0% found this document useful (0 votes)
57 views3 pages

Ca2 Bcac602

The document outlines the objectives and topics covered in the Cyber Security course for BCA students, emphasizing the importance of understanding the CIA triad, risks and vulnerabilities, purposes of cyber attacks, prevention methods, and wireless/mobile attacks. It highlights the course's role in bridging academic knowledge with professional demands, ultimately aiding in holistic student development. The paper aims to equip students with essential skills and insights for their future careers in cybersecurity.

Uploaded by

Basabdatta Das
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views3 pages

Ca2 Bcac602

The document outlines the objectives and topics covered in the Cyber Security course for BCA students, emphasizing the importance of understanding the CIA triad, risks and vulnerabilities, purposes of cyber attacks, prevention methods, and wireless/mobile attacks. It highlights the course's role in bridging academic knowledge with professional demands, ultimately aiding in holistic student development. The paper aims to equip students with essential skills and insights for their future careers in cybersecurity.

Uploaded by

Basabdatta Das
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Name: RITAM ROY

Class : BETA
Stream: BCA
Semester: 6th
University Roll no:15201222082
Registration number : 221521010097
Paper code: BCAC602
Paper Name: Cyber security

…………………………………………………………………………………………………………………

Main objective of this paper: This paper helps to achieve new insights
from various perspectives. It sheds light even on various aspect of the
course and increases our hunger for knowledge. It is wise to say it
contributes a lot in respect to the holistic development of every student.

Topics Covered & Assignment Provided: (Write 2 to 3 lines on each


topic): We have managed to gain a comprehensive knowledge on this
following topic:

1) CIA triad :

1. Confidentiality: Ensures that sensitive information is only accessible to


authorized users. It involves data encryption, access controls, and
authentication mechanisms to prevent unauthorized access.
2. Integrity: Guarantees that data is accurate, complete, and unaltered. It
involves using checksums, hashes, and digital signatures to detect any
unauthorized modifications to data.
3. Availability: Ensures that information and resources are accessible when
needed by authorized users. It includes system uptime, redundancy, and
backup strategies to prevent downtime or loss of access.

2) Risk and vulnerability :

Risk: The potential for harm or loss to occur due to a security threat or breach. It
is the likelihood of a threat exploiting a vulnerability and the impact it could have
on the system, data, or organization. Risk is often assessed by considering both
the probability and the consequences.
Vulnerability: A weakness or flaw in a system, software, or process that can be
exploited by a threat to cause harm. Vulnerabilities can arise from software bugs,
misconfigurations, weak access controls, or outdated systems.

.3 ) purpose of cyber attack :

1. Data Theft: Cyber attackers may target sensitive personal, financial, or


corporate data for illegal use, such as identity theft, fraud, or corporate
espionage.
2. Disruption or Destruction: Some attacks aim to disrupt or destroy
systems, networks, or services, causing financial loss, reputational damage,
or operational downtime (e.g., DDoS attacks).
3. Political or Ideological Motives: Hacktivism, where attackers target
organizations or governments to promote political or social causes, can also
be a major purpose behind cyber attacks .

4 ) It act to prevent cyber attack :

1. Use Strong Security Protocols: Implement strong passwords, multi-factor


authentication (MFA), and encryption to safeguard sensitive data and
systems from unauthorized access.
2. Regular Software Updates: Keep operating systems, applications, and
security software up to date to patch vulnerabilities that attackers might
exploit.
3. Employee Training and Awareness: Educate employees on recognizing
phishing scams, social engineering attacks, and safe internet practices to
reduce human error, a common vector for cyber attacks.

5 ) Wireless /Mobile attacks :

1. Man-in-the-Middle (MitM) Attacks: Attackers intercept and potentially


alter communications between two parties in a wireless network, gaining
unauthorized access to sensitive data like login credentials or financial
information.
2. Rogue Hotspot Attacks: Cybercriminals set up fake Wi-Fi networks to
lure users into connecting. Once connected, attackers can steal personal
data or inject malware into devices.
3. Mobile Malware: Malicious apps or software designed to infect mobile
devices, steal personal information, track location, or exploit vulnerabilities
in the device’s operating system.

Outcome of the Subject: This paper benefits us a lot in every aspect.


Moreover, it makes us inclined to understand what our career demands.
It is better to acknowledge that this paper abridges the gap between the
academic world and professional life. In a nutshell, it reinstates a balance in
our life by bringing equilibrium to succeed in the long run professionally.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy