Professional Documents
Culture Documents
Introduction
Today man is able to send and receive any form of data may be an e-mail or an audio or video
just by the click of a button but did he ever think how securely his data ID being transmitted
or sent to the other person safely without any leakage of information? The answer lies in
cyber security. Today Internet is the fastest growing infrastructure in every day life. In today’s
technical environment many latest technologies are changing the face of the man kind. But
due to these emerging technologies we are unable to safeguard our private information in a
very effective way and hence these days cyber crimes are increasing day by day.
In today's world, where everything is becoming digital and connected, cybersecurity has
become essential. It's not just a fancy word; it's like a guardian for our modern lives. Imagine
we're exploring a vast digital landscape where the lines between the online and real world are
blurry. In this landscape, cybersecurity is like a guard, protecting not only our data but also
our way of life.
One might think cybersecurity is only for tech experts, but it's not. It affects all of us, from
how governments keep their secrets safe to how you protect your personal information and
money. Think about how fast technology is changing, and now we have things like the
Metaverse and the internet everywhere. We're all part of this huge digital world, where what
happens online can affect us in the real world. So, keeping our digital spaces secure is as
important as locking our physical doors.
Research objective
Cyber Crime
Cyber Security
Ensuring the privacy and security of data remains a paramount concern for any organization.
In our current digital-centric world, information is predominantly stored and managed in
cyberspace. Social networking sites provide users with a perceived sense of security when
interacting with their friends and family. Nevertheless, it is crucial to acknowledge that even
within the domain of social networking, fraudsters continue to persist in their endeavors to
illicitly get personal data. In addition to the utilization of social media platforms, consumers
are need to exercise a high level of caution in protecting their personal information while
engaging in financial transactions, particularly when interacting with banking services.
The dictionary meaning states that ‘measures taken to protect a computer or computer system
(as on the Internet) against unauthorized access or attack’.1
1
“Cybersecurity.” Merriam-Webster.com Dictionary, Merriam-Webster,
https://www.merriam-webster.com/dictionary/cybersecurity . Accessed 25 Sep. 2023.
Cybersecurity refers to a set of procedures and processes that have been specifically
developed to safeguard data. This concept pertains to the realm of digital data. Data refers to
information that is stored, communicated, or used within an information network, server, or
system. Or it can be simply understood as Cyber security is the practice of defending
computers, servers, mobile devices, electronic systems, networks, and data from malicious
attacks. It's also known as information technology security or electronic information security.
Data serves as the fundamental essence of the digital realm. The transmission and storage of
vast quantities of personal data and high-level state communication occur through networks,
utilizing various devices and data centers. The discussion of cyber security necessitates an
acknowledgment of the vital role played by technology.
Under the IT Act, 2000, ‘cybersecurity’ means protecting information, equipment, devices,
computers, computer resources, communication devices and information stored therein from
unauthorised access, use, disclosure, disruption, modification or destruction.2
Government institutions and regulations pertaining to cyber security encompass several entiti
es responsible for safeguarding national critical infrastructure and managing cyber security in
cidents within critical sectors of the country. One prominent agency in this domain is:
2
Section 2(1) of the Information and technology act, 2000
Preserve the integrity of data: This means preventing unauthorized changes or
destruction of data.
Ensure the availability of data and systems: This means ensuring that authorized users
can access the data and systems they need, when they need them.
The aforementioned aims are commonly known in academic literature as the CIA trinity,
encompassing the principles of confidentiality, integrity, and availability.
1. Network security
Network security is the practice of securing a computer network from intruders,
whether targeted attackers or opportunistic malware. 3 The primary objective of
this study is to address the issue of safeguarding computer networks from
unauthorized access, data breaches, and various other risks originating from
network-based sources. The implementation encompasses various technologies,
including Firewalls, Intrusion Detection Systems (IDS), Virtual Private
Networks (VPNs), and Network Segmentation.
Enhance the security of your internal network to mitigate external attacks.
In certain instances, individuals have been known to make use of
complimentary wireless internet access in communal spaces, including
cafes, shopping centers, and similar venues. Through the utilization of this
particular activity, a third party entity commences the process of
monitoring and tracing the whereabouts of your mobile device via the
internet. In the event that a payment gateway is utilized, it is possible for
the associated bank account to have a zero balance.
It is advisable to refrain from utilizing free networks due to their lack of
security measures.
3
Kaspersky, March 4, 2020. https://www.kaspersky.co.in/resource-center/definitions/what-is-cyber-security
1.1 Firewall
Hardware or software-based systems that regulate the flow of incoming and
outgoing network traffic in accordance with predetermined security protocols.
1.2 Intrusion detection system
Monitors network traffic for suspicious activities and alerts when potential threats
are detected.
2. Information techniques
4
Khraisat, A., Gondal, I., Vamplew, P. et al. Survey of intrusion detection systems: techniques, datasets
and challenges. Cybersecur 2, 20 (2019). https://doi.org/10.1186/s42400-019-0038-7
The promotion of security awareness among users is vital in
order to protect the integrity of information security. The
process entails providing individuals with education regarding
prevalent security issues, optimal approaches for managing
confidential data, and techniques for recognizing and addressing
potential dangers such as phishing assaults or social engineering
endeavors.
