Download Cyber Security for B.com Sem-VI and more Summaries Cybercrime, Cybersecurity and Data Privacy in PDF only on Docsity!
Cyber Security
B.Com – VI Sem
Badri Gopi Krishna
M.SC-IT., M.COM., LLB., PGDCA., DCHE., DACAD LECTURER IN COMPUTERS YOUTUBER (JIGNAASA), ACTOR, WRITER, DIRCTOR
Badri Gopi Krishna, M.Sc-IT., M.Com., L.LB., PGDCA., DCHE , Unit- 1 : Introduction to Cyber Security
1.1 Overview of cyber security:
In cyber security the word “Cyber” indicates systems, Networks, programs and data. The word Cyber simply indicates a computer or a computer network /networks. Cybersecurity is the practice of protecting systems from malicious attacks. Cybersecurity reduces the risk of cyber attacks and unauthorized access to systems, networks. In simple, Cybersecurity is the practice of protecting internet-connected devices and systems from cyberattacks. It designed to protects the users, Business and personal information, networks and devices from external attacks. It refers to the branch of computer science that describes the application of secure behaviour on the operation of computers. According to the study conducted by deloitter and manufactures alliance for productivity and innovation, about 40% of various companies were getting affected by cyber attacks. The history of cybersecurity began in 1971 when Bob Thomas, a computer programmer, created the first computer virus. This virus wasn’t harmful but showed how systems could be vulnerable. Thomas is called the "Father of Cybersecurity" because his work laid the foundation for modern security practices. ➢ The type of security is more prevalent in case of shared systems such as time-sharing system. ➢ The technique of employing a wide variety of tools for protecting data and preventing hackers from accessing the data is called computer security. ➢ It refers to the branch of computer science that describes the application of secure behaviour on the operation of computers. ➢ As technology advances, the need for stronger cybersecurity also increases. This is because more devices and systems are connected, making them potential targets for cyberattacks. ➢ The technique of employing a wide variety of tools for protecting data and preventing hackers from accessing the data is called ‘Computer Security’. In simple form, Cybersecurity is like locking the doors and windows of our digital home to keep intruders out while protecting the valuables inside. It uses various tools and techniques to make sure our devices, information, and networks stay safe. 1.1.1 The importance of Cybersecurity:
- Protects Sensitive Information: It ensures the safety of personal and business data.
- Reduces Risks: It minimizes the chances of cyberattacks and unauthorized access.
- Maintains Trust: Protecting systems helps maintain trust among users and customers.
- Ensures Business Continuity : Strong cybersecurity ensures that businesses can continue operating even during cyber threats.
- Prevents Financial Loss: Cyberattacks, such as ransomware and phishing, can lead to significant financial losses for individuals and businesses. Example: When you use online banking, cybersecurity measures like encryption and two-factor authentication protect your account from hackers. 1.1.2 Objectives of Cybersecurity
- Protect Confidentiality: Ensure that sensitive information is accessible only to authorized individuals.
- Maintain Data Integrity: Prevent unauthorized modification or tampering of data. (data integrity = Accuracy of data)
- Ensure Availability: Guarantee that systems, networks, and data are accessible when needed.
- Safeguard Digital Assets: Protect personal, financial, and business data from cyberattacks. Figure 1 :Bob Thomas, Father of Cybersecurity
Badri Gopi Krishna, M.Sc-IT., M.Com., L.LB., PGDCA., DCHE ,
- Security and Privacy: Measures to protect data, users, and systems from cyber threats and ensure personal information is safe.
- Access and Connectivity: Ensuring all counties and communities can access the Internet and its resources.
- Global Cooperation: Internet governance requires collaboration among countries to address cross-border issues like cybercrime, digital trade, and human rights. 1.2.2 Challenges of Internet Governance: Internet governance involves the rules and systems that control how the internet works. Internet governance faces several challenges:
- Global Disagreements: Different countries and cultures have conflicting ideas on how the internet should be managed.
- Cybersecurity: Growing cyber-attacks, data breaches, and online crime require international cooperation.
- Unequal Access: Not everyone has affordable or fast internet, especially in poorer areas.
- Privacy: Different privacy laws and companies using data for profit create concerns about personal information.
- Big Tech Power: A few companies control much of the internet, which could limit competition and fairness.
- Fake News: Managing harmful content without restricting free speech is a tough balance.
