, ,

Cyber Security: Concepts, Classifications, Vulnerabilities & Frameworks

Admin Avatar

by

3 minutes

Read Time


Cyber Security refers to the collection of technologies, processes, practices, and laws designed to protect computers, networks, systems, applications, and data from cyber threats such as unauthorized access, misuse, disruption, modification, and destruction.

It aims to ensure:

  • Confidentiality (data secrecy)
  • Integrity (accuracy & reliability)
  • Availability (access when needed)

This is known as the CIA Security Triad.


Global Timeline & Important Milestones
YearEvent
1960sFirst mainframe security measures introduced
1969ARPANET created — foundation of internet
1971First computer virus Creeper Virus created
1983First computer worm theory formed
1988First major cyber attack: Morris Worm
1990sRise of email viruses (ILOVEYOU, Melissa)
2000First major DDoS attack took down major sites
2004First Anti-Phishing Working Group (APWG) formed
2009Bitcoin & Blockchain introduced
2010Stuxnet attack — first large cyber warfare usage
2013Edward Snowden reveals global surveillance
2020–2023AI-based attacks, ransomware surge
2024 onwardZero-Trust security and quantum cyber defense emerging

✔ Types of Cyber Security

CategoryDescriptionExamples
Network SecurityProtects internal networks from intrudersFirewall, IDS, IPS
Application SecuritySecures software & apps against vulnerabilitiesSecure coding, Pen testing
Information Security (InfoSec)Protects data confidentiality & privacyEncryption, Digital signatures
Cloud SecuritySecures cloud environmentsAWS, Azure security tools
IoT SecurityProtects connected devicesSmart home/device security
Operational Security (OPSEC)Policies to secure data access and handlingUser roles, access control
Endpoint SecuritySecures end-user devicesAntivirus, EDR

✔ Types of Cyber Threats (Detailed Classification)

🔹 1. Malware

Malicious software designed to damage systems.

Types:

  • Virus
  • Worm
  • Trojan Horse
  • Spyware
  • Adware
  • Rootkits
  • Ransomware (locks system and demands money — e.g., WannaCry, Locky)

🔹 2. Social Engineering Attacks

  • Phishing (emails, SMS)
  • Spear Phishing (targeted phishing)
  • Baiting (USB tricks)
  • Pretexting (fake identity)

🔹 3. Network-Based Attacks

  • DDoS attack (Distributed Denial of Service)
  • MITM (Man-in-the-Middle attack)
  • Eavesdropping / Packet sniffing

🔹 4. Web-Application Attacks

  • SQL Injection
  • Cross-Site Scripting (XSS)
  • Cross-Site Request Forgery (CSRF)
  • Zero-Day Exploits

Cyber Attack Life Cycle (Kill Chain)

  1. Reconnaissance
  2. Weaponization
  3. Delivery
  4. Exploitation
  5. Installation
  6. Command & Control
  7. Actions on Objective

Security Measures & Techniques
TechniquePurpose
FirewallFilters network traffic
EncryptionConverts data into unreadable form
HashingOne-way data protection
IDS/IPSDetects and prevents attacks
Zero-Trust ModelTrust nothing; verify everything
Two-Factor Authentication (2FA)Additional security layer
Access ControlRegulates user permissions

Commonly used Security Tools
  • Antivirus / Anti-malware: Norton, Kaspersky, Quick Heal
  • Penetration Testing Tools: Kali Linux, Metasploit, Burp Suite
  • Network Analysis: Wireshark, Nmap
  • Password Cracking Tools: Hydra, John the Ripper

Important Cryptographic Concepts
TypeExplanationExamples
Symmetric EncryptionSame key for encryption & decryptionAES, DES
Asymmetric EncryptionPublic + Private keysRSA, ECC
HashingCreates fixed-length hashSHA-256, MD5
Digital CertificatesUsed in secure communicationSSL, TLS

Cyber Laws & Governance (India)
YearLaw / Program
2000IT Act, 2000 (first cyber law in India)
2008 AmendmentAdded cyber terrorism, identity theft, fraud
2020CERT-IN cybersecurity guidelines strengthened
2022Digital Personal Data Protection (DPDP) Bill
2023National Cybersecurity Strategy introduced

Famous Cyber Attacks
AttackYearTarget
Morris Worm1988First major system shutdown
ILOVEYOU Virus2000Email systems globally
WannaCry Ransomware2017200,000+ computers worldwide
Pegasus Spyware Case2019–2021Mobile surveillance
Colonial Pipeline Hack2021U.S. energy infrastructure

Career Roles in Cyber Security
  • Security Analyst
  • Penetration Tester (Ethical Hacker)
  • Cyber Forensic Expert
  • SOC Analyst
  • Incident Response Specialist

Short Questions & Answers
  1. Q: What does CIA in cyber security stand for?
    A: Confidentiality, Integrity, Availability.
  2. Q: What is ransomware?
    A: Malware that locks data and demands payment.
  3. Q: Who invented the first computer worm?
    A: Robert T. Morris (Morris Worm, 1988).
  4. Q: Name India’s cyber law.
    A: Information Technology (IT) Act, 2000.
  5. Q: Which tool is used to monitor network traffic?
    A: Wireshark.
  6. Q: What is phishing?
    A: Trick users into revealing sensitive information.
  7. Q: What is a firewall?
    A: A security device/software that filters and controls network traffic.
  8. Q: What is the strongest encryption standard widely used today?
    A: AES-256.

Discover more from

Subscribe now to keep reading and get access to the full archive.

Continue reading