Unit3 - CS Secure System Development
Unit3 - CS Secure System Development
Unit: 3
Cyber Security
Dr Harsha Gupta
ANC0301
Assistant Professor
(B Tech IIIrd Sem) (IT)
NIET, Gr. Noida
FACULTY PROFILE
Introduction:
Introduction to Information Systems: Types of Information Systems, Development of Information
Systems, Need for Information Security, Threats to Information Systems, Information Assurance,
Guidelines for Secure Password and WI-FI Security and social media and Windows Security,
Security Risk Analysis and Risk Management.
• Symmetric key cryptography: DES (Data Encryption Standard), AES (Advanced Encryption
Standard), Secure hash algorithm (SHA-1).
• Real World Protocols: Basic Terminologies, VPN, Email Security Certificates, Transport Layer
Security, TLS, IP security, DNS Security.
Security Policy:
• Policy design Task, WWW Policies, Email based Policies, Policy Revaluation Process-
Corporate Policies-Sample Security Policies, Publishing and Notification Requirement of the
updated and new Policies.
There are many cyber security real-life examples where financial organizations like banks
and social organizations, weather channels etc. have faced cyber-attacks and have lost
valuable information and resources. To fix these problems, you'll need comprehensive cyber
security awareness.
According to KPMG, the annual compensation for cyber security heads ranges from 2 Cr to 4
Cr annually. The industry also reports a satisfaction level of 68%, making it a mentally and
financially satisfying career for most.
CO2 Identify and examine software vulnerabilities and security solutions. K1, K3
CO4 Measure the performance and encoding strategies of security systems. K3, K5
CO5 Understand and apply cyber security methods and policies to enhance K2, K3
current scenario security.
1. Engineering knowledge
2. Problem analysis
3. Design/development of solutions
8. Ethics
10. Communication
CO-PO Mapping
PO No.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO No.
CO1 2 2 1 2 - - - 1 2 1 2 2
CO2 2 2 2 2 2 1 - 1 2 1 2 2
CO3 2 2 1 2 2 - - 1 2 1 2 2
CO4 2 2 1 2 2 1 - 1 2 1 2 2
CO5 2 2 1 2 2 - - 1 2 1 2 2
Program Specific Outcomes (PSOs) are what the students should be able to do at
the time of graduation. The PSOs are program specific. PSOs are written by the
department offering the program.
On successful completion of B. Tech. (CSE) Program, the Information and
Technology engineering graduates will be able to:
PSO1 : Work as a software developer, database administrator, tester or
networking engineer for providing solutions to the real world and industrial
problems.
PSO2 : Apply core subjects of information technology related to data structure
and algorithm, software engineering, web technology, operating system, database
and networking to solve complex IT problems
PSO3 : Practice multi-disciplinary and modern computing techniques by lifelong
learning to establish innovative career
PSO4 : Work in a team or individual to manage projects with ethical concern to be
a successful employee
or employer in IT industry.
PEO3: To effectively bridge the gap between industry and academics through
effective communication skill, professional attitude and a desire to learn.
Question-
1-a. -1
1-b. Question- -1
1-c. Question- -1
1-d. Question- -1
1-e. Question- -1
1-f. Question- -1
1-g. Question- -1
1-h. Question- -1
1-i. Question- -1
1-j. Question- -1
2-a. Question- -2
2-b. Question- -2
2-c. Question- -2
2-d. Question- -2
2-e. Question- -2
3-a. Question- -6
3-b. Question- -6
3-c. Question- -6
3-d. Question- -6
3-e. Question- -6
3-f. Question- -6
3-g. Question- -6
1. https://www.javatpoint.com/cyber-security-introduction
2. https://www.edureka.co/blog/what-is-cybersecurity/
3. http://natoassociation.ca/a-short-introduction-to-cyber-security/
Develop an understanding
Application of Secure Information
Development System Development and CO3
Security integration of security in
development phases
• Threats to E-Commerce
• Mobile, cloud security
• During secure system development, stakeholders have to decide and select the
development activities.
• Traditional system and software engineering lifecycles, such as Waterfall, V-
model, Spiral, Prototype development, Agile, Incremental development, could
be a good starting option. However, traditional development lifecycles do not
take into account security concerns in particular.
Elicitation
Phase
Maintenance
Phase Analysis
Security in Phase
SDLC
Implementation Design
Phase Phase
3. What is SDLC?
• https://youtu.be/snJGzyXzVec
• https://youtu.be/8caqok3ah8o
1. Elicitation Phase
2. Analysis Phase
3. Design Phase
4. Implementation Phase
5. Maintenance Phase
Security
Architecture & Examine the Security
Design Security Architecture and Design CO3
Issues in Security Issues in Hardware
Hardware
Security
Architecture and
Design
1- Layering:
• Layering is a concept that arranges hardware, drivers for kernel and
devices, operating system, and applications in a sequential order.
