Fundamentals of Cyber Security
eBook - ePub

Fundamentals of Cyber Security

Principles, Theory and Practices

Mayank Bhushan

  1. English
  2. ePUB (handyfreundlich)
  3. Über iOS und Android verfügbar
eBook - ePub

Fundamentals of Cyber Security

Principles, Theory and Practices

Mayank Bhushan

Angaben zum Buch
Buchvorschau
Inhaltsverzeichnis
Quellenangaben

Über dieses Buch

Learn the various aspects of Cyber Security concepts. Key Features

  • Strengthens the foundations, as detailed explanation of the concepts are given.
  • Simple language, crystal clear approach, straight forward comprehensible presentation.
  • Adopting user-friendly classroom lecture style.
  • The concepts are duly supported by several examples.
  • Previous years question papers are also included.
  • The important set of questions comprising of more than 90 questions with short answers are also included.


Description
The book has been written in such a way that the concepts are explained in detail, giving adequate emphasis on examples. To make clarity on the topic, diagrams are given extensively throughout the text. Various questions are included that vary widely in type and difficulty to understand the text. This text is user-focused and has been highly updated including topics, pictures and examples.
The book features the most current research findings in all aspects of information security. From successfully implementing technology change to understanding the human factors in IT utilization, these volumes address many of the core concepts and organizational applications, implications of information technology in organizations. What You Will Learn

  • Information Systems, Information Security, Security Policies and Standards
  • Application Security, Security Threats
  • Development of secure Information System
  • Security Issues In Hardware

  • Who this book is for
    Students, Programmers, researchers, and software developers who wish to learn the basics and various aspects of cybersecurity. Table of Contents
    1. Introduction to Information Systems
    2. Information Security
    3. Application Security
    4. Security Threats
    5. Development of secure Information System
    6. Security Issues In Hardware
    7. Security Policies
    8. Information Security Standards About the Author
    Mayank Bhushan has completed his M.Tech. from Motilal Nehru National Institute of Technology Allahabad. He has 7 years of experience in academics. Rajkumar Singh Rathore is working as Assistant Professor in Computer Science and Engineering Department at Galgotias College of Engg. & Technology, Greater Noida (U.P.). Aatif Jamshed is working as Assistant Professor in Computer Science and Engineering Department at Galgotias College of Engg. & Technology, Greater Noida (U.P).

Häufig gestellte Fragen

Wie kann ich mein Abo kündigen?
Gehe einfach zum Kontobereich in den Einstellungen und klicke auf „Abo kündigen“ – ganz einfach. Nachdem du gekündigt hast, bleibt deine Mitgliedschaft für den verbleibenden Abozeitraum, den du bereits bezahlt hast, aktiv. Mehr Informationen hier.
(Wie) Kann ich Bücher herunterladen?
Derzeit stehen all unsere auf Mobilgeräte reagierenden ePub-Bücher zum Download über die App zur Verfügung. Die meisten unserer PDFs stehen ebenfalls zum Download bereit; wir arbeiten daran, auch die übrigen PDFs zum Download anzubieten, bei denen dies aktuell noch nicht möglich ist. Weitere Informationen hier.
Welcher Unterschied besteht bei den Preisen zwischen den Aboplänen?
Mit beiden Aboplänen erhältst du vollen Zugang zur Bibliothek und allen Funktionen von Perlego. Die einzigen Unterschiede bestehen im Preis und dem Abozeitraum: Mit dem Jahresabo sparst du auf 12 Monate gerechnet im Vergleich zum Monatsabo rund 30 %.
Was ist Perlego?
Wir sind ein Online-Abodienst für Lehrbücher, bei dem du für weniger als den Preis eines einzelnen Buches pro Monat Zugang zu einer ganzen Online-Bibliothek erhältst. Mit über 1 Million Büchern zu über 1.000 verschiedenen Themen haben wir bestimmt alles, was du brauchst! Weitere Informationen hier.
Unterstützt Perlego Text-zu-Sprache?
Achte auf das Symbol zum Vorlesen in deinem nächsten Buch, um zu sehen, ob du es dir auch anhören kannst. Bei diesem Tool wird dir Text laut vorgelesen, wobei der Text beim Vorlesen auch grafisch hervorgehoben wird. Du kannst das Vorlesen jederzeit anhalten, beschleunigen und verlangsamen. Weitere Informationen hier.
Ist Fundamentals of Cyber Security als Online-PDF/ePub verfügbar?
Ja, du hast Zugang zu Fundamentals of Cyber Security von Mayank Bhushan im PDF- und/oder ePub-Format sowie zu anderen beliebten Büchern aus Computer Science & Cryptography. Aus unserem Katalog stehen dir über 1 Million Bücher zur Verfügung.

