Professional Documents
Culture Documents
Intoduction To CYS
Intoduction To CYS
Intoduction To CYS
CYBER SECURITY
Email: mehmood.hassan@students.au.edu.pk
mehmood.sk94@gmail.com
DEPARTMENT OF
CYBER SECURITY
AIR UNIVERSITY, ISLAMABAD CAMPUS
OUTLINE
• COURSE OBJECTIVES
• COURSE INFORMATION
• INTRODUCTION TO BASIC CONCEPTS
• QUESTIONS & ANSWERS
COURSE OBJECTIVES
• CYBER SECURITY’S CORE CONCEPTS, TERMINOLOGIES, HISTORY,
TECHNOLOGIES AND SKILLS.
• KNOWLEDGE AND BASIC SKILLS TO DEFEND INFORMATION ASSETS;
RESIDENT OR TRANSIENT AND INFRASTRUCTURE CARRYING IT
FROM CYBER THREATS AND ATTACKS.
• OFFENSIVE: SURVEILLANCE, EXPLOITATION, HACKING, MALWARES
ATTACK, SOCIAL ENGINEERING
• DEFENSIVE: VULNERABILITY ASSESSMENT, NETWORK DEFENSE,
PASSWORDS, FIREWALLS, VPNS, INCIDENT RESPONSE, INTRUSION
DETECTION AND PREVENTION
• DIGITAL FORENSICS AND ITS VARIOUS TECHNIQUES.
• CRUCIAL ISSUES: INDUSTRIAL ESPIONAGE & SABOTAGE, IOT
SECURITY, BLOCKCHAIN, GDPR, CYBER BULLYING AND
HARASSMENT
COURSE INFORMATION
• CREDIT HOURS: 3.0
• DURATION: 16 WEEKS
• ASSESSMENT:
• QUIZZES: 10% (ANNOUNCED & UNANNOUNCED)
• ASSIGNMENTS: 15% (INDIVIDUAL & GROUP)
• MID TERM: 35%
• FINAL: 40%
COURSE RESOURCES
REFERENCE BOOKS:
• C.P. PFLEEGER, “SECURITY IN
COMPUTING”, PRENTICE-HALL, 4TH
EDITION OR LATEST
• LAWRENCE C. MILLER, “CYBER
SECURITY FOR DUMMIES”, PALO ALTO
NETWORKS, 2ND EDITION OR LATEST
• WILLIAM STALLINGS, “NETWORK
SECURITY ESSENTIALS: APPLICATIONS
AND STANDARDS”, 3RD EDITION OR
LATEST
• WILLIAM STALLINGS, CRYPTOGRAPHY
AND NETWORK SECURITY: PRINCIPLES
AND PRACTICES”, 4TH EDITION
• BRUCE SCHNEIER, “APPLIED
CRYPTOGRAPHY”, 2ND EDITION OR
LATEST
COURSE RESOURCES
REFERENCE BOOKS:
• BRUCE SCHNEIER, “BEYOND FEAR:
THINKING SENSIBLY ABOUT SECURITY IN AN
UNCERTAIN WORLD”, LATEST EDITION
• KEVIN D. MITNICK & WILLIAM L. SIMON, “THE
ART OF DECEPTION: CONTROLLING THE
HUMAN ELEMENT OF SECURITY”, WILEY
PUBLISHING INC.
• KEVIN D. MITNICK & WILLIAM L. SIMON, “THE
ART OF INTRUSION: THE REAL STORIES
BEHIND THE EXPLOITS OF HACKERS,
INTRUDERS & DECEIVERS”, WILEY
PUBLISHING INC.
• JON ERICKSON, “HACKING: THE ART OF
EXPLOITATION”, LATEST EDITION
COURSE RESOURCES
REFERENCE BOOKS:
• GEORGE KURTZ, JOEL SCAMBRAY,
AND STUART MCCLURE, “HACKING
EXPOSED: NETWORK SECURITY
SECRETS AND SOLUTIONS”, 2ND
EDITION OR LATEST
• ELDAD EILAM, “REVERSING:
SECRETS OF REVERSE
ENGINEERING”, WILEY PUBLISHING
INC.
• BILL NELSON, AMELIA PHILLIPS,
CHIRSTOPHER STEUART, “ GUIDE
TO COMPUTER FORENSICS &
INVESTIGATIONS”, 4TH EDITION OR
LATEST
BASIC CONCEPTS
• WHY CYBER SECURITY?
• WHAT IS CYBER SECURITY?
• BASIC CONCEPTS
• BASIC MODEL
• QUESTIONS & ANSWERS
WHY IS SECURITY?
• HTTP://WWW.INFORMATIONISBEAUTIFUL.NET/VISUALIZATIONS/WORLDS-BIGGEST-DATA-BREACHES-
HACKS/
GLOBAL CYBER SPACE ENVMT
ACT – 2016
NATIONAL CYBER SECURITY
CHALLENGES
• IMPLEMENTATION OF CYBER SECURITY LAWS /
REGS
• ABSENCE OF NATIONAL LVL CERT
• ABSENCE OF ADEQUATE DISASTER REC
MECHANISM
• CRITICAL NATIONAL NETWORKS ARE PRONE TO
CYBER THREATS
NATIONAL CYBER SECURITY
CHALLENGES