0% found this document useful (0 votes)
45 views7 pages

SEZG681 - SSZG681 - Cyber Security - CS - 15 - 16

Cyber Security lectures
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views7 pages

SEZG681 - SSZG681 - Cyber Security - CS - 15 - 16

Cyber Security lectures
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

BITS Pilani

Pradnya Kashikar
BITS Pilani CSIS
Pilani Campus
BITS Pilani
Pilani Campus

(Merged - SEZG681/SSZG681)(S2-21)

Cyber Security – CS – 15 and 16


Course Objectives

No Objective

To learn the basic principles of cybersecurity and develop a thorough


CO1
understanding of confidentiality, integrity, and availability (CIA) triad

To develop knowledge about cyber security environments and


CO2 architectures, and to learn about various types of security policies, models,
and mechanisms

To develop a basic understanding about various types of security threats,


CO3 attacks, and vulnerabilities, and to learn various ways of managing risks
involved in cyber security

To have an overview of various kinds of cybercrimes using malware,


CO4 ransomware, phishing, hacking, and social engineering; and implementation
of various cyber security solutions

BITS Pilani, Pilani Campus


Text William Stallings & Lawrie Brown, Computer Security: Principles
T1
Books and Practice, 4th Edition, Pearson, 2018

T2 Matt Bishop, Computer Security, 2nd Edition, Pearson, 2019

Reference William (Chuck) Easttom II, Computer Security Fundamentals, 4th


R1
Edition, Pearson, 2020
Books
Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies,
R2
Security in Computing, 5th edition Pearson, 2015
Bill Nelson, A. Philips, F. Enfinger, C. K. Steuart, Guide to Computer
R3 Forensics and Investigations, Course Technology (Cengage Learning),
Indian edition, 2019.
Joshua B. Hill and Nancy E. Marion, Introduction to Cybercrime:
R4 Computer Crimes, Laws, and Policing in the 21st Century (Praeger
Security International) Hardcover – Import, 22 February 2016.

5/19/2022 4
BITS Pilani, Pilani Campus
Learning Outcomes

No Learning Outcomes
LO1 Learn the security landscape, including the nature of the threat, the
vulnerabilities, and the probable consequences of failures in security
mechanisms

LO2 To acquire the knowledge of computer system misuse and strategic


defense against cyber criminals to secure the computer systems and
infrastructure

LO3 To analyse and evaluate various case studies related to cyber threats,
attacks, and misalignment of security policies in a methodical way.

LO4 Estimate the possible consequences of cyber-attacks and methods to


detect, prevent, and recover from the attacks

5/19/2022 5
BITS Pilani, Pilani Campus
Module - 8

Contact
List of Topics Reference
Session

8. Case Studies on Cyber Security:

8.1. Credit Card Skimmer Targets Microsoft ASP.NET sites


15 (July 2020) https://www.cert-
16 8.2. Malicious Google Chrome Extensions (June, 2020) in.org.in/
8.3. Phishing campaigns impersonate popular video
conference platforms, Aarogya Setu App and WHO (May,
2020),

BITS Pilani, Pilani Campus


Case Studies
1. Silk road
Silk Road Shut Down: FBI Seizes Online Drug Market, Alleged Kingpin Ross
Ulbricht - YouTube

2. Titan rain

Top Cyber Attacks In History | Biggest Cyber Attacks Of All Time | Cyber Security |
Simplilearn – YouTube

3. Carder’s market

Jamtara’s Credit Card Scammers | Netflix India – YouTube


BITS Pilani, Pilani Campus

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy