Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 14

Course: Fundamentals of Cybersecurity

Dr. Niharika Singh,


Course Instructor, (TC2)
Fundamentals of Cyber security
TC2- CYS501
(L,T,P,C: 3-1-2-5)

T. A.: Mr. Sulaxan Jadhav


Fundamentals of Cybersecurity
Track objective:

1. Objective of this course is to provide students with a practical and theoretical knowledge of cyber
attacks.
2. The learner will understand key terms and concepts in cyber law, intellectual property and cyber crimes,
trademarks and domain theft.
3. The learner will understand principles of web security.
4. The learner will be able to incorporate approaches for incident analysis and response.

Course outcomes: 
This Track course has been designed and expects the engineering graduates:

1.To know the Importance of Cyber Security. 


2.Challenges in Cyber Security. 
3.To be able to find the importance of ethical hacking tools 
4.Understanding the ethical hacking process 
5.May easily apply methods for authentication, access control, intrusion detection and prevention. 
Fundamentals of Cybersecurity

Module-1: Introduction to cyber security

Module-2: Cyber attacks and protection tools

Module-3: Cyber Risks and Incident Management

Module-4: Overview of Firewalls

Module-5: Artificial Intelligence in Cybersecurity


Fundamentals of Cybersecurity

Reference Books: 

• Donaldson, S., Siegel, S., Williams, C.K., Aslam, A., “Enterprise Cybersecurity -How to Build
a Successful Cyber defense Program Against Advanced Threats”

• Nina Godbole, Sumit Belapure, “Cyber Security”, Willey


Fundamentals of Cybersecurity

Mid Term - I: Evaluation (20 marks)

Mid Term - II: Evaluation (20 marks)

End Semester: Evaluation (50 marks)

Practical: Lab Evaluation (50 marks)

Course Activities 
1. Assignments 
2. Quiz
3. Oral Test
4. Group Presentation
5. Surprise Test 
6. Group Project (Application-based)
Module-1:
Introduction to Cybersecurity
Introduction
• “Cybersecurity is the practice of protecting systems, networks, and programs from digital
attacks.”

• Cybersecurity is becoming a broader field as more industries migrate onto the Internet and
become a part of the digital landscape. 

• Cybersecurity is important because it protects all categories of data from theft and damage.
This includes sensitive data, personally identifiable information (PII), protected health
information (PHI), personal information, intellectual property, data, and governmental and
industry information systems.
Introduction
Why Cyber crimes are increasing?

• Social engineering remains the easiest form of cyber attack with ransomware, 


phishing, and spyware being the easiest form of entry.
• Third-party and fourth-party vendors who process your data and have poor cybersecurity
practices are another common attack vector, making vendor risk management and 
third-party risk management all the more important.
• The distributed nature of the Internet
• The ability for cybercriminals to attack targets outside their jurisdiction making policing
extremely difficult
• Increasing profitability and ease of commerce on the dark web
• The proliferation of mobile devices and the Internet of Things.
Introduction
Knowledge Area of Cybersecurity
CIA Triad
CIA Triad
Cybersecurity Architecture

According to Internal Auditors, effective and efficient cybersecurity architecture consists of three major components.
Those are people, processes and tools that work together to protect your company’s assets. 

Benefits of a consolidated cyber security architecture


A consolidated cyber security architecture:
 Improves overall security
 Prevents known and unknown threats in real time
 Automates security across all enforcement points
 Provides full visibility into an organization’s threat posture with a single, unified management console
 increases operational efficiency
Features of Cybersecurity Architecture 
• Network Elements
• Security Elements
• Security Frameworks & Standards
• Security Procedures & Policies

You might also like