Fundamentals of Cyber Security
eBook - ePub

Fundamentals of Cyber Security

Principles, Theory and Practices

Mayank Bhushan

  1. English
  2. ePUB (apto para móviles)
  3. Disponible en iOS y Android
eBook - ePub

Fundamentals of Cyber Security

Principles, Theory and Practices

Mayank Bhushan

Detalles del libro
Vista previa del libro
Índice
Citas

Información del libro

Learn the various aspects of Cyber Security concepts. Key Features

  • Strengthens the foundations, as detailed explanation of the concepts are given.
  • Simple language, crystal clear approach, straight forward comprehensible presentation.
  • Adopting user-friendly classroom lecture style.
  • The concepts are duly supported by several examples.
  • Previous years question papers are also included.
  • The important set of questions comprising of more than 90 questions with short answers are also included.


Description
The book has been written in such a way that the concepts are explained in detail, giving adequate emphasis on examples. To make clarity on the topic, diagrams are given extensively throughout the text. Various questions are included that vary widely in type and difficulty to understand the text. This text is user-focused and has been highly updated including topics, pictures and examples.
The book features the most current research findings in all aspects of information security. From successfully implementing technology change to understanding the human factors in IT utilization, these volumes address many of the core concepts and organizational applications, implications of information technology in organizations. What You Will Learn

  • Information Systems, Information Security, Security Policies and Standards
  • Application Security, Security Threats
  • Development of secure Information System
  • Security Issues In Hardware

  • Who this book is for
    Students, Programmers, researchers, and software developers who wish to learn the basics and various aspects of cybersecurity. Table of Contents
    1. Introduction to Information Systems
    2. Information Security
    3. Application Security
    4. Security Threats
    5. Development of secure Information System
    6. Security Issues In Hardware
    7. Security Policies
    8. Information Security Standards About the Author
    Mayank Bhushan has completed his M.Tech. from Motilal Nehru National Institute of Technology Allahabad. He has 7 years of experience in academics. Rajkumar Singh Rathore is working as Assistant Professor in Computer Science and Engineering Department at Galgotias College of Engg. & Technology, Greater Noida (U.P.). Aatif Jamshed is working as Assistant Professor in Computer Science and Engineering Department at Galgotias College of Engg. & Technology, Greater Noida (U.P).

Preguntas frecuentes

¿Cómo cancelo mi suscripción?
Simplemente, dirígete a la sección ajustes de la cuenta y haz clic en «Cancelar suscripción». Así de sencillo. Después de cancelar tu suscripción, esta permanecerá activa el tiempo restante que hayas pagado. Obtén más información aquí.
¿Cómo descargo los libros?
Por el momento, todos nuestros libros ePub adaptables a dispositivos móviles se pueden descargar a través de la aplicación. La mayor parte de nuestros PDF también se puede descargar y ya estamos trabajando para que el resto también sea descargable. Obtén más información aquí.
¿En qué se diferencian los planes de precios?
Ambos planes te permiten acceder por completo a la biblioteca y a todas las funciones de Perlego. Las únicas diferencias son el precio y el período de suscripción: con el plan anual ahorrarás en torno a un 30 % en comparación con 12 meses de un plan mensual.
¿Qué es Perlego?
Somos un servicio de suscripción de libros de texto en línea que te permite acceder a toda una biblioteca en línea por menos de lo que cuesta un libro al mes. Con más de un millón de libros sobre más de 1000 categorías, ¡tenemos todo lo que necesitas! Obtén más información aquí.
¿Perlego ofrece la función de texto a voz?
Busca el símbolo de lectura en voz alta en tu próximo libro para ver si puedes escucharlo. La herramienta de lectura en voz alta lee el texto en voz alta por ti, resaltando el texto a medida que se lee. Puedes pausarla, acelerarla y ralentizarla. Obtén más información aquí.
¿Es Fundamentals of Cyber Security un PDF/ePUB en línea?
Sí, puedes acceder a Fundamentals of Cyber Security de Mayank Bhushan en formato PDF o ePUB, así como a otros libros populares de Computer Science y Cryptography. Tenemos más de un millón de libros disponibles en nuestro catálogo para que explores.

