

2. Types of Cyber Threats:


 Malware: Malicious software designed to disrupt,
damage, or gain unauthorized access to computer systems.
Examples include viruses, worms, and Trojans.
 Phishing: Fraudulent attempts to obtain sensitive
information by disguising as a trustworthy entity in
electronic communications.
The Need for Cyber Security
 Growing Threats
2. Types of Cyber Threats:

Ransomware: A type of malware that encrypts the


victim's files, and the attacker demands a ransom to
restore access.
DDoS Attacks: Distributed Denial of Service attacks
overwhelm a system with traffic, causing it to become
unusable.
The Need for Cyber Security
 Impact of Cyber Attacks
1. Financial Losses
1. Direct Costs: Costs associated with the immediate response to a breach, such as incident response and remediation.
2. Indirect Costs: Longer-term financial impacts such as lost revenue, customer attrition, and increased operational costs.
3. Example: The 2017 WannaCry ransomware attack caused billions of dollars in damages worldwide.
2. Data Breaches and Loss of Privacy
1. Personal Data: Exposure of sensitive personal information such as social security numbers, credit card information, and
health records.
2. Corporate Data: Loss of proprietary information, trade secrets, and intellectual property.
3. Example: The Equifax data breach in 2017 exposed the personal information of approximately 147 million people.
3. Damage to Reputation
1. Trust Erosion: Customers lose trust in a company that cannot protect their data, leading to a damaged brand
reputation.
2. Market Impact: Public companies may see a decline in stock prices and market value following a significant breach.
3. Example: The Target data breach in 2013 resulted in a significant loss of customer trust and a decline in sales.
The Need for Cyber Security

 Impact of Cyber Attacks


1. Financial Losses
1. Direct Costs: Costs associated with the immediate response
to a breach, such as incident response and remediation.
2. Indirect Costs: Longer-term financial impacts such as lost
revenue, customer attrition, and increased operational costs.
3. Example: The 2017 WannaCry ransomware attack caused
billions of dollars in damages worldwide.
The Need for Cyber Security
 Impact of Cyber Attacks
2. Data Breaches and Loss of Privacy
1. Personal Data: Exposure of sensitive personal information such
as social security numbers, credit card information, and health
records.
2. Corporate Data: Loss of proprietary information, trade secrets,
and intellectual property.
3. Example: The Equifax data breach in 2017 exposed the personal
information of approximately 147 million people.
The Need for Cyber Security
 Impact of Cyber Attacks

3. Damage to Reputation
1. TrustErosion: Customers lose trust in a company that cannot
protect their data, leading to a damaged brand reputation.
2. Market Impact: Public companies may see a decline in stock
prices and market value following a significant breach.
3. Example: The Target data breach in 2013 resulted in a
significant loss of customer trust and a decline in sales.
Examples of High-Profile Cyber Attacks

1. Yahoo Data Breach (2013-2014)


1. Compromised accounts: All 3 billion Yahoo user accounts
were affected, making it one of the largest data breaches in
history.
2. Impact:Significant financial costs, legal repercussions,
and a drop in user trust.
Examples of High-Profile Cyber Attacks

2. Sony Pictures Hack (2014)


1. Attackers released confidential data including personal
information about employees, internal emails, and unreleased
films.
2. Impact: Financial losses, legal issues, and damage to Sony’s
reputation.
Examples of High-Profile Cyber Attacks

3. Colonial Pipeline Ransomware Attack (2021)


1. Attackersused ransomware to disrupt the operations of the
largest fuel pipeline in the United States.
2. Impact:
Fuel shortages, increased fuel prices, and a
ransom payment of $4.4 million (partially recovered later).
Why Cyber Security is Essential ?
1. Protection of Sensitive Data
 Safeguarding personal, financial, and health information
from unauthorized access and breaches.
2. Maintaining Business Continuity
 Ensuring that business operations can continue without
disruption from cyber attacks.
3. Compliance with Regulations
 Meeting legal and regulatory requirements to protect data
and avoid penalties.
Why Cyber Security is Essential ?
4. Preserving Customer Trust
 Demonstrating a commitment to security to maintain and
build customer confidence.
5. Preventing Financial Losses
 Reducing the risk of financial damages associated with
cyber attacks.
Security Approaches
 Cyber security involves a variety of approaches and strategies to protect
systems, networks, and data from attacks. These approaches can be
broadly categorized into preventive, detective, and corrective measures.
 Preventive Measures

1. Firewalls
 Function: Act as a barrier between a trusted internal network and
untrusted external networks (such as the internet).
 Types: Network firewalls, application firewalls, and next-generation
firewalls that combine multiple features.
Security Approaches

2. Antivirus and Anti-malware Software


 Function: Detect, prevent, and remove
malicious software from computers and
networks.
 Features: Real-time scanning, automatic
updates, and heuristic analysis to detect new
threats.
Security Approaches
3. Encryption
1. Function: Protects data by converting it into a coded format that can only
be read by someone with the correct decryption key.
2. Types: Symmetric encryption (same key for encryption and decryption)
and asymmetric encryption (public and private keys).
4. Regular Software Updates and Patches
1. Function: Fix security vulnerabilities and bugs in software.
2. Importance: Keeping software up-to-date prevents attackers from
exploiting known vulnerabilities.
Security Approaches
5. Access Controls
1. Function:Restrict access to systems and data based
on user roles and permissions.
2. Methods: Role-based access control (RBAC),
mandatory access control (MAC), and discretionary
access control (DAC).
Security Approaches
6. Security Awareness Training
1. Function:Educate employees about security policies,
procedures, and best practices.
2. Topics:
Phishing awareness, password management,
and recognizing social engineering attacks.
Detective Measures
1. Intrusion Detection Systems (IDS)
1. Function: Monitor network traffic for suspicious activity and
potential threats.
2. Types: Network-based IDS (NIDS) and host-based IDS (HIDS).
2. Security Information and Event Management (SIEM)
1. Function: Collect, analyze, and correlate security data from
multiple sources to identify potential threats.
2. Features: Real-time monitoring, alerting, and reporting.
Detective Measures
3. Log Analysis
1. Function: Reviewing logs from various systems and
applications to detect anomalies and security incidents.
2. Tools: Log management tools and centralized log servers.
4. Vulnerability Scanning
1. Function: Identifies security weaknesses and vulnerabilities
in systems and networks.
2. Types: Internal and external scans, network scans, and
application scans.
Corrective Measures

1. Incident Response Plans


1. Function: Provide a structured approach for handling security
incidents.
2. Components: Preparation, identification, containment, eradication,
recovery, and lessons learned.
2. Data Backups and Disaster Recovery
1. Function: Ensure data can be restored in case of data loss or
corruption.
2. Methods: Regular backups (full, incremental, differential), offsite
storage, and disaster recovery plans.
Corrective Measures

3. Patch Management
4. Function: Applying patches and updates to software and
systems to fix vulnerabilities.
5. Process: Identifying, testing, and deploying patches in a timely
manner.
4. Forensic Analysis
5. Function: Investigate and analyze security incidents to
understand the attack and mitigate future risks.
6. Tools: Digital forensics tools and techniques for examining
compromised systems.
Corrective Measures

5. Business Continuity Planning (BCP)


6. Function: Ensure that critical business functions
can continue during and after a security incident.
7. Components: Risk assessment, business impact
analysis, and continuity strategies.
Corrective Measures
Corrective Measures

You might also like