CyberSecurity

Cyber Security Course Overview

  • Department: CSE, Malla Reddy College of Engineering & Technology

  • Academic Year: 2020-2021

  • Course Objectives:

    • Understand types of cyber-attacks and cyber-crimes

    • Learn cyber security threats and risks

    • Overview of cyber laws and cyber forensics

    • Study defensive techniques against cyber attacks

Units of Study

UNIT I: Introduction to Cyber Security

  • Basic Concepts:

    • Vulnerability, Threat, Harmful Acts, and Internet Governance

    • Computer Criminals and the CIA Triad

    • Types of Cyber Threats (Cyber Warfare, Crime, Terrorism, Espionage)

UNIT II: Cyberspace Law & Cyber Forensics

  • Cyber Security Regulations:

    • Importance of cyber laws in India

    • Historical background of Cyber Forensics

    • Challenges in Computer Forensics

UNIT III: CyberCrime: Mobile and Wireless Devices

  • Mobile Device Security:

    • Rise of mobile technology and associated security risks

    • Security measures for protecting sensitive data on devices

UNIT IV: Cyber Security: Organizational Implications

  • Cost of Cybercrimes:

    • Web threats to organizations and implications on security and privacy

    • Challenges arising from social media marketing

UNIT V: Privacy Issues

  • Data Privacy Concepts:

    • Attacks on data privacy and implications across different sectors (medical, financial)

    • Case studies on major cybercrime incidents in India

Key Concepts

Cyber Security Basics

  • Focuses on the protection of networks, devices, and data from attacks

  • Importance linked to financial loss, reputational damage, and regulatory compliance (e.g., GDPR)

Fundamental Principles of Cyber Security

  1. Confidentiality: Protecting data from unauthorized access through encryption and authentication.

  2. Integrity: Ensuring data remains unaltered through checksums and file permissions.

  3. Availability: Ensuring data access for authorized users through redundancy and firewalls.

Types of Cyber Attacks

  • Web-Based: Injection attacks, Phishing, and Denial of Service (DoS).

  • System-Based: Viruses, Worms, and Trojans.

Vulnerabilities & Risks

  • Cyber Threats: Potential incidents causing harm to assets.

  • Assets: Valuable data or devices needing protection.

Cyber Crime Types

  • Cyber Warfare: Attacks by nations to disrupt infrastructure.

  • Cyber Terrorism: Attacks intended to intimidate or coerce.

  • Cyber Espionage: Unauthorized data retrieval for gain.

Cyber Policy Recommendations

  • Increases efficiency, discipline, and educates employees on security

  • Specific policies on Virus Protection, Firewall Usage, and Device Management recommended.