Encryption is a cryptographic procedure that transforms data
into an unintelligible form, known as ciphertext, with the aim of
safeguarding it against unauthorized interception or access.
2.1 Encryption:
It refers to the systematic procedure of transforming data into a coded
format with the intention of safeguarding it from unauthorized
individuals or entities.
Cloud security refers to the measures used to protect data, applications, and
infrastructure that are hosted on cloud platforms. This includes implementing
suitable access controls, safeguarding data, and ensuring compliance with relevant
regulations. The system leverages a range of cloud service providers, including
AWS, Azure, Google Cloud, among others, in order to enhance security measures
against diverse threats.
It involves securing the organizational and personal data stored on mobile devices
such as cell phones, tablets, and other similar devices against various malicious
threats. These threats are Unauthorized access, Device loss or Theft, Malware, etc.
mobile is widely utilized for various daily tasks. The majority of our
activities and access to information are facilitated through the use of
mobile phones. Examples of digital activities include participating in
online classes, making personal phone calls, engaging in online
banking, and conducting UPI payments.
The regular practice of creating backups of mobile device data is
crucial in mitigating the risk of data loss in the event of theft, physical
harm, or device malfunction.
Mobile devices frequently establish connections with different
networks, encompassing public Wi-Fi, hence presenting potential
security vulnerabilities. Utilizing secure networks, such as encrypted
Wi-Fi networks or cellular data connections, is of paramount
importance.
5. End-point security:
The term "device security" pertains to the act of safeguarding individual
computing devices, including computers, laptops, smartphones, and Internet of
Things (IoT) devices. The aforementioned components encompass antivirus
software, intrusion prevention systems (IPS), device encryption, and periodic
software upgrades.
Antivirus and anti-malware software are utilized to conduct scans and
identify dangerous software, encompassing viruses, worms, trojans, and
ransomware. These technologies have the capability to detect and remove
or isolate harmful files, thereby safeguarding the endpoint and the network
from potential damage.
Firewalls are key elements of endpoint security. Network traffic is
monitored and regulated by means of scrutinizing both inbound and
outbound data packets, with the intention of identifying and eliminating
any potentially harmful content.
Ensuring the timely installation of security patches and upgrades for
software and operating systems is of paramount importance in maintaining
robust endpoint security.
5.1 Antivirus software
Scans and removes malware, including viruses, Trojans, and spyware, from
endpoints.
5
Trellix. “What Is Endpoint Detection and Response? | EDR Security | Trellix,” n.d.
https://www.trellix.com/en-us/security-awareness/endpoint/what-is-endpoint-detection-and-
response.html#definition.
The basic functions of an security system encompass:
To monitor and collect data from end points that could be a potential
threat
Conduct a comprehensive analysis of the provided data in order to
discern discernible patterns indicative of potential threats.
To automatically neutralise the identified threat, and alert the
responsible authority
Today, everything has shifted online, from buying 10 rupees bag of grocery to millions worth
jewellery. Now from easily paying money to local vendor to send funds to our family
member residing in far-flung regions of the country in blink of an eye. This shift to the online
world has made our lives and convenient. But with this, we have become more susceptible
towards getting in the web of cyber attack. However, staying safe in the digital realm is not as
two-
strong factor
password authentic
ation
anti-virus
protectio Avoid
n public
network
&
usage
firewall
Think
keep your before
OTP you
secret click
complicated as it may seem. we don’t need to be a tech expert to protect ourselves online. It
is a matter of being aware and following straightforward procedures.
Anti-virus (AV) protection software has emerged as the predominant solution for
combating dangerous threats. Antivirus (AV) software functions by preventing the
infiltration of malware and other dangerous viruses into a user's device, hence
safeguarding the integrity of their data. It is recommended to utilize anti-virus
software provided by reputable manufacturers and restrict the usage of multiple
antivirus tools on a single computer. One must invest in buying a decent antivirus
software, for example-NPAV. MACFEE, NORTON ANTIVIRUS etc.
Using public Wi-Fi networks can be risky because they are often less secure than
private networks. When you connect to a public Wi-Fi hotspot, your data can be more
easily intercepted by cybercriminals, putting your personal information at risk.
Hackers can set up fake Wi-Fi networks (called "honeypots") to trick users into
connecting to them. Once connected, they can potentially steal your login credentials,
financial information, and more. To stay safe, it's best to avoid using public Wi-Fi for
sensitive activities like online banking and instead use a trusted, secure network or a
virtual private network (VPN) to encrypt your internet connection when using public
Wi-Fi.
We all have came across sometime or other, when browsing in a website, a pop-up
comes which looks fishy. There are random jumping advertisement in between your
web scrolling. Sometimes it make look like something you have seen before like-
your email app’s interface, or a advertisement of a cloth that you have been searching
on the web for long. The observed phenomenon is highly indicative of a phishing
scam, wherein a hyperlink or webpage exhibits an outward appearance of legitimacy,
however conceals a deceptive ploy orchestrated by malicious individuals with the
intention of coercing others into divulging confidential data such as passwords, social
security numbers, credit card details, or other forms of sensitive information. After
obtaining the aforementioned information, individuals can utilize it on reputable
websites. Moreover, individuals may attempt to induce the execution of malicious
software, commonly referred to as malware. Regrettably, individuals are prone to
being deceived by phishing attacks to a greater extent than they may realize.