Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

What is cyber security => https://www.kaspersky.co.

in/resource-center/definitions/what-is-cyber-
security

Cyber security challenges => https://www.simplilearn.com/tutorials/cyber-security-tutorial/what-is-


cyber-security

Cyber threats => https://www.upguard.com/blog/cyber-threat

Cyber space => https://www.techopedia.com/definition/2493/cyberspace

Cyber warfare => https://www.imperva.com/learn/application-security/cyber-warfare/

CIA triad => https://www.techtarget.com/whatis/definition/Confidentiality-integrity-and-availability-


CIA

Cyber terrorism => https://www.techtarget.com/searchsecurity/definition/cyberterrorism

Infrastructure security => https://www.techtarget.com/whatis/definition/critical-infrastructure-


security

Cybersecurity - Organizational Implications => https://blog.rsisecurity.com/types-of-security-threats-


to-organizations/

Cybersquatting => it is a practice to buy an existed domain in a cheaper price and selling back to the
rightful owner in a higher price.

Forgery => it is a white collar crime which intents to create false making of a legally authorized
instrument which has a specific intent to fraud anyone.

Social engineering => https://www.imperva.com/learn/application-security/social-engineering-


attack/

types of hackers => https://www.javatpoint.com/types-of-hackers

hackers and crackers => https://www.geeksforgeeks.org/difference-between-hackers-and-crackers/


cyber-attacks and vulnerabilities => https://youtu.be/c8JS98CT9bw

malware attacks => https://www.cisco.com/c/en_in/products/security/advanced-malware-


protection/what-is-malware.html#:~:text=Malware%20is%20intrusive%20software%20that,spyware
%2C%20adware%2C%20and%20ransomware.

sniffing =>

https://www.tutorialspoint.com/ethical_hacking/ethical_hacking_sniffing_tools.htm#

https://www.tutorialspoint.com/ethical_hacking/ethical_hacking_sniffing.htm

gaining access => https://www.javatpoint.com/gaining-access

Privilege Escalation

https://purplesec.us/privilege-escalation-attacks/#:~:text=Privilege%20escalation%20attacks
%20exploit%20weaknesses,attacks%20including%20vertical%20and%20horizontal.

Executing Devices

https://ktflash.gitbooks.io/ceh_v9/content/53_executing_applications.html

Hiding files

https://www.greycampus.com/opencampus/ethical-hacking/hiding-files

Covering Tracks

https://www.greycampus.com/opencampus/ethical-hacking/covering-tracks

Types of Malwares

https://www.cisco.com/c/en_in/products/security/advanced-malware-protection/what-is-
malware.html

Ethical hacking concepts and scopes

https://www.fita.in/concept-and-scope-of-ethical-hacking/#:~:text=Scope%20of%20Ethical
%20Hacking%3A%2D,auditing%2C%20and%20counter%2Dfrauds.
Cyber threat => https://www.upguard.com/blog/cyber-threat

Attack Vector => https://www.upguard.com/blog/attack-vector#:~:text=An%20attack%20surface


%20is%20the,data%20or%20other%20confidential%20information.

IT act 2000 => https://www.geeksforgeeks.org/information-technology-act-2000-india/

Cyber forensies => https://youtu.be/NfV6E8CCaYg

https://www.geeksforgeeks.org/cyber-forensics/#:~:text=Cyber%20forensics%20is%20a
%20process,also%20known%20as%20computer%20forensics.

Digital signature => https://youtu.be/yUeI4nqvNs8

Computer Equipment and associated storage media =>


https://turbofuture.com/computers/Examples-of-Data-Storage-Devices

Cyber security tools => https://brainstation.io/career-guides/what-tools-do-cybersecurity-analysts-


use

IT ACT PUNISHMENTS => https://taxguru.in/corporate-law/offences-penalties-information-


technology-act-2000.html

Hackers, crackers => https://www.youtube.com/watch?v=34Azg_ITHhw

Information assurance => https://www.geeksforgeeks.org/information-assurance-model-in-cyber-


security/

Threat modelling => https://www.techtarget.com/searchsecurity/definition/threat-modeling

Enterprise Information Security Architecture => https://blog.netwrix.com/2022/01/18/what-is-


enterprise-information-security-architecture/

Vulnerability Assessment and penetration testing =>


https://www.veracode.com/security/vulnerability-assessment-and-penetration-
testing#:~:text=Vulnerability%20scanners%20alert%20companies%20to,a%20threat%20to%20the
%20application.

Collecting Network based Evidence =>


https://www.geeksforgeeks.org/what-is-network-forensics/#:~:text=Investigators%20use
%20network%20forensics%20to,manipulation%2C%20human%20communication%2C%20etc.

Writing Computer Forensics Reports => https://www.geeksforgeeks.org/computer-forensic-report-


format/

Auditing => https://www.indusface.com/blog/what-is-cyber-security-audit-and-how-it-is-helpful-for-


your-business/#:~:text=A%20cybersecurity%20audit%20involves%20a,system%2C%20product%2C
%20etc.)

Information Security Management System Management. Introduction to ISO 27001:2013 =>


https://www.isms.online/information-security-management-system-isms/

Cyber law => https://www.geeksforgeeks.org/cyber-law-it-law-in-india/#:~:text=Cyber%20Law


%20also%20called%20IT,security%2C%20and%20e%2Dcommerce.

e-commerce and e-governance => https://study.com/academy/lesson/what-is-e-government-


commerce-definition-examples.html#:~:text=E%2DCommerce%20is%20using%20electronic,and
%20to%20the%20general%20public.

Intellectual Property Rights in Cyberspace => https://www.geeksforgeeks.org/intellectual-property-


in-cyberspace/#:~:text=Online%20content%20needs%20to%20be,it%20is%20protected%20by
%20IPR.

You might also like