Professional Documents
Culture Documents
HU Cyber Security CST006
HU Cyber Security CST006
UNIT – I: Introduction to Cyber Security: Basic Cyber Security Concepts, layers of security,
Vulnerability, threat, Harmful acts, the motive of attackers, active attacks, passive attacks,
Software attacks, hardware attacks, Spectrum of attacks, Taxonomy of various attacks, IP
spoofing, Methods of defense, Security Models, risk management, Cyber Threats-Cyber
Warfare, Cyber Crime, Cyber terrorism, Cyber Espionage, etc., CIA Triad
UNIT – II: Cyber Forensics: Introduction to cyber forensic, Historical background of Cyber
forensics, Digital Forensics Science, The Need for Computer Forensics, Cyber Forensics and
Digital evidence, Forensics Analysis of Email, Digital Forensics Lifecycle, Forensics
Investigation, Challenges in Computer Forensics, Special Techniques for Forensics Auditing.
UNIT – III: Cybercrime (Mobile and Wireless Devices): Introduction, Proliferation of Mobile
and Wireless Devices, Trends in Mobility, Credit card Frauds in Mobile and Wireless
Computing Era, Security Challenges Posed by Mobile Devices, Registry Settings for Mobile
Devices, Authentication service Security, Attacks on Mobile/Cell Phones, Mobile Devices:
Security Implications for Organizations, Organizational Measures for VEER MADHO SINGH
BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN Syllabus Syllabus
of B.TECH – Computer Science and Engineering PAGE 28 Handling Mobile, Organizational
Security Policies and Measures in Mobile Computing Era, Laptops and desktop.
UNIT – IV: Cyber Security (Organizational Implications): Introduction cost of cybercrimes and
IPR issues, web threats for organizations, security and privacy implications, social media
marketing: security risks and perils for organizations, social computing, and the associated
challenges for organizations. Cybercrime and Cyber terrorism: Introduction, intellectual property
in cyberspace, the ethical dimension of cybercrimes, the psychology, mindset and skills of
hackers and other cybercriminals.
UNIT – V: Cyberspace and the Law &Miscellaneous provisions of IT Act.: Introduction to
Cyber Security Regulations, International Law. The INDIAN Cyberspace, National Cyber
Security Policy. Internet Governance – Challenges and Constraints, Computer Criminals, Assets
and Threats. Other offences under the Information Technology Act in India, The role of
Electronic Evidence and miscellaneous provisions of the IT Act.2008.
UNIT – I: Introduction to Cyber Security
Cybersecurity is the practice of protecting systems, networks, and programs from digital
attacks.
7 Layers of Cybersecurity
Let's break down the principles essential to a secure information system and go
through some information assurance examples for you to consider.
AVAILABILITY. ...
INTEGRITY. ...
CONFIDENTIALITY. ...
AUTHENTICATION. ...
NONREPUDIATION.
Cyberattacks can target a wide range of victims from individual users to enterprises
or even governments. When targeting businesses or other organizations, the
hacker’s goal is usually to access sensitive and valuable company resources, such
as intellectual property (IP), customer data or payment details.
Hardware security is vulnerability protection that comes in the form of a physical device
rather than software that's installed on the hardware of a computer system. Hardware
security can pertain to a device used to scan a system or monitor network traffic.
Common examples include hardware firewalls and proxy servers.
IP spoofing:- IP spoofing is the creation of Internet Protocol (IP) packets which have a modified
source address in order to either hide the identity of the sender, to impersonate another
computer system, or both.
CIA TRIAD:- The three letters in "CIA triad" stand for Confidentiality,
Integrity, and Availability. The CIA triad is a common model that forms
the basis for the development of security systems.
at we expect it to be.
The CIA triad refers to confidentiality, integrity and availability, describing a model
designed to guide policies for information security (infosec) within an organization.
Bob Thomas
Bob Thomas is a computer scientist who is widely regarded as the father of
cybersecurity. He gained notoriety in 1971 when he created the first computer virus,
called the "Creeper virus." The virus was not malicious and was designed to
demonstrate the vulnerability of computer