Cyber security is the protection of internet-connected systems including hardware, software, and program or data from cyber attacks.
The word cyber security is divided into two words:
- Cyber: It denotes the computer, system, network, program, or data
- Security: It denotes the system security, network security, program, or data security.
Need of cyber security:
- To protect private data
- To protect intellectual data
- To protect banking or financial data
- National security
- Global economy
- Protect sensitive data
Information System
An information system is defined as the software that helps to organize and analyze data.
Information system components:
- System resource:
- People:
- Is specialist
- Is end-user
- Software
- Data
- Network
- People:
- System activity:
- Input
- Storage
- Processes
- Output
- Control and maintenance
Development of information systems:
The development of information systems is similar to the application development process. It has various approaches. You can follow any of the following requirements.
- Classical waterfall model
- Prototyping model
- Spiral model
- Incremental model
Confidentiality
Availability
Integrity
Non-repudiation
True
False
Cannot be interpreted
None
Ubuntu
Fedora
Whonix
Kubuntu
Spamming
Phreaking
Cracking
Phishing
AWS
Cloud workload protection platforms
Cloud security protocols
One Drive
Image rendering
Steganography
Rootkits
Bitmapping
Adware remover in browser
Incognito mode in the browser
Anti-malware in browser
Remote browser access
Endless detection and response
Endpoint detection and response
Endless detection and recovery
Endpoint detection and recovery
Managed detection and response
Cloud access security broker
Network traffic analysis
Network security firewall
Threat
Bug
Attack
Vulnerability
Threat
Bug
Attack
Vulnerability
Phishing
DOS attack
Soliciting
Both B and C
Antivirus
Adware
Malware
None of the above
Access control
Availability
Confidentiality
All of the above
Aircrack-ng
Wireshark
Norton
None
SYN Stealth
Null Scan
Xmas tree Scan
Cloud scan
Blaster
Creeper
Sasser
Both b and c
Network security
Operational security
Application security
All of the above
WPS
WPA
WPA2
Both b and c.
Transmission Control Protocol/ internet protocol
Transmission Control Protocol/ internet protocol
Transaction Control protocol/ internet protocol
Transmission Contribution protocol/ internet protocol
To measure reliability
To measure security
To measure longevity
To measure performance
DVD Player
CSS
Only B
Both A and B
Scalar text
Complex text
Plain text
None
Challenge Hardware Authentication Protocols
Circuit Hardware Authentication Protocols
Challenge Handshake Authentication Protocols
Circuit Handshake Authentication Protocols
Trojans
Worms
Rootkits
Virus
Exploit
Attack
Compliance
None
Cracking
Non-ethical hacking
Ethical hacking
Hacktivism
Multipurpose software
Malfunctioned software
Malicious software
Malfunctioning of security
SSMTP
S/MIME
POP3
Mail using PGP
Private Communication Technique
Private Connecting Technology
Private Communication Technology
Personal Communication Technology
Bing
Duckduckgo
Yahoo
Data clustering
Data Altering
Data Backup
Data Recovery
Footprinting
ARP Poisoning
DNS Poisoning
Enumeration
For obtaining remote access connection
Hiding malicious activity on the network
Create a ghost server on the network
Create a stronger connection with the target
Worm
Virus
Trojan horse
Trap door
Antivirus
Virus
Word processing software
Photo editing software
Virus
Malware
Spam
All of the above
Dos Attack
Phishing
Soliciting
Both B and C
Authenticity
Availability
Integrity
Confidentiality
AIC[Availability, Integrity, Confidentiality]
NIC[Non-repudiation, Integrity, Confidentiality]
AIN[Availability, Integrity, Non-repudiation]
ANC[Availability, Non-repudiation, Confidentiality]
Confidentiality
Authentication
Integrity
Non-repudiation