Information

Jahr
2018
ISBN
9789386551559

Chapter-1

Introduction to Information Systems

1.1 INTRODUCTION

In this age of data, most fields of endeavor like education, producing, research, games, recreation, and business treats data systems as a desire. Indeed, each activity in our everyday life these days needs folks to induce concerned with the use of data systems.
Have you ever used Associate in Nursing ATM to withdraw cash or to shop for the product at an oversized supermarket? In each case, we have a tendency to area unit indirectly victimization the facilities offered by Associate in the Nursing system.
What is a system? A system is just a gaggle of activities and components, which are organized to realize a definite objective. Associate in the Nursing system could be a combination of hardware, code and telecommunication systems, which may support business operations to extend productivity, and facilitate managers create choices.
In this age, the success of a business depends on the data system. Several organizations these days use data systems to supply services with larger satisfaction to customers, to access a wide variety of data, to handle business changes at a larger speed, and to extend the productivity of staff. For the supported variety of research organizations, an efficient system ought to be ready to exceed client expectations and fulfill business wants.

1.2 MODELLING THE BUSINESS METHOD

Many corporations these days use data as a basis to extend productivity, manufacturing quality merchandise, providing quality services, making client confidence, and creating timely choices.
As such, data technology has become the prime reason for the success and failure of an organization to vie in business. This illustrates the impact of data technology on business operations these days. As a result, coming up with Associate in the Nursing data system of high quality is vital therefore that organizations will vie with success within the world market.
Information systems specialists have to be compelled to perceive the business operation of an organization before they'll style a comprehensive system. Every business situation is probably going to diverge. As Associate in Nursing example, business transactions at a grocery, bank, and edifice need data systems that area unit completely different and distinctive.
Figure 1.1: Computers in business
An analyst applies a method known as Business method Modelling to represent corporations operations and data needs. Works in the data technology based mostly department. This person is liable for designing, analyzing and implementing data systems.

1.2.1 Business Profile, Model and Process

In trying to understand the operation of a certain company, a system analyst needs to develop a business profile and think about/believe some business models. This could be explained briefly as shown in Figure 1.2 below.
Figure 1.2: General duties of a system analyst
Business profile covers ownership, structure, and management of the company, together with its customers and suppliers; while a business model can take the form of an actual, physical type, a virtual store, and so on. They can be as described/explained as these, or can just be in brief forms.
Business Process explains a certain process, activity, and the results expected. It is basically a way of doing business, which begins with the customer and ends with the customer. Customers can either be external or internal.
Figure 1.3 illustrates a business process for “Student Registration”.
Figure 1.3: A business process
The above business process has a beginning and an end, three sub-processes and a result. When a company tries to simplify operations, or tries to decrease operational cost, or increase value to customers, the company is said to be involved in business process re-engineering(BPR).