Información

Año
2018
ISBN
9789386551559
Categoría
Cryptography

Chapter-1

Introduction to Information Systems

1.1 INTRODUCTION

In this age of data, most fields of endeavor like education, producing, research, games, recreation, and business treats data systems as a desire. Indeed, each activity in our everyday life these days needs folks to induce concerned with the use of data systems.
Have you ever used Associate in Nursing ATM to withdraw cash or to shop for the product at an oversized supermarket? In each case, we have a tendency to area unit indirectly victimization the facilities offered by Associate in the Nursing system.
What is a system? A system is just a gaggle of activities and components, which are organized to realize a definite objective. Associate in the Nursing system could be a combination of hardware, code and telecommunication systems, which may support business operations to extend productivity, and facilitate managers create choices.
In this age, the success of a business depends on the data system. Several organizations these days use data systems to supply services with larger satisfaction to customers, to access a wide variety of data, to handle business changes at a larger speed, and to extend the productivity of staff. For the supported variety of research organizations, an efficient system ought to be ready to exceed client expectations and fulfill business wants.

1.2 MODELLING THE BUSINESS METHOD

Many corporations these days use data as a basis to extend productivity, manufacturing quality merchandise, providing quality services, making client confidence, and creating timely choices.
As such, data technology has become the prime reason for the success and failure of an organization to vie in business. This illustrates the impact of data technology on business operations these days. As a result, coming up with Associate in the Nursing data system of high quality is vital therefore that organizations will vie with success within the world market.
Information systems specialists have to be compelled to perceive the business operation of an organization before they'll style a comprehensive system. Every business situation is probably going to diverge. As Associate in Nursing example, business transactions at a grocery, bank, and edifice need data systems that area unit completely different and distinctive.
Figure 1.1: Computers in business
An analyst applies a method known as Business method Modelling to represent corporations operations and data needs. Works in the data technology based mostly department. This person is liable for designing, analyzing and implementing data systems.

1.2.1 Business Profile, Model and Process

In trying to understand the operation of a certain company, a system analyst needs to develop a business profile and think about/believe some business models. This could be explained briefly as shown in Figure 1.2 below.
Figure 1.2: General duties of a system analyst
Business profile covers ownership, structure, and management of the company, together with its customers and suppliers; while a business model can take the form of an actual, physical type, a virtual store, and so on. They can be as described/explained as these, or can just be in brief forms.
Business Process explains a certain process, activity, and the results expected. It is basically a way of doing business, which begins with the customer and ends with the customer. Customers can either be external or internal.
Figure 1.3 illustrates a business process for “Student Registration”.
Figure 1.3: A business process
The above business process has a beginning and an end, three sub-processes and a result. When a company tries to simplify operations, or tries to decrease operational cost, or increase value to customers, the company is said to be involved in business process re-engineering(BPR).

