For Final Year
For Final Year
For Final Year
Cyber security divided into two parts one is cyber and the other is security.
Cyber refers to the technology that includes systems, networks, programs, and data.
security is concerned with the protection of systems, networks, applications, and information.
o Network Security: It involves implementing the hardware and software to secure a computer
network from unauthorized access, intruders, attacks, disruption, and misuse.
o Application Security: It involves protecting the software and devices from unwanted threats.
This protection can be done by constantly updating the apps to ensure they are secure from
attacks.
o Information or Data Security: It involves implementing a strong data storage mechanism to
maintain the integrity and privacy of data, both in storage and in transit.
o Identity management: It deals with the procedure for determining the level of access that
each individual has within an organization.
o Operational Security: It involves processing and making decisions on handling and securing
data assets.
o Mobile Security: It involves securing the organizational and personal data stored on mobile
devices such as cell phones, computers, tablets etc. These threats are unauthorized access,
device loss or theft, malware, etc.
o Cloud Security: It involves in protecting the information stored in the digital environment or
cloud architectures for the organization. It uses various cloud service providers such as AWS,
Azure, Google, etc., to ensure security against multiple threats.
o Disaster Recovery and Business Continuity Planning: It deals with the processes,
monitoring, alerts, and plans to how an organization responds when any malicious activity is
causing the loss of operations or data.
Confidentiality
Integrity
Availability
Confidentiality
Integrity
This principle ensures that the data is authentic, accurate, and safeguarded from unauthorized
modification by threat actors or accidental user modification. If any modifications occur, certain
measures should be taken to protect the sensitive data from corruption or loss and speedily recover
from such an event.
AvailabilityThis principle makes the information to be available and useful for its authorized people
always. It ensures that these accesses are not hindered by system malfunction or cyber-attacks.
o Virus: It is a malicious piece of code that spreads from one device to another. It can clean files
and spreads throughout a computer system, infecting files, stoles information, or damage
device.
o Spyware: It is a software that secretly records information about user activities on their
system. For example, spyware could capture credit card details that can be used by the
cybercriminals for unauthorized shopping, money withdrawing, etc.
o Trojans: It is a type of malware or code that appears as legitimate software or file to fool us into
downloading and running. Its primary purpose is to corrupt or steal data from our device or do
other harmful activities on our network.
o Ransomware: It's a piece of software that encrypts a user's files and data on a device,
rendering them unusable or erasing. Then, a monetary ransom is demanded by malicious
actors for decryption.
o Worms: It is a piece of software that spreads copies of itself from device to device without
human interaction. It does not require them to attach themselves to any program to steal or
damage the data.
o Adware: It is advertising software used to spread malware and displays advertisements on our
device. It is an unwanted program that is installed without the user's permission.
o Botnets: It is a collection of internet-connected malware-infected devices that allow
cybercriminals to control them. It enables cybercriminals to get credentials leaks, unauthorized
access, and data theft without the user's permission.
Phishing
It is a type of cyber threat or malicious attempt where cybercriminals disrupt targeted servers,
services, or network's regular traffic by fulfilling legitimate requests to the target or its surrounding
infrastructure with Internet traffic. Here the requests come from several IP addresses that can make
the system unusable, overload their servers, slowing down significantly or temporarily taking them
offline, or preventing an organization from carrying out its vital functions.
Brute Force
A brute force attack is a cryptographic hack that uses a trial-and-error method to guess all
possible combinations until the correct information is discovered. Cybercriminals usually use this
attack to obtain personal information about targeted passwords, login info, encryption keys, and
Personal Identification Numbers (PINS).
SQL injection is a common attack that occurs when cybercriminals use malicious SQL scripts for
backend database manipulation to access sensitive information. Once the attack is successful, the
malicious actor can view, change, or delete sensitive company data, user lists, or private customer
details stored in the SQL database.
Domain Name System (DNS) attack
A DNS attack is a type of cyberattack in which cyber criminals take advantage of flaws in the Domain
Name System to redirect site users to malicious websites (DNS hijacking) and steal data from
affected computers. It is a severe cybersecurity risk because the DNS system is an essential element
of the internet infrastructure.
