This is one of the scientific concentrations in the Undiksha Information Systems Study Program that focuses on areas related to practices to protect systems, networks, and programs from digital attacks.
Cyber could be a prefix determined from the word cybernetics and has procured the common meaning of through the utilize of a computer which is additionally named as the internet. The word security in common utilization is synonymous with being secure, but as a specialized term security implies not as it were that something is secure, but that it has been secured. Joining the two words together shape the word cyber security is concerned with making the internet secure from dangers, to be specific cyber dangers.
The data and communications innovation (ICT) industry has advanced incredibly over the final half century. With the approach of the web, security gets to be a major concern. ICT gadgets and components are for the most part connect reliable and defenseless to the security assaults. The act of securing ICT frameworks and their substance has come to be known as cybersecurity. Cybersecurity is an vital apparatus in securing and anticipating unauthorized reconnaissance. As commonly utilized, the term cybersecurity alludes to three things:
- A set of exercises and other measures, specialized and non-technical, aiming to ensure computers, computer systems, related equipment and gadgets program, and the data they contain and communicate, counting computer program and information, as well as other components of the internet, from all dangers, counting dangers to the national security.
- The degree of assurance coming about from the application of these exercises and measures.
- The related field of proficient endeavor, counting inquire about and examination, pointed at executing and those exercises and progressing their quality
To secure a computer framework, it is vital to get it the assaults that can be made against it, and these dangers can ordinarily be classified as underneath:
Backdoor attacks Denial of service attack
- Direct Access attack
- Eavesdropping
- Spoofing
- Phishing
Technology for cybersecurity
- Cryptographic systems : A widely used cybersecurity system involves the use of codes and ciphers to transform information into unintelligible data.
- Firewall : Use to block traffic from outside, but it could be also used to block traffic from inside.
- An Intrusion Detection System (IDS): IDS is an additional protection measure used to detect attack.
- AntiMalware Software and scanners : Viruses, worms and Trojan horses are all examples of malicious software, or Malware for short. Special so called antiMalware tools are used to detect them and cure an infected system.
- Secure Socket Layer (SSL) : It is a suite of protocols that is a standard way to achieve a good level of security between web browser and websites.
- Research Areas in cyber Security
- Identity, Privacy and Trust Management
- Malware
- Biometrics.
- Cloud Security
- Computer Forensics
- Data protection legislation and security
- Cryptography and Formal Methods
The cyber security investigate activity is an endeavor to characterize a national R&D motivation that's required to enable the nation to urge ahead of enemies and create the innovations. These cutting edge innovations can secure data frameworks and systems. The investigate, improvement, test, assessment and other life cycle contemplations required are distant coming to from innovations that secure people and their data to innovations that will guarantee National Basic Frameworks are much more versatile. The R&D ventures prescribed in this activity must handle the vulnerabilities of nowadays and envision those of long-term . The activity may be a stage to work together to cultivate R&D to advance transformative arrangements and address basic cyber security challenges, through associations among scholastics, Industry and Govt.
Broad research areas
- Information Security
- Computer Network Security
- Application Security
- Web Services Security
- Mobile Security
- Protective Security
- Software Security
- Wireless & Sensor Network Security
- Software Coding Security
- Data Capturing devices and Security
- Security in Middleware, Interface and Interaction
- Security Services in Authentication, Authorisation, Accountability, Automation, Availability, Integrity and Non-repudiation
- Security Management
- Security Operations
- Digital Trust and Reputation
- Spatial Location (Geo-location) and Cyber Travel
- Spatial Intelligence Networks (Centralised, Distributed & Hybrid)
- Policy, Legal, Legislation & Compliance
- Security Standardisation
- Law, Legal and Ethical issues
- Digital Services
- Web Services, Internet Banking, E-Booking
- E-Government, Electronic Commerce
- Citizens Public Online Services
- Mobile Commerce
- E-Postal Services, E-Health, E-Learning and Online & Virtual Education
- Secure Protocols, Coding and Development
- Security Principles, Theory and Analysis
- Security Policy, Standards and Procedures
- Security in Business Processes
- Security Enforcing Function (SEF) Gateways
- Intrusion Detection Systems
- Intrusion Prevention Systems
- Firewalls & Spam identification and protection
- Anti-Virus and Anti-Malware Gateways
- Data Loss Prevention and Encryption Services
- Protection of Digital Services
- Protection of Business Information Systems
- Protection of Online Services
- Public Online Services
- Internet Banking
- Security, Trust, Privacy
- Security in Online Gaming Systems
- Security in e-Government and Electoral Systems
- Content Security
- Protection of Public Online Content Distribution Systems
- Secure practices, processes and procedures in Public Online Services
- Cryptography -PKI, HSMs, Symmetric and Asymmetric Crypto, Crypto Custodian & Crypto Standards and Practices
- Digital Forensics and Investigations
- HoneyPots and Honey Nets
- National Information Infrastructure (NII) protection
- National Critical Infrastructures (NCI) protection
- Critical Network Systems (CNS)