1.3 INFORMATION SYSTEM COMPONENTS

A system could be a set of connected parts, which may method input to provide an explicit output. Each system needs a type of knowledge input. For instance, Associate in Nursing ATM accepts knowledge once you enter the PIN. A washer accepts knowledge once you choose the beginning buttons. They method the inputs and turn out their individual outputs.
In Associate in tending data system, input file carries with its facts and figures, that kind the systems material. Data is knowledge that has been usefully processed. However, Associate in data system doesn't solely contain knowledge. There also are alternative components within the system, that area unit connected and area unit in support of one another. The presence of these connected components makes data a lot of helpful whereby, it will be created accessible, will be processed, distributed, manipulated, saved, and so on. this mixture offers rise to a system, that is orderly Associate in per se it's referred to as an “Information System”
Figure 1.4: Information system
The activity of converting data into information is called a process. An information system contains FIVE main components: the hardware, software, data, process and human, as shown in Figure 1.5 below:
Figure 1.5: Components of an information system
  • Hardware
    Hardware is the physical embodiment of an information system. It is one of the main elements which creates the information system cycle.
Information system's hardware refers to any or all kinds of hardware and also newspapers, web sites, and TV used for input, processing, managing, distributing business partner degreed saving data that area unit getting used in an organisation. Samples of the hardware area unit the physical computers, networks, installation, scanners, digital drives, and so on.
Basic hardware for a definite pc consists of 4 main parts as shown in Figure 1.6 below.
Figure 1.6: Basic hardware of a computer
To understand in greater detail on the functions and examples of the computer hardware, we can refer to Table 1.1 below.
Type of Hardware
Functions
Examples
Input
Giving data input to the system.
Keyboard, mouse, pointer, screen, touch ball and scanner.
Processing
Operating the computer system.
Central processing unit and memory.
Output
Can display results or output which are generated from the computer system.
Screen, microphone and printer.
Storage
For storing data inside the computer.
Hard disk, floppy disk, CD-ROM and magnetic tape.
Table 1.1: Functions of the Basic Hardware of a Computer
Computers is helpful tools if you recognize the way to use (for selfish reasons) To change computers to operate a lot of effectively and to (branch out into different things) their functions, you wish the communication network to attach many computers along. The network provides the hardware support to change communication to be established among one another. The communication network includes modems, hubs, cables and different devices.
  • Software system
    Software consists of two classes a the system software system and therefore the application software.
    - System software system controls the laptop and contains the software system and device drivers, which may communicate with the hardware. It also can change information into a replacement kind, stop viruses and create copies.
    - Application software system contains programs that will help users and change corporations to (do/complete) business functions. Users will increase working well and getting a lot done with the presence of application software system like spreadsheets, data processing, ordering systems, and (money owed to you).
  • Data
    Data refers to the raw facts on anything or things/businesses like student names, courses and marks. The raw data that has not yet been given can be Processed to become more useful information.
Information is an organised, meaningful and useful (understanding/ explanation) of dat...

Índice

  1. Cover Page
  2. Title Page
  3. Copyright Page
  4. Dedication
  5. Preface
  6. Acknowledgement
  7. Table of Contents
  8. Chapter-1 Introduction to Information Systems
  9. Chapter-2 Information Security
  10. Chapter-3 Application Security
  11. Chapter-4 Security Threats
  12. Chapter-5 Development of secure Information System
  13. Chapter-6 Security Issues In Hardware
  14. Chapter-7 Security Policies
  15. Chapter-8 Information Security Standards
  16. Important Questions
  17. Previous Years University Question Papers
  18. References
Estilos de citas para Fundamentals of Cyber Security

APA 6 Citation

Bhushan, M., Rathore, R. S., & Jamshed, A. (2020). Fundamentals of Cyber Security ([edition unavailable]). BPB Publications. Retrieved from https://www.perlego.com/book/2028242/fundamentals-of-cyber-security-principles-theory-and-practices-pdf (Original work published 2020)

Chicago Citation

Bhushan, Mayank, Rajkumar Singh Rathore, and Aatif Jamshed. (2020) 2020. Fundamentals of Cyber Security. [Edition unavailable]. BPB Publications. https://www.perlego.com/book/2028242/fundamentals-of-cyber-security-principles-theory-and-practices-pdf.

Harvard Citation

Bhushan, M., Rathore, R. S. and Jamshed, A. (2020) Fundamentals of Cyber Security. [edition unavailable]. BPB Publications. Available at: https://www.perlego.com/book/2028242/fundamentals-of-cyber-security-principles-theory-and-practices-pdf (Accessed: 15 October 2022).

MLA 7 Citation

Bhushan, Mayank, Rajkumar Singh Rathore, and Aatif Jamshed. Fundamentals of Cyber Security. [edition unavailable]. BPB Publications, 2020. Web. 15 Oct. 2022.