Benefits of cybersecurity
o Cyberattacks and data breach protection for businesses.
o Data and network security are both protected.
o Unauthorized user access is avoided.
o After a breach, there is a faster recovery time.
o End-user and endpoint device protection.
o Regulatory adherence.
o Continuity of operations.
o Developers, partners, consumers, stakeholders, and workers have more faith in the company's
reputation and trust.
DATA SCIENCE
Data science is a deep study of the massive amount of data, which involves extracting
meaningful insights from raw, structured, and unstructured data that is processed using
the scientific method, different technologies, and algorithms.
It is a multidisciplinary field that uses tools and techniques to manipulate the data so
that you can find something new and meaningful.
Data science uses the most powerful hardware, programming systems, and most
efficient algorithms to solve the data related problems. It is the future of artificial
intelligence.
Example:
Let suppose we want to travel from station A to station B by car. Now, we need to take
some decisions such as which route will be the best route to reach faster at the location,
in which route there will be no traffic jam, and which will be cost-effective. All these
decision factors will act as input data, and we will get an appropriate answer from these
decisions, so this analysis of data is called the data analysis, which is a part of data
science.
Data is becoming so vast, i.e., approximately 2.5 quintals bytes of data is generating
on every day, which led to data explosion.
It is estimated as per researches, that by 2020, 1.7 MB of data will be created at every
single second, by a single person on earth. Every Company requires data to work,
grow, and improve their businesses.
Now, handling of such huge amount of data is a challenging task for every organization.
So to handle, process, and analysis of this, we required some complex, powerful, and
efficient algorithms and technology, and that technology came into existence as data
Science.
o With the help of data science technology, we can convert the massive amount of
raw and unstructured data into meaningful insights.
o Data science technology is opting by various companies, whether it is a big
brand or a startup. Google, Amazon, Netflix, etc, which handle the huge amount
of data, are using data science algorithms for better customer experience.
o Data science is working for automating transportation such as creating a self-
driving car, which is the future of transportation.
o Data science can help in different predictions such as various survey, elections,
flight ticket confirmation, etc.
2. Domain Expertise: In data science, domain expertise binds data science together.
Domain expertise means specialized knowledge or skills of a particular area. In data
science, there are various areas for which we need domain experts.
2. Data preparation: Data preparation is also known as Data Munging. In this phase,
we need to perform the following tasks:
3. Model Planning: In this phase, we need to determine the various methods and
techniques to establish the relation between input variables.
4. Model-building: In this phase, the process of model building starts. We will create
datasets for training and testing purpose.
5. Operationalize: In this phase, we will deliver the final reports of the project, along
with briefings, code, and technical documents. This phase provides you a clear
overview of complete project performance and other components on a small scale
before the full deployment.
6. Communicate results: In this phase, we will check if we reach the goal, which we
have set on the initial phase. We will communicate the findings and final result with the
business team.
VIRUS
❖ Computer viruses never occur naturally. They are always induced by people.
❖ It can self-replicate, inserting itself onto other programs or files, infecting them
in the process.
WORM
TROJAN
Spyware can capture information like Web browsing habits, e-mail messages,
usernames and passwords, and credit card information. If left unchecked, the
software can transmit this data to another person's computer over the Internet.
Hacking
• Vulnerability scanner
• Password cracking
• Packet sniffer
• Spoofing attack
DIGITAL WORLD
Digital world means inter connected through digital devices, media digital marketing
services that are available to every one 24/7. It is the world full of ideas, opinions,
learning and opportunities. The Internet has made it possible for all of us to connect
whenever we consider it necessary.
ROBOTICS
❖ Robotics deals with the design, construction, operation, and use of robots.
❖ The field of robotics has greatly advanced with several new general
technological achievements
❖ The field of robotics also intersects with artificial intelligence. Since robots are
physically discrete units, they are perceived to have their own intelligence.
ATM
CAPTCHA
The word is actually an acronym for: Completely Automated Public Turing test to tell
Computers and Humans Apart. The reasoning behind why websites implement CAPTCHA
codes into their registration processes is because of spam. Those crazy letters are a way to
check if the person registering or trying to comment is a real live human being as opposed to
a computer program attempting to spam the system.