0% found this document useful (0 votes)
321 views14 pages

Module-1A Fundamentals of Cybersecurity

The document summarizes a course on fundamentals of cybersecurity. The course aims to provide practical and theoretical knowledge of cyber attacks. It will help students understand key cybersecurity concepts like intellectual property, cyber crimes, and web security. The course outcomes are to understand the importance of cybersecurity, challenges in it, ethical hacking tools and processes, and methods for authentication, access control, intrusion detection and prevention. The course contains modules on introduction to cybersecurity, cyber attacks and tools, cyber risks and incident management, firewalls overview, and use of artificial intelligence in cybersecurity.

Uploaded by

Backup G
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
321 views14 pages

Module-1A Fundamentals of Cybersecurity

The document summarizes a course on fundamentals of cybersecurity. The course aims to provide practical and theoretical knowledge of cyber attacks. It will help students understand key cybersecurity concepts like intellectual property, cyber crimes, and web security. The course outcomes are to understand the importance of cybersecurity, challenges in it, ethical hacking tools and processes, and methods for authentication, access control, intrusion detection and prevention. The course contains modules on introduction to cybersecurity, cyber attacks and tools, cyber risks and incident management, firewalls overview, and use of artificial intelligence in cybersecurity.

Uploaded by

Backup G
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Course: Fundamentals of Cybersecurity

Dr. Niharika Singh,


Course Instructor, (TC2)
Fundamentals of Cyber security
TC2- CYS501
(L,T,P,C: 3-1-2-5)

T. A.: Mr. Sulaxan Jadhav


Fundamentals of Cybersecurity
Track objective:

1. Objective of this course is to provide students with a practical and theoretical knowledge of cyber
attacks.
2. The learner will understand key terms and concepts in cyber law, intellectual property and cyber crimes,
trademarks and domain theft.
3. The learner will understand principles of web security.
4. The learner will be able to incorporate approaches for incident analysis and response.

Course outcomes: 
This Track course has been designed and expects the engineering graduates:

1.To know the Importance of Cyber Security. 


2.Challenges in Cyber Security. 
3.To be able to find the importance of ethical hacking tools 
4.Understanding the ethical hacking process 
5.May easily apply methods for authentication, access control, intrusion detection and prevention. 
Fundamentals of Cybersecurity

Module-1: Introduction to cyber security

Module-2: Cyber attacks and protection tools

Module-3: Cyber Risks and Incident Management

Module-4: Overview of Firewalls

Module-5: Artificial Intelligence in Cybersecurity


Fundamentals of Cybersecurity

Reference Books: 

• Donaldson, S., Siegel, S., Williams, C.K., Aslam, A., “Enterprise Cybersecurity -How to Build
a Successful Cyber defense Program Against Advanced Threats”

• Nina Godbole, Sumit Belapure, “Cyber Security”, Willey


Fundamentals of Cybersecurity

Mid Term - I: Evaluation (20 marks)

Mid Term - II: Evaluation (20 marks)

End Semester: Evaluation (50 marks)

Practical: Lab Evaluation (50 marks)

Course Activities 
1. Assignments 
2. Quiz
3. Oral Test
4. Group Presentation
5. Surprise Test 
6. Group Project (Application-based)
Module-1:
Introduction to Cybersecurity
Introduction
• “Cybersecurity is the practice of protecting systems, networks, and programs from digital
attacks.”

• Cybersecurity is becoming a broader field as more industries migrate onto the Internet and
become a part of the digital landscape. 

• Cybersecurity is important because it protects all categories of data from theft and damage.
This includes sensitive data, personally identifiable information (PII), protected health
information (PHI), personal information, intellectual property, data, and governmental and
industry information systems.
Introduction
Why Cyber crimes are increasing?

• Social engineering remains the easiest form of cyber attack with ransomware, 


phishing, and spyware being the easiest form of entry.
• Third-party and fourth-party vendors who process your data and have poor cybersecurity
practices are another common attack vector, making vendor risk management and 
third-party risk management all the more important.
• The distributed nature of the Internet
• The ability for cybercriminals to attack targets outside their jurisdiction making policing
extremely difficult
• Increasing profitability and ease of commerce on the dark web
• The proliferation of mobile devices and the Internet of Things.
Introduction
Knowledge Area of Cybersecurity
CIA Triad
CIA Triad
Cybersecurity Architecture

According to Internal Auditors, effective and efficient cybersecurity architecture consists of three major components.
Those are people, processes and tools that work together to protect your company’s assets. 

Benefits of a consolidated cyber security architecture


A consolidated cyber security architecture:
 Improves overall security
 Prevents known and unknown threats in real time
 Automates security across all enforcement points
 Provides full visibility into an organization’s threat posture with a single, unified management console
 increases operational efficiency
Features of Cybersecurity Architecture 
• Network Elements
• Security Elements
• Security Frameworks & Standards
• Security Procedures & Policies

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy