CyberSecurity
Cyber Security Course Overview
Department: CSE, Malla Reddy College of Engineering & Technology
Academic Year: 2020-2021
Course Objectives:
Understand types of cyber-attacks and cyber-crimes
Learn cyber security threats and risks
Overview of cyber laws and cyber forensics
Study defensive techniques against cyber attacks
Units of Study
UNIT I: Introduction to Cyber Security
Basic Concepts:
Vulnerability, Threat, Harmful Acts, and Internet Governance
Computer Criminals and the CIA Triad
Types of Cyber Threats (Cyber Warfare, Crime, Terrorism, Espionage)
UNIT II: Cyberspace Law & Cyber Forensics
Cyber Security Regulations:
Importance of cyber laws in India
Historical background of Cyber Forensics
Challenges in Computer Forensics
UNIT III: CyberCrime: Mobile and Wireless Devices
Mobile Device Security:
Rise of mobile technology and associated security risks
Security measures for protecting sensitive data on devices
UNIT IV: Cyber Security: Organizational Implications
Cost of Cybercrimes:
Web threats to organizations and implications on security and privacy
Challenges arising from social media marketing
UNIT V: Privacy Issues
Data Privacy Concepts:
Attacks on data privacy and implications across different sectors (medical, financial)
Case studies on major cybercrime incidents in India
Key Concepts
Cyber Security Basics
Focuses on the protection of networks, devices, and data from attacks
Importance linked to financial loss, reputational damage, and regulatory compliance (e.g., GDPR)
Fundamental Principles of Cyber Security
Confidentiality: Protecting data from unauthorized access through encryption and authentication.
Integrity: Ensuring data remains unaltered through checksums and file permissions.
Availability: Ensuring data access for authorized users through redundancy and firewalls.
Types of Cyber Attacks
Web-Based: Injection attacks, Phishing, and Denial of Service (DoS).
System-Based: Viruses, Worms, and Trojans.
Vulnerabilities & Risks
Cyber Threats: Potential incidents causing harm to assets.
Assets: Valuable data or devices needing protection.
Cyber Crime Types
Cyber Warfare: Attacks by nations to disrupt infrastructure.
Cyber Terrorism: Attacks intended to intimidate or coerce.
Cyber Espionage: Unauthorized data retrieval for gain.
Cyber Policy Recommendations
Increases efficiency, discipline, and educates employees on security
Specific policies on Virus Protection, Firewall Usage, and Device Management recommended.