Cyber Security refers to the collection of technologies, processes, practices, and laws designed to protect computers, networks, systems, applications, and data from cyber threats such as unauthorized access, misuse, disruption, modification, and destruction.
It aims to ensure:
Confidentiality (data secrecy)
Integrity (accuracy & reliability)
Availability (access when needed)
This is known as the CIA Security Triad.
Global Timeline & Important Milestones
Year
Event
1960s
First mainframe security measures introduced
1969
ARPANET created — foundation of internet
1971
First computer virus Creeper Virus created
1983
First computer worm theory formed
1988
First major cyber attack: Morris Worm
1990s
Rise of email viruses (ILOVEYOU, Melissa)
2000
First major DDoS attack took down major sites
2004
First Anti-Phishing Working Group (APWG) formed
2009
Bitcoin & Blockchain introduced
2010
Stuxnet attack — first large cyber warfare usage
2013
Edward Snowden reveals global surveillance
2020–2023
AI-based attacks, ransomware surge
2024 onward
Zero-Trust security and quantum cyber defense emerging
✔ Types of Cyber Security
Category
Description
Examples
Network Security
Protects internal networks from intruders
Firewall, IDS, IPS
Application Security
Secures software & apps against vulnerabilities
Secure coding, Pen testing
Information Security (InfoSec)
Protects data confidentiality & privacy
Encryption, Digital signatures
Cloud Security
Secures cloud environments
AWS, Azure security tools
IoT Security
Protects connected devices
Smart home/device security
Operational Security (OPSEC)
Policies to secure data access and handling
User roles, access control
Endpoint Security
Secures end-user devices
Antivirus, EDR
✔ Types of Cyber Threats (Detailed Classification)
🔹 1. Malware
Malicious software designed to damage systems.
Types:
Virus
Worm
Trojan Horse
Spyware
Adware
Rootkits
Ransomware (locks system and demands money — e.g., WannaCry, Locky)