Lecture 1c Cyber Security Kaushal Shah

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

Cyber Security

Dr. Kaushal Shah


Assistant Professor
Computer Engineering
PDEU
The compilation of the PPTs is from the source:
All the different articles and research papers, articles available on internet
Outline for Today
• Introduction to the Subject
• Cyber Security basic Introduction
Always Remember
• There are no “stupid” questions.

• It is a waste of your time and the class’s time


to proceed when you don’t understand the
basic terms.

• If you don’t understand it, someone else


probably doesn’t, either.
Syllabus
• UNIT 1 INTRODUCTION
• Introduction to Cyber Security, Internet Governance – Challenges and Constraints, Cyber Threats:-
Cyber Warfare-Cyber Crime-Cyber terrorism-Cyber Espionage, Need for a Nodal Authority, Need for
an International convention on Cyberspace.
• UNIT 2 CYBER SECURITY VULNERABILITIES
• Overview, vulnerabilities in software, System administration, Complex Network Architectures, Open
Access to Organizational Data, Weak Authentication, Unprotected Broadband communications,
Cyber Security Safeguards.
• UNIT 3 SECURING WEB APPLICATION
• Services and Servers Introduction, security for HTTP Applications and Services, Security for SOAP
Services, Identity Management and Web Services, Authorization Patterns.
• UNIT 4 CYBER LAWS
• Cyberspace Law Introduction Computers and its Impact in Society. Roles of International Law, the
state and Private Sector in Cyberspace, Cyber Security Standards. Cyber Jurisprudence at
International and Indian Level. Issues in Cyberspace Freedom of Speech and Expression in
Cyberspace. Introduction to Cyber Forensics
COURSE OUTCOMES
• On completion of the course, student will be able to
• CO1- Understand the vulnerabilities in the computer
and network security and importance of cyber security
• CO2- Explain the cybercrime and cyber law and
necessity of cyber laws
• CO3- Apply the different cyber forensics technique
• CO4- Explain and compare various cyber security
technique
• CO5- Identify cyber security vulnerabilities
• CO6- Apply mechanisms to provide secure web
services.
Cyber Security Intro.
• Cyber security is combination of two words
CYBER and SECURITY. Cyber means information
that is in digital form on Internet and publicly
available. Security means we have to provide
protection to these data that is available on
internet.
• Definition of Cyber Security: Practice of
protecting systems, networks, programs from
Digital or Malicious Attacks. These attacks are
usually aim to accessing the information or
destroying sensitive information.
Security Concerns

• VIRUS

• HACKER and HACKING

• MALWARE

• TROJAN HORSES

• PASSWORD CRACKING
Virus
• A computer virus is a
program that can copy itself
and infect a computer
without the permission or
knowledge of the user.
• A computer virus has 2 major
Characteristics:
– The ability to replicate itself.
– The ability to attach itself to
another computer file.
Warning bells for Virus
• Frequent pop-up windows.
• Mass emails being sent from your email
account.
• Frequent crashes.
• Unusually slow computer performance.
• Unknown programs that start up when you
turn on your computer.
• Unusual activities like password changes.
Hacker and Hacking
• HACKING is the gaining of access to a computer and
viewing, copying or creating data without the intention
of destroying data or maliciously harming the
computer.
• A hacker is a person skilled in information
technology who uses their technical knowledge to
achieve a goal or overcome an obstacle, within a
computerized system by non-standard means.
• Someone who utilizes their technical know-how
of bugs or exploits to break into computer systems and
access data which would otherwise be unavailable to
them.
Types of Hackers
• There are three types of hacker:
– White hat hacker: It involves performing a security
evaluation and testing with complete knowledge of
the network infrastructure.
– Gray hat Hacker: It involves performing a security
evaluation and testing internally.
• It examines the extent of access by insiders within the
network.
– Black hat Hacker: Testing with no prior knowledge of
the network infrastructure or systems.
• It takes longest amount of time and most efforts.
Questions???

You might also like