1.3 INFORMATION SYSTEM COMPONENTS

A system could be a set of connected parts, which may method input to provide an explicit output. Each system needs a type of knowledge input. For instance, Associate in Nursing ATM accepts knowledge once you enter the PIN. A washer accepts knowledge once you choose the beginning buttons. They method the inputs and turn out their individual outputs.
In Associate in tending data system, input file carries with its facts and figures, that kind the systems material. Data is knowledge that has been usefully processed. However, Associate in data system doesn't solely contain knowledge. There also are alternative components within the system, that area unit connected and area unit in support of one another. The presence of these connected components makes data a lot of helpful whereby, it will be created accessible, will be processed, distributed, manipulated, saved, and so on. this mixture offers rise to a system, that is orderly Associate in per se it's referred to as an “Information System”
Figure 1.4: Information system
The activity of converting data into information is called a process. An information system contains FIVE main components: the hardware, software, data, process and human, as shown in Figure 1.5 below:
Figure 1.5: Components of an information system
  • Hardware
    Hardware is the physical embodiment of an information system. It is one of the main elements which creates the information system cycle.
Information system's hardware refers to any or all kinds of hardware and also newspapers, web sites, and TV used for input, processing, managing, distributing business partner degreed saving data that area unit getting used in an organisation. Samples of the hardware area unit the physical computers, networks, installation, scanners, digital drives, and so on.
Basic hardware for a definite pc consists of 4 main parts as shown in Figure 1.6 below.
Figure 1.6: Basic hardware of a computer
To understand in greater detail on the functions and examples of the computer hardware, we can refer to Table 1.1 below.
Type of Hardware
Functions
Examples
Input
Giving data input to the system.
Keyboard, mouse, pointer, screen, touch ball and scanner.
Processing
Operating the computer system.
Central processing unit and memory.
Output
Can display results or output which are generated from the computer system.
Screen, microphone and printer.
Storage
For storing data inside the computer.
Hard disk, floppy disk, CD-ROM and magnetic tape.
Table 1.1: Functions of the Basic Hardware of a Computer
Computers is helpful tools if you recognize the way to use (for selfish reasons) To change computers to operate a lot of effectively and to (branch out into different things) their functions, you wish the communication network to attach many computers along. The network provides the hardware support to change communication to be established among one another. The communication network includes modems, hubs, cables and different devices.
  • Software system
    Software consists of two classes a the system software system and therefore the application software.
    - System software system controls the laptop and contains the software system and device drivers, which may communicate with the hardware. It also can change information into a replacement kind, stop viruses and create copies.
    - Application software system contains programs that will help users and change corporations to (do/complete) business functions. Users will increase working well and getting a lot done with the presence of application software system like spreadsheets, data processing, ordering systems, and (money owed to you).
  • Data
    Data refers to the raw facts on anything or things/businesses like student names, courses and marks. The raw data that has not yet been given can be Processed to become more useful information.
Information is an organised, meaningful and useful (understanding/ explanation) of dat...

Inhaltsverzeichnis

  1. Cover Page
  2. Title Page
  3. Copyright Page
  4. Dedication
  5. Preface
  6. Acknowledgement
  7. Table of Contents
  8. Chapter-1 Introduction to Information Systems
  9. Chapter-2 Information Security
  10. Chapter-3 Application Security
  11. Chapter-4 Security Threats
  12. Chapter-5 Development of secure Information System
  13. Chapter-6 Security Issues In Hardware
  14. Chapter-7 Security Policies
  15. Chapter-8 Information Security Standards
  16. Important Questions
  17. Previous Years University Question Papers
  18. References
Zitierstile für Fundamentals of Cyber Security

APA 6 Citation

Bhushan, M., Rathore, R. S., & Jamshed, A. (2020). Fundamentals of Cyber Security ([edition unavailable]). BPB Publications. Retrieved from https://www.perlego.com/book/2028242/fundamentals-of-cyber-security-principles-theory-and-practices-pdf (Original work published 2020)

Chicago Citation

Bhushan, Mayank, Rajkumar Singh Rathore, and Aatif Jamshed. (2020) 2020. Fundamentals of Cyber Security. [Edition unavailable]. BPB Publications. https://www.perlego.com/book/2028242/fundamentals-of-cyber-security-principles-theory-and-practices-pdf.

Harvard Citation

Bhushan, M., Rathore, R. S. and Jamshed, A. (2020) Fundamentals of Cyber Security. [edition unavailable]. BPB Publications. Available at: https://www.perlego.com/book/2028242/fundamentals-of-cyber-security-principles-theory-and-practices-pdf (Accessed: 15 October 2022).

MLA 7 Citation

Bhushan, Mayank, Rajkumar Singh Rathore, and Aatif Jamshed. Fundamentals of Cyber Security. [edition unavailable]. BPB Publications, 2020. Web. 15 Oct. 2022.