CS_Lecture01.pptx for the new lab conservatio of computer network

saad504633 40 views 17 slides Jun 07, 2024
Slide 1
Slide 1 of 17
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17

About This Presentation

this is for computer engering


Slide Content

Cyber Security(CS) by Dr. Munir Ahmad

About Instructor PhD(CS), MS(CS), BS(CS) Assistant Professor @ NCBAE Certificates* and Trainings**: CISM*, CEH*, CDPSE**, COBIT 2019** Compliance & regulatory Coordinator ISACA Lahore Chapter The World CIO 200 Award – Leader 2021, 2022 Executive Director United International Group United Software, United Track System, United Insurance, United Life Assurance and ApnaBank Research Interests: Machine Learning, Data Mining, Sentiment Analysis, Big Data and Cyber Security

Class Introduction ?

Introduction This course provides students an introduction to common cyber security threats, vulnerabilities, and risks related to web applications, networks, software and mobile applications. The course provides basic concepts and terminology used in the information and cyber security fields. Moreover, it will also enable students to differentiate between the various forms of malware and how they affect computers and networks.

CLO No CLO Bloom Taxonomy CLO-1 To be able to identify computer system threats C2 (Understand) CLO-2 To be able to identify Malware attacks, and understand the stages of attack and payloads. C2 (Understand) CLO-3 Implement various cryptographic techniques and simulate attack scenarios C3 (Apply)

Course Outline Introduction to Cyber security; Networks and the Internet; cyber threat landscape; understanding security; information security Principles (Confidentiality, Integrity, Availability); Information Security Terminology; Who are the attackers; Advanced Persistent Threat (APT); Malware, types of malware; Attacks using malware; Malware Attack Lifecycle: Stages of Attack; Social engineering attacks; types of payload; Industrial Espionage in Cyberspace; Basic cryptography; Web application attacks; Database security; Cyber kill chain; Privacy and anonymity; Network security; Software security; Mobile device security; Mobile app security; Cyber Terrorism and Information Warfare; Introduction to Digital Forensics; Digital Forensics Categories.

Books Reference Materials: (or use any other standard and latest books) Computer Security Fundamentals by Chuck Easttom , 4th edition or latest Security+ Guide to Network Security Fundamentals, by Mark Ciampa, 5th Edition Security in Computing by C.P. Pfleeger , Prentice-Hall, 4th Edition or Latest

What is Cyber Security It is the practice of protecting computer systems, networks, data, and digital assets from various forms of threats, attacks, and unauthorized access. It is a critical field in the modern digital age, as the increasing reliance on technology and the internet has made individuals, businesses, and governments more vulnerable to cyber threats. Cybersecurity plays a pivotal role in ensuring the confidentiality, integrity, and availability of digital information and resources.

Key Aspects of Cybersecurity Confidentiality Integrity Availability Authentication and Authorization Protection Against Threats Incident Response Education and Training Compliance and Regulations CIA Trait

Confidentiality Confidentiality in the context of cybersecurity refers to the protection of sensitive information from unauthorized access, disclosure, or exposure. It is one of the three fundamental principles of information security, along with integrity and availability, often referred to as the CIA triad

Integrity I ntegrity refers to the concept of ensuring that data and information remain accurate, trustworthy, and unaltered throughout its lifecycle. Maintaining data integrity is essential because it helps protect against unauthorized changes, tampering, or corruption, which could lead to misinformation, system malfunctions, or security breaches

Availability A vailability refers to the accessibility and usability of information technology systems, applications, and data when needed by authorized users. It is one of the three fundamental principles of information security, often referred to as the CIA triad (Confidentiality, Integrity, and Availability). Ensuring availability is critical because disruptions to IT systems or data can result in downtime, loss of productivity, financial losses, and potential damage to an organization's reputation

Importance of Cybersecurity Protection of Data Business Continuity Privacy National Security Innovation Global Economy

Types of Threats Malware Phishing Social Engineering DDoS Attacks Ransomware Insider Threats Zero-Day Exploits SQL Injection Man-in-the-Middle (MitM) Attacks password Attacks Drive-By Downloads IoT (Internet of Things) Vulnerabilities Supply Chain Attacks Fileless Malware Cryptojacking Advanced Persistent Threats (APTs) Cross-Site Scripting (XSS)

Types of Attackers Script Kiddies Hacktivists Cybercriminals Nation-State Actors Insiders Phishers Malware Authors Industrial Espionage Agents Hackers for Hire Cyber Warriors Cyber Vigilantes Ethical Hackers (White Hat Hackers)

Thanks Assignment_01 Deadline – E mail: [email protected] Mobile: 03007300232