0% found this document useful (0 votes)
18 views17 pages

CS Lecture01

The document outlines a Cyber Security course led by Dr. Munir Ahmad, covering essential concepts, threats, and vulnerabilities in the field. It includes learning objectives, course content, and key aspects of cybersecurity such as confidentiality, integrity, and availability. The course aims to equip students with the ability to identify threats and implement cryptographic techniques while understanding the cyber threat landscape.

Uploaded by

Rabeel Malik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views17 pages

CS Lecture01

The document outlines a Cyber Security course led by Dr. Munir Ahmad, covering essential concepts, threats, and vulnerabilities in the field. It includes learning objectives, course content, and key aspects of cybersecurity such as confidentiality, integrity, and availability. The course aims to equip students with the ability to identify threats and implement cryptographic techniques while understanding the cyber threat landscape.

Uploaded by

Rabeel Malik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

Cyber Security(CS)

by
Dr. Munir Ahmad
About Instructor
• PhD(CS), MS(CS), BS(CS)
• Assistant Professor @ NCBAE
• Certificates* and Trainings**: CISM*, CEH*, CDPSE**, COBIT
2019**
• Compliance & regulatory Coordinator ISACA Lahore Chapter
• The World CIO 200 Award – Leader 2021, 2022
• Executive Director United International Group
• United Software, United Track System, United Insurance, United Life
Assurance and ApnaBank
• Research Interests: Machine Learning, Data Mining,
Sentiment Analysis, Big Data and Cyber Security
Class Introduction

•?
Introduction

• This course provides students an introduction to common cyber security


threats, vulnerabilities, and risks related to web applications, networks,
software and mobile applications. The course provides basic concepts and
terminology used in the information and cyber security fields. Moreover, it
will also enable students to differentiate between the various forms of
malware and how they affect computers and networks.
CLO No CLO Bloom Taxonomy
CLO-1 To be able to identify computer C2 (Understand)
system threats

CLO-2 To be able to identify Malware C2 (Understand)


attacks, and understand the
stages of attack and payloads.

CLO-3 Implement various cryptographic C3 (Apply)


techniques and simulate attack
scenarios
Course Outline

• Introduction to Cyber security; Networks and the Internet; cyber threat


landscape; understanding security; information security Principles
(Confidentiality, Integrity, Availability); Information Security
Terminology; Who are the attackers; Advanced Persistent Threat (APT);
Malware, types of malware; Attacks using malware; Malware Attack
Lifecycle: Stages of Attack; Social engineering attacks; types of payload;
Industrial Espionage in Cyberspace; Basic cryptography; Web application
attacks; Database security; Cyber kill chain; Privacy and anonymity;
Network security; Software security; Mobile device security; Mobile app
security; Cyber Terrorism and Information Warfare; Introduction to Digital
Forensics; Digital Forensics Categories.
Books

• Reference Materials: (or use any other


standard and latest books)
1.Computer Security Fundamentals by Chuck Easttom, 4th
edition or latest
2.Security+ Guide to Network Security Fundamentals, by Mark
Ciampa, 5th Edition
3.Security in Computing by C.P. Pfleeger, Prentice-Hall, 4th
Edition or Latest
What is Cyber Security

• It is the practice of protecting computer systems, networks, data, and digital


assets from various forms of threats, attacks, and unauthorized access. It is a
critical field in the modern digital age, as the increasing reliance on
technology and the internet has made individuals, businesses, and
governments more vulnerable to cyber threats. Cybersecurity plays a pivotal
role in ensuring the confidentiality, integrity, and availability of digital
information and resources.
Key Aspects of
Cybersecurity

• Confidentiality
• Integrity
• Availability
• Authentication and
Authorization
• Protection Against Threats
• Incident Response
• Education and Training CIA Trait
• Compliance and Regulations
Confidentiality

• Confidentiality in the context of cybersecurity refers to the protection of


sensitive information from unauthorized access, disclosure, or exposure. It
is one of the three fundamental principles of information security, along
with integrity and availability, often referred to as the CIA triad
Integrity

• Integrity refers to the concept of ensuring that data and information


remain accurate, trustworthy, and unaltered throughout its lifecycle.
Maintaining data integrity is essential because it helps protect against
unauthorized changes, tampering, or corruption, which could lead to
misinformation, system malfunctions, or security breaches
Availability

• Availability refers to the accessibility and usability of information


technology systems, applications, and data when needed by authorized
users. It is one of the three fundamental principles of information security,
often referred to as the CIA triad (Confidentiality, Integrity, and
Availability). Ensuring availability is critical because disruptions to IT
systems or data can result in downtime, loss of productivity, financial
losses, and potential damage to an organization's reputation
Importance of Cybersecurity

• Protection of Data
• Business Continuity
• Privacy
• National Security
• Innovation
• Global Economy
Types of Threats

• Malware • SQL Injection • Fileless Malware


• Phishing • Man-in-the-Middle • Cryptojacking
• Social Engineering (MitM) Attacks • Advanced Persistent
• DDoS Attacks • password Attacks Threats (APTs)
• Ransomware • Drive-By Downloads • Cross-Site Scripting
• IoT (Internet of Things) (XSS)
• Insider Threats
Vulnerabilities
• Zero-Day Exploits
• Supply Chain Attacks
Types of Attackers

• Script Kiddies • Cyber Warriors


• Hacktivists • Cyber Vigilantes
• Cybercriminals • Ethical Hackers (White Hat Hackers)
• Nation-State Actors
• Insiders
• Phishers
• Malware Authors
• Industrial Espionage Agents
• Hackers for Hire
Thanks

• Assignment_01

• Deadline –
• Email: munir@ncbae.edu.pk
• Mobile: 03007300232

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy