Assignment 1 (1) CS

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

0901ME211015

ANUJ PRATAP SINGH SIKARWAR


B-TECH MECHANICAL ENGINEERING
2ND YEAR
MADHAV INSTITUTE OF TECHNOLOGY & SCIENCE, GWALIOR-05
(A Govt. Aided UGC autonomous NAAC Accredited Institute Estd in 1957 Affiliated to RGPV, Bhopal)

MECHANICAL ENGINEERING DEPARTMENT

100004: Cyber Security

ASSIGNMENT -1

1. Write the elements of cyber security


ANS:-
DIFFERENT ELEMENTS OF CYBERSECURITY:

• Application security
• Information security
• Disaster Recovery Planning
• Network Security
• End-user Security
• Operational Security

1.) APPLICATION SECURITY:- Application security is all about keeping software


applications impervious to threats. While this is a large focus of companies that
develop and sell their applications and cloud services, it’s also important for
businesses.

Misconfiguration of security settings is a major reason for cloud account data breaches.
Companies will use a major cloud service, such as Microsoft 365, but won’t understand
that they need to customize their security settings from defaults.

Session: Jan-June 2023 Faculty: Dr. Jyoti Vimal


The main causes of cloud application misconfiguration are:

• Lack of awareness of cloud security policies


• Lack of adequate controls & oversight
• Use of too many interfaces to govern
• Negligent insider behaviour (i.e., user error)
Actions such as setting up multi-factor and administration privilege controls are steps
that cyber security consulting services will take to help strengthen application security
and prevent your apps from being breached.

2.) INFORMATION SECURITY:- Information security covers the protection of


company data and the data that you collect from customers, clients, or vendors.

Most companies will need to adhere to one or more information security standards.
These standards can have stiff penalties should negligence result in the compromise of
personally identifiable information.

Cyber security companies will look at how you collect, store, and transmit data. They’ll
put protections in place to ensure that data is encrypted as needed, and protected from
being breached.

3.) DISASTER RECOVERY PLANNING:- Many companies seek out the help of
cyber security consulting services when it comes to disaster recovery planning.
This is key to keeping your business from being among the 60% that fold after
falling victim to a cyberattack.

Disaster recovery protections include two important components:

1. Strategies for preventing a breach or malware infection


2. Preparations for fast recovery should you fall victim to an attack
Some of the measures that a cyber security consultant will put in place are a backup and
recovery system, incident response drills, and strong endpoint protection

4.) NETWORK SECURITY:- Network security involves protecting your physical


network and all the devices connected to it. Most companies use firewalls to
monitor incoming and outgoing traffic for threats.

Securing your wireless network and ensuring any remote connections happen through
encrypted methods are also ways that cyber security services ensure network security.

Session: Jan-June 2023 Faculty: Dr. Jyoti Vimal


Network security is designed to ensure that only authorized users gain access to the
network, and that no suspicious behaviours are happening inside the network that would
indicate a breach.

5.) END-USER SECURITY:- End-user security is also known as end-point security.


This refers to protecting the devices that users work with, and users themselves.
End-user security is vital, since 91% of cyberattacks begin with a phishing email.

Some of the most common types of end-user protection that you should have include:

• Keeping devices updated


• Managed Antivirus/anti-malware
• DNS filtering to block malicious websites
• Firmware protection to prevent breaches at the firmware layer
• Passcode-protected screen locks
• Remote management and device detection
If you’re not using end-user security, you could suffer a breach through an unprotected
employee device that gets infected with malware and then spreads that infection
throughout the company network.

Another important piece of end-user security, beyond device protection, is employee


security awareness training. Employees must be trained regularly on how to detect
phishing emails, password security, handling sensitive data, and other important cyber
hygiene basics.

6.) OPREATIONAL SECURITY:- Operational security involves taking a step back


and looking at your entire security strategy as a whole to ensure that all security
tactics are working in unison throughout your operations, and that none are in
conflict with one another.

When providing operational security consultations, MSPs will try to think like an
attacker. They’ll probe all the different areas of your technology environment to see
where a potential breach could occur.

Operational security is the umbrella that encompasses all of your IT security processes. It
guarantees that the operation as a whole is not only securing all areas of a potential
breach, but also regularly updating its security strategies to keep up with the latest
threats and security advances.

[CO2]

Session: Jan-June 2023 Faculty: Dr. Jyoti Vimal


2. Discuss the term cryptography?
ANS:- Cryptography is the study of secure communications techniques
that allow only the sender and intended recipient of a message to view its
contents. The term is derived from the Greek word kryptos, which means
hidden.
[CO3]

The last date of submission : 30 Jan 2023

Note: Instruction to submit assignment on moodle:

1. Do scan copy (clearly visible) for the assignment.


2. Compile all the scan pages and convert in .pdf format.
3. Upload the assignment on moodle.

Session: Jan-June 2023 Faculty: Dr. Jyoti Vimal

You might also like