CS_Lecture01.pptx for the new lab conservatio of computer network
saad504633
40 views
17 slides
Jun 07, 2024
Slide 1 of 17
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
About This Presentation
this is for computer engering
Size: 338.23 KB
Language: en
Added: Jun 07, 2024
Slides: 17 pages
Slide Content
Cyber Security(CS) by Dr. Munir Ahmad
About Instructor PhD(CS), MS(CS), BS(CS) Assistant Professor @ NCBAE Certificates* and Trainings**: CISM*, CEH*, CDPSE**, COBIT 2019** Compliance & regulatory Coordinator ISACA Lahore Chapter The World CIO 200 Award – Leader 2021, 2022 Executive Director United International Group United Software, United Track System, United Insurance, United Life Assurance and ApnaBank Research Interests: Machine Learning, Data Mining, Sentiment Analysis, Big Data and Cyber Security
Class Introduction ?
Introduction This course provides students an introduction to common cyber security threats, vulnerabilities, and risks related to web applications, networks, software and mobile applications. The course provides basic concepts and terminology used in the information and cyber security fields. Moreover, it will also enable students to differentiate between the various forms of malware and how they affect computers and networks.
CLO No CLO Bloom Taxonomy CLO-1 To be able to identify computer system threats C2 (Understand) CLO-2 To be able to identify Malware attacks, and understand the stages of attack and payloads. C2 (Understand) CLO-3 Implement various cryptographic techniques and simulate attack scenarios C3 (Apply)
Course Outline Introduction to Cyber security; Networks and the Internet; cyber threat landscape; understanding security; information security Principles (Confidentiality, Integrity, Availability); Information Security Terminology; Who are the attackers; Advanced Persistent Threat (APT); Malware, types of malware; Attacks using malware; Malware Attack Lifecycle: Stages of Attack; Social engineering attacks; types of payload; Industrial Espionage in Cyberspace; Basic cryptography; Web application attacks; Database security; Cyber kill chain; Privacy and anonymity; Network security; Software security; Mobile device security; Mobile app security; Cyber Terrorism and Information Warfare; Introduction to Digital Forensics; Digital Forensics Categories.
Books Reference Materials: (or use any other standard and latest books) Computer Security Fundamentals by Chuck Easttom , 4th edition or latest Security+ Guide to Network Security Fundamentals, by Mark Ciampa, 5th Edition Security in Computing by C.P. Pfleeger , Prentice-Hall, 4th Edition or Latest
What is Cyber Security It is the practice of protecting computer systems, networks, data, and digital assets from various forms of threats, attacks, and unauthorized access. It is a critical field in the modern digital age, as the increasing reliance on technology and the internet has made individuals, businesses, and governments more vulnerable to cyber threats. Cybersecurity plays a pivotal role in ensuring the confidentiality, integrity, and availability of digital information and resources.
Key Aspects of Cybersecurity Confidentiality Integrity Availability Authentication and Authorization Protection Against Threats Incident Response Education and Training Compliance and Regulations CIA Trait
Confidentiality Confidentiality in the context of cybersecurity refers to the protection of sensitive information from unauthorized access, disclosure, or exposure. It is one of the three fundamental principles of information security, along with integrity and availability, often referred to as the CIA triad
Integrity I ntegrity refers to the concept of ensuring that data and information remain accurate, trustworthy, and unaltered throughout its lifecycle. Maintaining data integrity is essential because it helps protect against unauthorized changes, tampering, or corruption, which could lead to misinformation, system malfunctions, or security breaches
Availability A vailability refers to the accessibility and usability of information technology systems, applications, and data when needed by authorized users. It is one of the three fundamental principles of information security, often referred to as the CIA triad (Confidentiality, Integrity, and Availability). Ensuring availability is critical because disruptions to IT systems or data can result in downtime, loss of productivity, financial losses, and potential damage to an organization's reputation
Importance of Cybersecurity Protection of Data Business Continuity Privacy National Security Innovation Global Economy