• The layering approach is used to differentiate the hardware from the
software into different tiers.
• A generic list of security architecture layers is as follows
1. Hardware (bottom layer)
2. Kernel (a part of OS) and device drivers
3. Operating System
4. Application software (Top Layer)
2-Abstraction :
• The purpose of abstraction is to hide unnecessary details from users.
• We will only increase the risk of threats if we increase the
complexity of the system.
• Abstraction provides a way to manage that complexity.
– For example ,while music is being played from a file through the
speaker of the computer system. The user is only concerned with
playing of music just with click without knowing the internal
working of music player.
3-Security Domain :
A security domain is the list of objects a subject is allowed to access.
• With respect to kernels, two domains are user mode and kernel
mode.
Kernel mode (also known as supervisor mode) is where the kernel
lives, allowing low-level access to memory, CPU, disk, etc. It is the
most trusted and powerful part of the system.
User mode is where user accounts and their processes live. The two
domains are separated: an error or security lapse in user mode should
not affect the kernel.
• https://youtu.be/cUvMIOdaSBs
-Stealing
-Destruction,
-Gaining unauthorized access
-Breaching the security code of conduct.
• You also need to apply Local intranet and Virtual Private Networks
(VPNs) to provide complete security for your system.
• https://youtu.be/Ye2H1n2MtIc
• https://youtu.be/xwgecIX3E4I
Their loss and theft, disposal, stealing of data, denial of data, malware
introduction, etc.
• At present around the world, up to five billion people are using mobile
phones
Operating
System
Attacks
Attacks on
Malware Mobile App
Mobile
Attacks Devices Attacks
Communicat
ion Network
Attacks
Endpoint
Security
Endpoint security
Source: swayam
08/07/2024 Dr Harsha Gupta Cyber security ANC0301 Unit 3 60
Components of Mobile Device Security
VPN
Source: swayam
Source: swayam
Source: swayam
Source: swayam
08/07/2024 Dr Harsha Gupta Cyber security ANC0301 Unit 3 64
Common Mobile Device Security
Threats
Data
leakage
Improper
session Unsecured
handling Wi-Fi
Reasons for
Data Loss
Broken Network
cryptography spoofing
Phishing
Spyware
attacks
Serious Physical
Multiple
threats in security
user
new
logging
features
Secure
Malware
data
on rise
storage
Mobile Device
Risks
Bluetooth Mobile
attacks browsing
Mobile
device Applicatio
coding System n
issues updates isolation
Source: swayam
08/07/2024 Dr Harsha Gupta Cyber security ANC0301 Unit 3 67
Recap
• https://youtu.be/Ye2H1n2MtIc
• https://youtu.be/xwgecIX3E4I
Source: swayam
Access control
systems
User can create, read, edit, User can execute a User can retrieve or
or delete file on the server program on an update information in a
application server database
Access
Control
IDS
NIDS HIDS
(HIDS) : A host intrusion detection system runs on all computers or devices in the
network with direct access to both the internet and the enterprise's internal
network.
A HIDS has an advantage over an NIDS in that it may be able to detect anomalous
network packets that originate from inside the organization or malicious traffic
that an NIDS has failed to detect.
A HIDS may also be able to identify malicious traffic that originates from the host
itself, such as when the host has been infected with malware and is attempting
to spread to other systems.
Decision Alarm
Detection Engine
Table
Monitors Malicious Response
Detection
Configuration
Sensor Decision Engine
Hosts and Manages and Reports
Networks Action
Information Recorded
Report
Management Console
• Data backups are taken to secure important data files and systems
from being lost due to natural disasters or human errors and recover
in case any kind of disaster has led to the loss of information.
Therefore, it is very important to secure data backups.
• Following practices should be performed for maintaining proper
data backup security-
– Assigning responsibility, authority and accountability.
– Assessing risks.
– Developing data protection processes.
– Communicating the processes to the concerning people.
– Executing and testing the process.
• https://youtu.be/snJGzyXzVec
• https://youtu.be/8caqok3ah8o
• https://youtu.be/WPU2eisvqXE
• https://youtu.be/cUvMIOdaSBs
• https://youtu.be/0a264Edp5l0
• https://youtu.be/Ye2H1n2MtIc
• https://youtu.be/xwgecIX3E4I