Professional Documents
Culture Documents
Session 1 Cyber Security - Oct 23 2021
Session 1 Cyber Security - Oct 23 2021
Session 1 Cyber Security - Oct 23 2021
&
Digital Forensics
smitha.research1012@gmail.com
2
•Importance of Cyber Security
•Types of Cyber attacks
•CIA triad
•Firewalls
•IDS
•IPS
•Cognitive Cyber Security
•Web application security
•Attack life cycle
•Career prospects in Cyber security : The path forward
•Certifications
Digital forensics is a branch of forensic
science encompassing the recovery,
investigation, examination and analysis of
material found in digital devices, often in
relation to mobile devices and computer
crime.
To put it simply, within the world of
information and digital security, cyber security
focuses on preventing data breaches, and
cyber forensics handles what happens after a
breach occurs.
12
https://www.informationisbeautiful.net/visualizations/worlds-biggest-
data-breaches-hacks/
13
SQL injection is a code injection technique that might destroy
your database.
SQL injection is one of the most common web hacking
techniques.
SQL injection is the placement of malicious code in SQL
statements, via web page input.
Cross-Site Scripting (XSS) attacks are a type of injection, in which
malicious scripts are injected into otherwise benign and trusted
websites. XSS attacks occur when an attacker uses a web
application to send malicious code, generally in the form of a
browser side script, to a different end user.
The IPS often sits directly behind the firewall and provides a
complementary layer of analysis that negatively selects for dangerous
content.
Unlike its predecessor the Intrusion Detection System (IDS)—which is a
passive system that scans traffic and reports back on threats—the IPS is
placed inline (in the direct communication path between source and
destination), actively analyzing and taking automated actions on all
traffic flows that enter the network. Specifically, these actions include:
https://www.coursera.org/articles/popular-cybersecurity-certifications
GIAC Certified Forensic Examiner (GCFE)
GIAC Certified Forensic Analyst (GCFA)
GIAC Reverse Engineering Malware (GREM)
GIAC Network Forensic Analyst (GNFA)
GIAC Advanced Smartphone Forensics (GASF)
GIAC Cyber Threat Intelligence (GCTI)