Cyber Security and Privacy
Document Details
Uploaded by ProficientParadise4059
K.S.Rangasamy College of Technology
Tags
Related
- Information Security Drivers PDF
- The Critical Importance of Cybersecurity in Today's Digital Landscape PDF
- Artificial Intelligence in Protecting Cyber Security (PDF)
- Comp 101: Introduction to Computing - Security and Privacy (PDF)
- Information Systems Security and Online Privacy PDF
- Discovering Computers: Chapter 8 - Digital Security, Ethics, and Privacy PDF
Summary
This document outlines a course structure covering various aspects of cyber security and privacy, including fundamental concepts, security management, risk, compliance, contingency planning, and privacy regulations.
Full Transcript
Week 1: Introduction - Introduction to cyber security, Confidentiality, integrity, and availability. Week 2: Foundations - Fundamental concepts, CIA, CIA triangle, data breach at target. Week 3: Security management, Governance, risk, and compliance (GRC)- GRC framework, security standards. Week 4...
Week 1: Introduction - Introduction to cyber security, Confidentiality, integrity, and availability. Week 2: Foundations - Fundamental concepts, CIA, CIA triangle, data breach at target. Week 3: Security management, Governance, risk, and compliance (GRC)- GRC framework, security standards. Week 4: Contingency planning - Incidence response, Disaster Recovery, BCP. Week 5: Cyber security policy - ESSP, ISSP, SYSSP. Week 6: Risk Management - Cyber Risk Identification, Assessment, and Control. Week 7: Cyber security: Industry perspective - Defense Technologies, Attack, Exploits Week 8: Cyber security technologies - Access control, Encryption, Standards. Week 9: Foundations of privacy - Information privacy, Measurement, Theories. Week 10: Privacy regulation - Privacy, Anonymity, Regulation, Data Breach. Week 11: Privacy regulation in Europe, Privacy: The Indian Way - Data Protection, GDPR, DPDP, Aadhar. Week 12: Information privacy: Economics and strategy, Economic value of privacy, privacy valuation, WTA and WTC, Business strategy and privacy, espionage, Privacy vs safety. R20. The dark side of customer analytics. HBR Case, 2007, accessible at: https://www.pomsmeetings.org/ConfPapers/052/052-0002.pdf