UNIT-1_VSJ Cyber sceurity.pptx Introduction

VijuJigajinni1 4 views 9 slides Oct 28, 2025
Slide 1
Slide 1 of 9
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9

About This Presentation

Basics of cyber security, introduction, for BE electronics and communication students


Slide Content

Cyber security Concepts and Threats UNIT-I

Syllabus UNIT-I 10 Hrs. Cyber security Concepts and Threats: Introduction to Cybersecurity : Concepts, Goals (CIA Triad), Evolution and Need for Cybersecurity , Threats: Malware, Ransomware , Phishing, Insider Attacks, Vulnerability, Exploit, Risk, Attack Surface, Attack Classifications: Passive vs Active, Structured vs Unstructured.-Reference: T1: Ch. 1, 2, 3; T2: Ch. 1 UNIT–II 10 Hrs. Cryptography Principles and Algorithms: Classical Cryptographic Techniques: Caesar, Monoalphabetic, Vigenère, Symmetric Encryption: DES, AES, Asymmetric Encryption: RSA, Hash Functions: MD5, SHA, HMAC, Digital Signatures, PKI, Certificates, Cryptographic Applications in Embedded Systems.- Reference: T2: Ch. 2, 3, 4, 5, 10; T1: Ch. 4 (overview) UNIT–III 10 Hrs. Network and System Security: Firewalls, IDS/IPS, VPNs, Secure Protocols: HTTPS, SSL/TLS, SSH, IPsec, Network Attacks: DDoS, Sniffing, Spoofing, Authentication: Passwords, Tokens, Biometrics, Embedded System Security: Secure Boot, Firmware Protection.-Reference: T1: Ch. 5, 6; T2: Ch. 13, 14 UNIT–IV 10 Hrs. Cyber Laws, Ethics, and Emerging Trends: Cyber Ethics: Code of Conduct, Privacy, Cybercrime and Legal Framework: IT Act 2000, Digital Forensics and Evidence, Emerging Trends: AI in Cybersecurity, Blockchain, Quantum Security, Security in IIoT and Smart Systems.-Reference: T1: Ch. 7, 8, 9, 10; T2: Ch. 22 Reference Books * 1. Nina Godbole & Sunit Belapure, Cyber Security, 1st Edition, Wiley India 2. William Stallings, Cryptography and Network Security, 8th Edition, Pearson Reference Materials: NPTEL: Introduction to Cyber Security CERT-IN Guidelines IEEE Xplore (Recent research articles on ECE-relevant security topics) Course Outcomes After completion of the course student will be able to: CO1 Understand the fundamental concepts of cybersecurity, including the CIA triad, threat landscape, and security mechanisms. CO2 Analyze various types of cyberattacks, vulnerabilities, and risk mitigation strategies using cryptographic and security principles CO3 Apply cryptographic algorithms and protocols to ensure confidentiality, integrity, and authentication in communication systems. CO4 Demonstrate the ability to use simulation tools (like MATLAB) to implement basic cybersecurity mechanisms and analyze cyber threats in embedded and networked systems.

Introduction to Cyber Security Cyber Security: It is the body of technologies, processes and practices designed to protect networks, devices, programs and data from attack, theft, damage, modification or unauthorized access. It is also called as Information Technology Security. OR Cyber Security is the setoff principles and practices designed to protect the computing resources and online information against threats.

Understanding Cyber Security:

Security Problems & Maintaining Security in Cyber field: Viruses & Worms: A virus is a program that is loaded into the computer without user’s knowledge and runs against the user’s wish. Maintenance: Install a security suite that protects the computer against threats such as viruses and worms. ( eg ., Antivirus)

Hackers: A hacker is a person who uses computers to gain unauthorized access to data. Types of Hackers: • Black Hat Hackers : (Unethical Hacker or Security Cracker) These people hack the system illegally to steal money or to achieve their own illegal goals. They find the banks or organization with weak security and steal money or credit card information, they can also modify or destroy confidential data. • White Hat Hackers: (Ethical Hacker or Penetration Tester) These people use the same technique used by the black hat hackers, but they can only hack the system that they have permission to hack inorder to test the security of the system. They focus on securing and protecting IT System. White Hat Hacker is legal. • Grey Hat Hackers : Grey Hat Hackers are hybrid of Black hat hackers & White hat hackers They can hack any system even if they don’t have permission to test the security of the system but they will never steal money or damage the system. Maintenance: It may be impossible to prevent computer hacking, however effective security controls including strong passwords and the use of firewalls.

Malware: ( MALicious softWARE ) Malware is any software that infects and damages a computer system without the owner’s knowledge or permission. Maintenance: Download an anti-malware program that also helps prevent infection. Activate network protection firewall, antivirus. Trojan Horse: Trojan horse are email viruses that can duplicate themselves, steal information or harm the computer system. These viruses are the most serious threats to computers. Maintenance: Security suits such as Avast Internet Security, which will prevent from downloading Trojan Horses. Password Cracking: Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites. Maintenance: Use always strong password. Never use same password for two different sites.

LAYERS OF SECURITY

The 7 layers of cyber security should center on the mission critical assests . 1. Mission Critical Assets: This is the data which need to be protected. 2. Data Security: It protect the storage and transfer of data. 3. Application Security: It protect access to an application which handles the mission critical assets and internal security of the application. 4. Endpoint Security: It protect the connection between devices and the network. 5. Network Security: It protect an organization’s network to prevent unauthorized access of the network. 6. Perimeter Security: It include both the physical and digital security methodologies that protect the overall business. 7. The Human Layer: Humans are the weakest link in any cyber security posture. Human security control includes phishing simulations and access management control that protect mission critical assets from a wide variety of human threats, including cyber criminals, malicious insiders and negligent users.