- Accountability: Determining who is responsible for online issues across borders is complicated.
- New Technologies: AI, cryptocurrency, and IoT bring new governance challenges.
- Freedom vs. Censorship: Balancing free speech with controlling harmful content is a key issue.
- Environmental Impact: Internet infrastructure consumes energy and contributes to e-waste. Solving these challenges requires global cooperation to keep the internet safe, fair, and accessible. 1.2. 3 Constraints / Limitations of Internet Governance:
- Privacy Concerns: Protecting user privacy is crucial while also securing data. Privacy channels, firewalls, and encryption are used to prevent unauthorized access. However, balancing privacy with security needs is still a challenge.
- Authentication Issues: Digital signatures and secure authentication methods are used to verify online identities and protect transactions. Ensuring these systems are secure and trusted is essential to avoid fraud or identity theft.
- High Setup Costs: Building and maintaining internet infrastructure, including PCs, networks, and data centres, is costly. The high setup costs can be a barrier, especially in rural or low-income areas.
- Lack of Agreement: Different countries have different rules and may not agree on how to manage the internet. For instance, the European Union has strict data protection regulations through the General Data Protection Regulation (GDPR), which requires companies to protect the personal data of EU citizens. On the other hand, the United States has a more relaxed approach to data privacy with fewer regulations on how companies handle personal information. This difference creates problems for companies that operate in both regions, as they have to comply with conflicting rules. This lack of agreement between countries on privacy laws and internet regulations makes it difficult to create a universal framework for internet governance
- Control of Big Companies: Large tech companies control much of the internet, which makes it hard to regulate them fairly.
- Access Inequality: Many people, especially in poor areas, don’t have access to the internet or can’t afford it.
- Cross-Border Challenges: The internet is global, but laws and regulations vary by country, making it difficult to enforce rules consistently.
Badri Gopi Krishna, M.Sc-IT., M.Com., L.LB., PGDCA., DCHE ,
1.3 Cyber Threats :
Cyber threats are growing concerns for individuals, businesses, and governments worldwide. Cyber threats are harmful activities like hacking or stealing data that target people, businesses, and governments. In India, these threats include cyber attacks, spying, and scams, with over 13.9 lakh cases reported in 2023.
- Cyber Warfare
- Definition: Cyber warfare involves the use of digital technologies and attacks by state- sponsored actors or nations to cause disruption or damage to a nation’s critical infrastructure, information systems, or defence systems. These attacks may aim to gain a military or political advantage without the use of regular weapons.
- Impact: Cyber warfare can lead to the loss of sensitive national data, interruption of military operations, damage of essential systems., and loss of public trust in government agencies.
- Example: o Russia-Ukraine Conflict (2022) During the Russia-Ukraine war, cyberattacks became a key weapon. Russia launched cyberattacks on Ukraine's power grid, government websites, and banks. For instance, malware like "HermeticWiper" was used to delete data on Ukrainian systems.
- Cyber Crime
- Definition: Cybercrime refers to illegal activities conducted through digital platforms or the internet for financial or personal gain. This includes a wide range of offenses such as hacking, identity theft, online fraud, phishing, and cyberstalking.
- Impact: Cybercrime can result in financial loss, identity theft, damage to an organization’s reputation, and emotional distress to victims.
- Example: ▪ Fake Online/WFH Job Offers: Scammers offer fake WFH jobs with high pay, take legal documents, and make victims sign digital agreements. They assign impossible tasks, like typing 500 pages in 2 days, and threaten with fake legal notices or advocate calls if tasks aren't completed.
- Cyber Terrorism
- Definition: Cyber terrorism refers to the use of the internet and digital technologies to cause widespread panic, fear, or destruction. It is often linked to ideological, political, or religious motivations and seeks to disrupt critical national functions.
- Impact: Cyber terrorism can destabilize governments, create public panic, disrupt critical infrastructure like healthcare, and cause widespread loss of confidence in governmental systems.
- Example: o Indian Government Websites Attacks (2019): In 2019, Indian government websites, including those of the Ministry of Home Affairs and External Affairs, were defaced by hackers linked to terrorist groups. The attack aimed to create panic and highlight vulnerabilities in critical digital infrastructure.
- Cyber Espionage
- Definition: Cyber espionage is the act of using digital methods to secretly steal sensitive information from individuals, organizations, or governments for competitive, economic, or strategic advantage. For example, a country’s hackers might break into another country's government system to steal top-secret plans for new technology. They do this without being caught and can use or sell the stolen information.
- Impact: Cyber espionage can severely damage national security, lead to the loss of intellectual property, and undermine economic competitiveness. Sensitive data such as military plans, government intelligence, or corporate secrets may be stolen and exploited.
- Example:
Badri Gopi Krishna, M.Sc-IT., M.Com., L.LB., PGDCA., DCHE ,
- Centralized Coordination
- Many agencies and companies handle cybersecurity. A nodal authority brings everyone together to work efficiently.
- Example: During the SolarWinds cyberattack in 2020, the U.S. Cybersecurity Agency worked with government and private companies to reduce damage.
- Quick Threat Response
- A nodal authority can monitor cyber threats continuously and act fast when incidents happen.
- Example: In India, CERT-In (Computer Emergency Response Team - India) handled cyber attacks on hospitals during the Covid-19 pandemic in 2020.
- Creating Cybersecurity Policies
- It ensures strong policies and guidelines are made and followed by all organizations.
- Example: The EU’s Cybersecurity Agency (ENISA) sets rules to protect digital systems across Europe.
- Training and Awareness
- It can educate people and organizations about safe online practices to avoid cyberattacks.
- Example: CERT-In conducts workshops in India to teach businesses about securing their data.
- International Collaboration
- Cybercrimes often cross borders. A nodal authority helps share information and work with other countries.
- Example: India works with INTERPOL to tackle global ransomware attacks.
- Protecting Important Systems
- Systems like electricity grids, banks, and hospitals are critical. A nodal authority ensures they are protected from hackers.
- Example: In 2022, a cyberattack on India’s power grid in Ladakh was handled by CERT-In, showing its importance.
- Handling Data Breaches
- If user data is stolen, the nodal authority can help fix the issue and guide companies to prevent future breaches.
- Example: After the MobiKwik data breach in 2021, CERT-In helped investigate and ensure steps were taken to secure the system.
- Research and New Technology
- A nodal authority can focus on creating new tools to deal with cyber threats.
- Example: Singapore’s Cyber Security Agency invests in AI-based tools to protect its systems.
- Enforcing Cyber Laws
- It ensures there are rules to punish cybercriminals and that companies follow data protection guidelines.
- Example: CERT-In enforces India’s IT Act and ensures companies follow cybersecurity practices. A nodal authority is crucial for managing cybersecurity effectively. It helps protect important systems, respond to attacks quickly, and ensure a safe digital environment for everyone.
1.6 Need for an International Convention on Cyberspace
As the world becomes more connected, cyberattacks have a global impact. Hackers can target systems across borders, causing damage to governments, businesses, and individuals. To address these challenges, we need an International Convention on Cyberspace—a global agreement on rules and cooperation for safe cyberspace. The term "cyberspace" was coined by William Gibson in his 1982 novel Neuromancer. It was popularized as the concept of virtual interconnected networks. The concept became more mainstream with the rise of internet companies like AOL, Netscape, and Microsoft in the 1990s, contributing to the expansion of digital communication and the development of online conventions.
- An International Convention on Cyberspace is essential to create a safer digital world.
Badri Gopi Krishna, M.Sc-IT., M.Com., L.LB., PGDCA., DCHE ,
- By uniting countries under shared rules and goals, we can protect individuals, businesses, and governments from cyber threats while fostering trust and collaboration globally. 1.6.1 The Need of an International Convention A cyberspace convention is needed because more people rely on the internet, and cyber threats like hacking and crime are growing. It helps countries work together to create rules for keeping the internet safe, protecting data, and handling online issues.
- Cyber Threats Are Global
- Cybercrimes, like hacking and ransomware attacks, often involve people from different countries. A global agreement helps nations work together to stop such activities.
- Example: The WannaCry ransomware attack in 2017 affected over 150 countries. Cooperation was needed to stop the spread and minimize damage.
- Lack of Common Rules
- Different countries have different laws for cyberspace. A convention ensures common rules for data protection, privacy, and cybercrime prevention.
- Example: The Budapest Convention is one effort to create shared rules, but it needs more participation from countries like India and China.
