Skip to main content

CYBER SECURITY

 


CYBER SECURITY

Cybersecurity is the activity of preventing unauthorised access to, use of, disclosure of, interruption of, alteration of, or destruction of computer systems, networks, and data. It entails putting in place a variety of safeguards and technology to defend information and stop cyber threats.

Here are some crucial cybersecurity elements:

Keeping sensitive information private by limiting access to just those who have been given permission to view it. Access restrictions and encryption mechanisms are used in this.

Integrity: Preventing unauthorised modifications to ensure the accuracy and dependability of data. Data integrity is maintained via methods like data validation and checksums.

Availability: Making sure that data and computer systems are available to authorised users when they need them. To reduce downtime, strategies including redundancy, backups, and disaster recovery plans are used.

Verifying the identification of people or systems trying to access resources is known as authentication. Passwords, biometrics, and two-factor authentication (2FA) are frequently used authentication techniques.

Authorization is the process of granting people the proper access levels and permissions in accordance with their respective jobs and responsibilities. To enforce authorization, access restrictions and user management systems are used.

Network security: Defending networks against risks like viruses and unauthorised access. Network security techniques that are frequently utilised include firewalls, intrusion detection systems (IDS), and virtual private networks (VPNs).

Making sure that software programmes are created and maintained with security in mind is known as application security. Secure coding procedures, vulnerability analyses, and penetration testing are required.

Establishing plans and procedures for an effective response to cybersecurity issues is known as incident response. Teams that respond to incidents look into potential dangers, try to limit damage, and recover systems and data.

Security education and training: Informing users on security guidelines, rules, and threats. Regular training and awareness campaigns aid in lowering human error and encourage a culture that values security.

To proactively identify and address new cyber threats, threat intelligence is the collection and analysis of data on prospective threats and vulnerabilities.

It's crucial to remember that cybersecurity is a continuous activity since threats change quickly. In order to defend against new and emerging threats, organisations and individuals must remain vigilant, maintain systems current, and continually upgrade security measures.


 Control System: Traffic Management

Inception 

Trains are an essential part of their transportation networks; tens of thousands of kilometers of track carry people and goods daily, both within cities and across national borders. We begin our analysis of the fictitious Train Traffic Management System (TTMS) by specifying its requirements and the system use cases that further describe the required functionality.
Requirements for the Train Traffic
Management System
This is a very large and highly complex system that in reality would not be specified by simple requirements.
The Train Traffic Management System has two primary functions: train routing and train systems monitoring. Related functions include traffic planning, failure prediction, train location tracking, traffic monitoring, collision avoidance, and maintenance logging.

Functional Requirements
From these functions, we define eight use cases, as shown in the following list.
 Route Train: Establish a train plan that defines the travel route for a particular train.
 Plan Traffic: Establish a traffic plan that provides guidance in the development of train plans for a time frame and geographic region.
 Monitor Train Systems: Monitor the onboard train systems for proper functioning.
 Predict Failure: Perform an analysis of train systems’ condition to predict probabilities of failure relative to the train plan.
 Track Train Location: Monitor the location of trains using TTMS resources and the Navstar Global Positioning System (GPS).
 Monitor Traffic: Monitor all train traffic within a geographic region.
 Avoid Collision: Provide the means, both automatic and manual, to avoid train collisions.
 Log Maintenance: Provide the means to log maintenance performed on trains.
These use cases establish the basic functional requirements for the Train Traffic Management System, that is, they tell us what the system must do for its users.

Nonfunctional requirements:
 Safely transport passengers and cargo
 Support train speeds up to 250 miles per hour
 Interoperate with the traffic management systems of operators at the TTMS boundary
 Ensure maximum reuse of and compatibility with existing equipment
 Provide a system availability level of 99.99%
 Provide complete functional redundancy of TTMS capabilities
 Provide accuracy of train position within 10.0 yards
 Provide accuracy of train speed within 1.5 miles per hour
 Respond to operator inputs within 1.0 seconds
 

System Architecture: Satellite-Based Navigation


Inception

The first steps in the development of the system architecture are really systems engineering
steps, rather than software engineering, even for purely or mostly software systems.

Requirements for the Satellite Navigation System

An Introduction to the Global Positioning System

The Global Positioning System provides anyone possessing a GPS receiver with the ability to
know his or her position on the earth regardless of the location, the time of day, or the
weather. The GPS architecture consists of three segments: Control, User, and Space. The
Control Segment is comprised of six ground stations, with the master control station located
at Shriver Air Force Base in Colorado. The receivers that assist many of us in our navigation
efforts constitute the User Segment, which receives position information from the 24
satellites that comprise the constellation of the Space Segment. The Global Positioning
System has numerous uses, both military and civilian.

Vision:

Provide effective and affordable Satellite Navigation System services for our
customers.

Functional requirements:

Provide SNS services

Operate the SNS

Maintain the SNS

Nonfunctional requirements:

Level of reliability to ensure adequate service guarantees

Sufficient accuracy to support current and future user needs

Functional redundancy in critical system capabilities

Extensive automation to minimize operational costs

Easily maintained to minimize maintenance costs

Extensible to support enhancement of system functionality

Long service life, especially for space-based elements

Constraints:

Compatibility with international standards

Maximal use of commercial-off-the-shelf (COTS) hardware and software

Defining the Boundaries of the Problem

The requirements and constraints do permit us to take an important first step in the design
of the system architecture for the Satellite Navigation Systemthe definition of its context.

This context diagram provides us with a clear understanding of the environment within
which the SNS must function. Actors, representing the external entities that interact with
the system, include people, other systems that provide services, and the actual environment

CYBER SECURITY-unit 1.ppt

Comments

Popular posts from this blog

COMMUNITY SERVICE PROJECT

  NATIONAL DEGREE COLLEGE::NANDYAL Introduction  Community Service Project is an experiential learning strategy that integrates meaningful community service with instruction, participation, learning and community development  Community Service Project involves students in community development and service activities and applies the experience to personal and academic development.  Community Service Project is meant to link the community with the college for mutual benefit. The community will be benefited with the focused contribution of the college students for the village/ local development. The college finds an opportunity to develop social sensibility and responsibility among students and also emerge as a socially responsible institution CSP HAND BOOK DOWNLOAD IT EVERYONE Guidelines from APSHE SAMPLE CSP PROJECTS done by the Students of National Degree College CHILD LABOUR AGRICULTURE PRODUCTS AND MARKETING USAGE OF MOBILE ONLINE PURCHAGE PLANTATION DIABETES WATER POLUTION U...

DATA STRUCTURES USING IN C

  DATA STRUCTURES  Data structures  are the fundamental building blocks of computer programming. They define how data is organized, stored, and manipulated within a program. Understanding data structures is very important for developing efficient and effective algorithms. In this material, we will explore the most commonly used data structures, including  arrays, linked lists, stacks, queues, trees, and graphs. What is Data Structure? A  data structure  is a storage that is used to store and organize data. It is a way of arranging data on a computer so that it can be accessed and updated efficiently. A data structure is not only used for organizing the data. It is also used for processing, retrieving, and storing data. There are different basic and advanced types of data structures that are used in almost every program or software system that has been developed. So we must have good knowledge about data structures.  Classification of Data Structure: Li...