Lecture 1
Lecture 1
Lecture # 1
1
Course Introduction:
• This course provides students an introduction to
common cyber security threats, vulnerabilities, and
risks related to web applications, networks, software
and mobile applications.
• The course provides basic concepts and terminology
used in the information and cyber security fields.
• Moreover, it will also enable students to differentiate
between the various forms of malware and how they
affect computers and networks.
Dr Shafiq 2
Course Learning Outcomes:
• CLO-1: To be able to identify computer system
threats.
Dr Shafiq 3
Course Outline:
• Introduction to Cyber security;
• Networks and the Internet;
• Cyber threat landscape;
• Understanding security; information security
Principles (Confidentiality, Integrity, Availability);
• Information Security Terminology;
• Who are the attackers;
• Advanced Persistent Threat (APT);
• Malware, types of malware; Attacks using malware;
• Malware Attack Lifecycle: Stages of Attack;
Dr Shafiq 4
Course Outline (Cont..)
• Social engineering attacks;
• Types of payload;
• Industrial Espionage in Cyberspace;
• Basic cryptography;
• Web application attacks;
• Database security;
• Cyber kill chain;
• Privacy and anonymity; Network security;
• Software security;
Dr Shafiq 5
Course Outline (Cont..)
• Mobile device security;
• Mobile app security;
• Cyber Terrorism and Information Warfare;
• Introduction to Digital Forensics;
• Digital Forensics Categories.
Dr Shafiq 6
Reference Materials
1. Computer Security Fundamentals by Chuck
Easttom, 4th edition or latest
2. Security+ Guide to Network Security Fundamentals,
by Mark Ciampa, 5th Edition
3. Security in Computing by C.P. Pfleeger, Prentice-
Hall, 4th Edition or Latest
Dr Shafiq 7
Teaching Methodology
• Lectures, Written Assignments, Practical labs,
Semester Project, Presentations
Dr Shafiq 8
Course Assessment
• Mid Term Exam = 30 Marks
Dr Shafiq 9
Objectives
• Introduction to Cyber Security
10
What is Cyber Security?
Dr Shafiq 11
What is Cyber Security? (Cont..)
Dr Shafiq 12
Important of Cyber Security
• In today’s digital world, one cannot ignore
cybersecurity.
Dr Shafiq 14
How Does Cyber Security Work?
• Cyber security encompasses technologies, processes,
and methods to defend computer systems, data, and
networks from attacks.
Dr Shafiq 15
Types of Cyber Security
Application Security:
• The deployment of various protections in an
organization's software and services against a wide
variety of threats is referred to as application security.
Dr Shafiq 16
Types of Cyber Security (Cont..)
Cloud Security:
• Cloud security is the process of developing safe cloud
infrastructures and applications for businesses using
cloud service providers such as Google, Amazon,
Azure, Rackspace, and so on.
Dr Shafiq 17
Types of Cyber Security (Cont..)
Mobile Security:
• As more people rely on mobile devices, mobile
security is becoming increasingly important.
Dr Shafiq 18
Types of Cyber Security (Cont..)
Network Security:
• Network security refers to the hardware and software
defenses against disruptions, illegal access, and other
misuses of the network and its infrastructure.
Dr Shafiq 19
CIA Triad
• The security of any organization starts with three
principles: Confidentiality, Integrity, Availability.
Dr Shafiq 20
CIA Triad (Cont..)
Dr Shafiq 21
CIA Triad (Cont..)
Confidentiality:
The principles of confidentiality assert that only
authorized parties can access sensitive information and
functions. Example: military secrets.
Dr Shafiq 22
CIA Triad (Cont..)
Integrity:
The principles of integrity assert that only authorized
people and means can alter, add, or remove sensitive
information and functions. Example: a user entering
incorrect data into the database.
Dr Shafiq 23
CIA Triad (Cont..)
Availability:
The principles of availability assert that systems,
functions, and data must be available on-demand
according to agreed-upon parameters based on levels of
service.
Dr Shafiq 24
Questions
Any Question Please?
25
Further Readings
26
Thanks
27