- Protecting Critical Infrastructure
- Cyberattacks on power grids, hospitals, or financial systems can disrupt entire nations. A convention ensures global cooperation to protect these vital systems.
- Example: In 2021, the Colonial Pipeline cyberattack in the U.S. caused fuel shortages. International help was required to trace and stop the attackers.
- Addressing Cyber Terrorism
- Terrorists use cyberspace for communication, propaganda, and attacks. A convention helps nations share intelligence and fight cyber terrorism.
- Example: Groups like ISIS use social media to spread advertising. A global agreement can help block such activities faster.
- Tackling Cross-Border Data Theft
- Cybercriminals often steal personal and financial data from one country and sell it in another. A convention ensures countries collaborate to catch these criminals.
- Example: The MobiKwik data breach in India (2021) exposed user data that was sold on dark web platforms hosted in other countries.
- Ensuring Privacy and Freedom
- A convention can protect user rights by setting rules on government surveillance and data collection.
- Example: The EU’s GDPR (General Data Protection Regulation) protects data privacy in Europe but needs global alignment for broader impact.
- Promoting Cybersecurity Standards
- Global standards help ensure secure technology development and usage worldwide.
- Example: The International Telecommunication Union (ITU) sets standards for communication systems but needs broader support for cyberspace.
- Preventing Cyber Warfare
- Cyberattacks by nations can escalate into wars. A convention can create guidelines to avoid conflicts and promote peace in cyberspace.
- Example: In 2010, the Stuxnet malware targeted Iran's nuclear program, sparking concerns about cyber warfare. One example of a convention related to cyberspace is the Budapest Convention on Cybercrime (also known as the Council of Europe Convention on Cybercrime) The Budapest Convention on Cybercrime was adopted in 2001 to fight cybercrime globally. It defines types of cybercrimes like hacking, fraud, and child exploitation online. It helps countries work together to investigate and punish cybercrimes. The convention encourages countries to update their laws to handle cybercrimes.
Badri Gopi Krishna, M.Sc-IT., M.Com., L.LB., PGDCA., DCHE ,
- Firmware Attacks: Hackers exploit firmware (device's low-level software) to take control or install malware.
- Meltdown and Spectre: Weaknesses in processors allow attackers to access sensitive data like passwords.
- Side-Channel Attacks: Hackers gather information from a device by observing its power usage, sound, or heat.
- Physical Tampering: If someone physically accesses a device, they can steal or modify sensitive information.
- Backdoors: Hidden vulnerabilities in hardware that attackers can exploit. Causes of Hardware Vulnerabilities:
- Design Flaws: Errors in chip or hardware design.
- Outdated Firmware: Lack of updates makes devices easier to exploit.
- Supply Chain Issues: Malicious components might be added during manufacturing. Preventive Measures:
- Regularly update device firmware.
- Use trusted hardware suppliers to avoid backdoors.
- Encrypt sensitive data to protect it from physical theft.
- Implement tamper-resistant hardware designs.
- Use secure boot processes to prevent unauthorized changes.
- Network Vulnerabilities Network vulnerabilities are weaknesses in a network's design, hardware, or software that attackers can exploit to steal data, disrupt communication, or take control of systems. Common Network Vulnerabilities:
- Weak Passwords: Simple or reused passwords make it easy for hackers to gain access.
- Unsecured Wi-Fi: Open or poorly secured Wi-Fi networks allow unauthorized access.
- Outdated Devices: Old routers, switches, or firewalls without updates can be exploited.
- DDoS Attacks: Overloading a network with traffic to make it unusable.
- Man-in-the-Middle (MITM) Attacks: Hackers intercept data between two devices on the network.
- Unpatched Software: Software without the latest updates can have security flaws.
- Phishing: Attackers trick users into sharing sensitive information over the network. Causes of Network Vulnerabilities:
- Poor configuration of network devices (e.g., default passwords).
- Lack of encryption for data transmission.
- Insufficient monitoring of network activity.
- Weak firewall or antivirus protection. Preventive Measures:
- Use strong passwords and two-factor authentication.
- Encrypt Wi-Fi networks (e.g., WPA3 security).
- Regularly update routers, switches, and other devices.
- Install and maintain firewalls and antivirus software.
- Train users to recognize phishing and other attacks.
1.8 System Administration– Roles and responsibilities of Administer.
1.8.1 System Administration : System administration involves managing and maintaining IT systems, networks, and infrastructure to ensure smooth and secure operations. It is a critical function in organizations that rely on technology for day-to-day activities. The Importance of System Administration
- Ensuring Reliability System administration keeps IT systems running smoothly and reliably. Administrators monitor and maintain systems to prevent downtime and fix issues quickly.
Badri Gopi Krishna, M.Sc-IT., M.Com., L.LB., PGDCA., DCHE , Example: If an email server fails, a system administrator restores it promptly to avoid work delays.
- Strengthening Security Cyber threats like hacking and malware pose serious risks. System admins protect systems using firewalls, antivirus software, and updates. Example: Regular software updates help prevent ransomware attacks, such as the Colonial Pipeline incident.
- Protecting Data Admins ensure critical data is backed up and can be restored during system failures. Example: If a database crashes, the admin restores important information from backups, avoiding data loss.
- Improving Performance System admins optimize settings and upgrade hardware or software for better efficiency and speed. Example: Upgrading office computers ensures employees can work without delays or crashes. In summery, system administration is essential for maintaining secure, reliable, and efficient IT systems, supporting business operations, and preventing disruptions. 1.8.2 System Administrator : A System Administrator (SysAdmin) is a professional person responsible for managing, maintaining, and securing an organization's IT systems and infrastructure. This includes overseeing servers, networks, software, and hardware, ensuring they function properly, are secure, and meet the organization’s needs. A SysAdmin also handles tasks like troubleshooting, user account management, data backup, and applying software updates to maintain system stability and security. The Roles and Responsibilities : A System Administrator is an IT professional responsible for managing, maintaining, and securing an organization's computer systems, servers, and networks. They ensure that all systems operate efficiently, securely, and reliably to support business operations. A system Administrator has the following roles and responsibilities
- System Maintenance and Monitoring
- Ensure that systems, servers, and networks function smoothly and efficiently.
- Perform routine checks to identify and resolve performance issues.
- Security Management
- Protect systems from cyber threats by implementing firewalls, antivirus software, and other security measures.
- Regularly update systems and apply security patches.
- Backup and Recovery
- Create and manage data backup plans to prevent data loss.
- Develop and execute recovery strategies to restore systems after failures.
- Troubleshooting and User Support
- Resolve hardware, software, and network issues for users.
- Provide technical support and guidance to employees.
- System Configuration and Updates
- Install, configure, and maintain hardware, software, and operating systems.
- Ensure all systems are updated to their latest versions for optimal performance and security.
- Performance Optimization
- Optimize system settings and resources to improve efficiency and reduce downtime.
- Upgrade hardware and software as needed to meet organizational demands.
- Documentation and Reporting
- Maintain detailed records of system configurations, updates, and incidents.
Badri Gopi Krishna, M.Sc-IT., M.Com., L.LB., PGDCA., DCHE ,
- Secure Communication Protocols: The protocols used by the sender and receiver must support the encryption algorithm and the key to ensure secure communication. 1.9.2 Network Access Security Model : A Network Access Security Model controls who and what devices can access a network, allowing only authorized users and devices. It uses authentication (identity verification), authorization (access control), and accounting (activity tracking), supported by tools like firewalls and Network Access Control (NAC), to monitor and secure network traffic. A Network Access Security Model is a way to protect a network by deciding who and what devices are allowed to use it. It makes sure only trusted people and devices can connect while blocking intruders. This is done through three main steps:
- Authentication: Checking who you are (e.g., using a password or fingerprint).
- Authorization: Deciding what you can do on the network.
- Accounting: Keeping track of what users do on the network. Tools like firewalls (to block unwanted traffic) and Network Access Control (NAC) (to allow only trusted devices) help enforce these rules and keep the network safe. Threats to Information Systems Networks face two major dangers:
- Hacking: When someone tries to break into the system to steal, change, or damage data.
- Malicious Code: Bad programs that harm the system or its applications. These threats can cause problems in two ways:
- Information Access Threats: Let unauthorized people see or change data they shouldn’t.
- Service Threats: Stop the system from working properly, making it hard for real users to use it. Security Measures to Prevent Problems To protect the network, two main strategies are used:
- Gatekeeper Function: o Works like a guard at the door. o Checks who is trying to enter and blocks those without permission. o Tools like login systems, firewalls, and security checks are examples of this function.
- Internal Control: o Watches what happens inside the system. o Looks for unusual or harmful activities. o Helps stop threats that sneak past the gatekeeper or come from within. o Examples include system activity logs and tools that spot suspicious behavior.
1. 10 Open Access to an organizational data
Allowing open access to organizational data can bring both benefits and risks. It involves sharing certain data with internal teams, external partners, or the public, but it must be carefully managed to ensure security. Positive Effects
- Better Collaboration Sharing data can improve teamwork across departments and with external partners, leading to faster problem-solving and innovation.
- Increased Trust Open access shows transparency, which builds trust with customers, partners, and the public by demonstrating accountability in handling data.
- Faster Threat Detection Sharing security data can help teams quickly identify and respond to cyber threats.
Badri Gopi Krishna, M.Sc-IT., M.Com., L.LB., PGDCA., DCHE ,
- Education and Awareness Open data can increase cybersecurity knowledge, helping everyone stay aware of new threats and best practices.
- Compliance with Laws Sharing necessary data can help meet legal and regulatory requirements, ensuring compliance with privacy laws. Negative Effects
- Data Breaches Exposing sensitive data increases the risk of cyberattacks, as hackers could exploit vulnerabilities to access critical information.
- Insider Threats Employees or authorized users might misuse their access, either intentionally or by accident, leading to data leaks or breaches.
- External Attacks Publicly available information, like network setups, can be used by cybercriminals to target the organization with attacks like hacking or ransomware.
- Privacy Risk Sharing data without proper protection can violate privacy laws and expose personal or confidential information.
- Control Loss Once data is shared, it can be used in unintended ways, leading to potential misuse or misunderstanding of the data. How to Reduce Risks
- Classify Data: Identify which data can be safely shared and which needs protection.
- Access Controls: Limit data access to only those who need it to reduce the risk of misuse.
- Encryption: Protect shared data with encryption and masking techniques.
- Monitor Data: Continuously track data access and network activity to detect and prevent threats.
- Train Employees: Educate staff on how to handle data securely and prevent accidental leaks. In short, While open access to organizational data can improve collaboration and transparency, it also brings risks like data breaches and misuse. By using proper security measures and access controls, organizations can safely share data while protecting sensitive information. 1.10.1 Access Control: Access Control regulates and restricts access to data, systems, and resources. Its primary goal is to ensure that only authorized individuals or entities can access or perform operations on specific systems or data. Types of Access Control with Examples Discretionary Access Control (DAC) :
- Access is granted or restricted based on the discretion of the resource owner.
- Users have control over their resources and can assign permissions to others.
- Example: File permissions in operating systems like Windows and Linux. Mandatory Access Control (MAC) : Access is controlled by strict policies defined by a central authority. Permissions are based on security labels (e.g., classified, confidential) and clearances. Common in government or military environments. Example: A top-secret document can only be accessed by individuals with top-secret clearance.
- Role-Based Access Control (RBAC) : o Access is granted based on roles within an organization. o Users are assigned roles, and permissions are tied to those roles. o Simplifies management of permissions.
Badri Gopi Krishna, M.Sc-IT., M.Com., L.LB., PGDCA., DCHE , It is a type of access control model where the owner of a resource (e.g., a file or folder) has the discretion to decide who can access it and what level of access they have (read, write, delete, etc.). The resource owner has control over permissions. Key Points:
- Owner Control : The resource owner determines who can access the resource.
- Flexibility : Owners can assign permissions to other users based on their choice.
- Permissions : Users can be given various permissions like reading, editing, or deleting files. Example: If you create a file on your computer, you can decide who else (e.g., friends or coworkers) can access it and whether they can just view it or also modify it. Advantages:
- Easy to manage and flexible.
- Suitable for environments where resource owners need control over their data.
1.11 Authentication
Authentication is the process of verifying the identity of a user, device, or system to ensure that only authorized entities can access certain resources or information. The goal of authentication is to prove that someone or something is who they claim to be. This is typically done using a combination of identifiers, such as passwords, biometric data, or security tokens. For example, when you log into a website using your username and password, that’s authentication. It’s how systems make sure only the right people can access their data or services. Weak authentication means using methods that are not secure enough to protect systems or data. If authentication is weak, it’s easy for hackers or unauthorized users to get access, which can lead to data breaches and other security problems. The following are some of the examples for weak authentication : Simple Passwords
- Using easily guessable passwords like "123456", "password", or "qwerty" is a weak authentication practice.
- These passwords are vulnerable to common hacking techniques like brute-force attacks. No Multi-Factor Authentication (MFA)
- Relying solely on a password for authentication without additional security layers (e.g., a code sent via SMS or generated by an authentication app) leaves accounts open to attack if the password is compromised. Unchanged Default Passwords
- Many systems come with default login credentials (e.g., "admin" for both username and password).
- If these defaults are not changed, attackers can easily access the system. Weak Security Questions
- Using easily guessable security questions (e.g., "What is your mother's maiden name?") makes it easy for attackers to reset passwords or gain access to accounts. Single-Factor Authentication
- Using just one method of authentication, such as a password, without adding extra layers of security like biometrics or tokens, increases the chances of unauthorized access. Lack of Account Lockout
- Some systems do not lock accounts after a set number of failed login attempts.
- This enables attackers to continue trying passwords until they succeed (brute-forcing). 1.11.1 The Strong Authentication Authentication is the process of checking who someone is before allowing them access to a system. Here are the main types:
- Password-Based Authentication
- Description: The user enters a password to log in.
Badri Gopi Krishna, M.Sc-IT., M.Com., L.LB., PGDCA., DCHE ,
- Example: Typing your email password to check your inbox.
- Limitation: Weak passwords can be easily guessed.
- Multi-Factor Authentication (MFA)
- Description: Requires two or more ways to verify identity (e.g., password + a code sent to your phone).
- Example: Logging in with your password and entering a code sent to your phone.
- Benefit: More secure than just a password.
- Biometric Authentication
- Description: Uses your physical features like fingerprints or face recognition.
- Example: Unlocking your phone with your fingerprint.
- Benefit: Easy to use and hard to fake.
- Token-Based Authentication
- Description: Uses a physical or digital token (like an app or USB stick) to log in.
- Example: Using a device that generates a code for login.
- Benefit: Adds extra security.
- Certificate-Based Authentication
- Description: Uses a digital certificate to prove identity.
- Example: Logging into a work network with a smart card.
- Benefit: Very secure.
- Knowledge-Based Authentication (KBA)
- Description: Asks a personal questions to confirm your identity.
- Example: Answering questions like "What is your mother's maiden name?"
- Limitation: Can be risky if answers are easy to guess.
- Single Sign-On (SSO)
- Description: Allows you to log in once and access multiple services without logging in again.
- Example: Logging into Google and accessing Gmail, YouTube, and Google Drive without signing in again.
- Benefit: Convenient for users. 1.11.2 Weak Authentications : Weak authentication refers to methods that are not strong enough to properly protect systems and data, making it easier for attackers to gain unauthorized access. Here are some examples of weak authentication methods, including PIN-based and password-based methods: Examples of Weak Authentication
- Password-Based Authentication o What it is: The user logs in by entering a password. o Weakness: If the password is simple or easily guessable (e.g., "123456" or "password"), it can be easily cracked or guessed by attackers.
- PIN-Based Authentication o What it is: The user enters a Personal Identification Number (PIN) to authenticate. o Weakness: PINs that are too short (e.g., 4 digits like "1234") are vulnerable to brute-force attacks where attackers try all possible combinations.
- No Multi-Factor Authentication (MFA) o What it is: Using only one form of authentication (like a password or PIN) without any additional security checks. o Weakness: If a password or PIN is compromised, there's no extra protection, allowing attackers to gain access easily.
- Default Passwords o What it is: Many systems come with default passwords (e.g., "admin" or "password"). o Weakness: If these default passwords aren't changed, anyone can log in and access the system.
Badri Gopi Krishna, M.Sc-IT., M.Com., L.LB., PGDCA., DCHE , o 2FA: Requires two forms of authentication, usually something you know (password) and something you have (a mobile device or token). o Multi FA: Uses more than two forms of authentication to verify identity.
- File based Authentication: o Certificate: Uses a digital certificate to authenticate users and systems. o Example: Accessing a secure website using HTTPS, where the website’s certificate ensures it’s the real site. o Token based: A token (physical or digital) is used to authenticate a user’s identity. o Example: Using a security token or a mobile app to generate a code for login. 1.11.4. Biometrics Biometric authentication is a security process that uses a person's unique physical or behavioural characters to verify their identity. It is widely used for its ability to provide high security since biometric features are difficult to replicate or steal. Examples:
- Fingerprint scanners, facial recognition, retina scans etc. Benefits: ➢ High Security: Difficult to forge or steal biometric traits. ➢ Convenience: Eliminates the need for passwords or PINs. ➢ Non-transferable: Biometric traits are unique to each individual. Techniques of Biometric Authentication
- Fingerprint Recognition: o Description: Uses the unique patterns found in a person’s fingerprints to verify identity. o How it works: A sensor scans the fingerprint and compares it with a stored template for matching. o Example: Unlocking a smartphone by placing a finger on the sensor.
- Facial Recognition: o Description: Identifies individuals based on unique facial features, such as the distance between eyes or the shape of the jaw. o How it works: A camera captures an image of the face and compares it with a stored template. o Example: Unlocking a phone or logging into a computer using face scanning.
- Iris Recognition: o Description: Uses the unique patterns in the iris (colored part of the eye) to authenticate users. o How it works: A camera captures an image of the iris and compares it to the stored data. o Example: High-security areas, where iris scans are used to grant access.
- Voice Recognition: o Description: Identifies a person by analyzing their unique voice patterns, such as tone, pitch, and cadence. o How it works: A microphone captures the user’s voice, and a system compares it to a voiceprint. o Example: Phone systems that allow users to authenticate by speaking a passphrase.
- Retina Scan: o Description: Scans the pattern of blood vessels in the retina at the back of the eye, which is unique to each individual. o How it works: A low-intensity light is used to capture the retina's unique pattern and compares it with the stored information. o Example: Used in high-security settings, like government or military installations.
- Hand Geometry Recognition: o Description: Measures the shape and size of a person’s hand and fingers.
Badri Gopi Krishna, M.Sc-IT., M.Com., L.LB., PGDCA., DCHE , o How it works: A scanner captures the dimensions of the hand, including length, width, and shape of fingers, to compare it with a stored template. o Example: Used for physical access control to buildings or secure areas.
1.12 Broadband communication
Broadband communication refers to high-speed internet access that allows for the transmission of large amounts of data over long distances. It is a type of internet connection that provides fast, reliable, and continuous access to the web, enabling users to send and receive data quickly. Broadband connections support various services, including web browsing, video streaming, online gaming, and VoIP (Voice over Internet Protocol) calls. Types of Broadband Communication
- DSL (Digital Subscriber Line) o A type of broadband that uses existing telephone lines for internet access but offers much faster speeds than traditional dial-up connections.
- Cable Broadband o Uses the same coaxial cables that deliver cable TV services to provide high-speed internet access.
- Fiber-Optic Broadband o Uses light signals to transmit data through thin strands of glass Fiber, offering very high speeds and reliability.
- Satellite Broadband o Uses satellites in space to transmit internet signals to remote areas, although it may be slower and less reliable than other types.
- Wireless Broadband o Includes technologies like Wi-Fi and mobile broadband, which provide internet access without physical cables, using radio waves or mobile networks.
- 5G Broadband o The latest generation of mobile broadband that promises ultra-fast internet speeds and low latency for a wide range of devices and applications. Benefits of Broadband Communication
- High-Speed Access: Enables faster data transfer, allowing users to stream videos, download files, and browse the web without delays.
- Always-On Connection: Provides continuous internet access, unlike dial-up connections that need to be manually connected and disconnected.
- Support for Multiple Devices: Can handle multiple devices connected at once, such as smartphones, laptops, and smart home devices.
- Enhanced Communication: Improves the quality of voice calls, video calls, and conferencing, offering clearer communication. 1.12.1 The Protected and unprotected Broadband communication : Protected broadband communication ensures data privacy, integrity, and security, preventing threats like eavesdropping, data breaches, and cyberattacks. By using encryption, VPNs, firewalls, and other security measures, users can safeguard their online activities. Unprotected broadband communication lacks these security measures, making it highly vulnerable to attacks and risks. Without proper protection, data is at risk of being intercepted, stolen, or tampered with. The Protected Broadband Communication Protected broadband communication refers to internet connections that are secured using various methods to ensure data privacy, integrity, and prevent unauthorized access. This helps safeguard the data being transmitted from threats like hacking, eavesdropping, and cyberattacks. Protection Methods
- Encryption: