Cybersecurity Notes PDF
Document Details

Uploaded by DurableOsmium
KKSU
Tags
Related
- Revision for Final Exam INF406 Medical Information System PDF
- Week 1 Introduction: The Danger (CS 6353) Network and System Security PDF
- Internet Privacy and Network Security PDF
- Cybersecurity Lecture Notes PDF
- Digital Literacy Notes - Staying Safe Online - PDF
- COS 101 Lecture Notes: The Internet and its Impact PDF
Summary
This document is a set of cybersecurity notes covering various topics like cyber security concepts, vulnerabilities, and security safeguards. It also addresses issues like network security and access control.
Full Transcript
Cybersecurity Notes – BCA KKSU Table of Contents UNIT I:................................................................................................................................ 3 1.1 - Introduc-on to Cyber Security:...................................................................
Cybersecurity Notes – BCA KKSU Table of Contents UNIT I:................................................................................................................................ 3 1.1 - Introduc-on to Cyber Security:.............................................................................................. 3 1.2 - Overview of Cybersecurity, Internet Governance – Challenges & Constraints:............................ 3 1.3 - Internet Governance:...................................................................................................................... 5 1.4 - Cyber Threats:................................................................................................................................. 7 1.5 - Need for comprehensive cybersecurity policy:.............................................................................. 7 1.6 - Need for Nodal Authority:.............................................................................................................. 9 1.7 - Need for Interna-onal Conven-on on Cyberspace:..................................................................... 10 1.8 - Cyber Security Concepts:.............................................................................................................. 10 UNIT II:............................................................................................................................. 12 2.1 - Cyber Security Vulnerabili-es and Cyber Security Safeguards:................................................... 12 2.2 - Cyber Security Vulnerabili-es Overview:..................................................................................... 12 2.3 - Cyber Security SafeGuards:........................................................................................................... 15 2.4 - Vulnerabili-es in SoQware:........................................................................................................... 16 2.5 - System Administra-on:................................................................................................................. 17 2.6 - Open Access to Organiza-onal Data:............................................................................................ 18 2.7 - Weak Authen-ca-on:................................................................................................................... 19 2.8 - Poor Cyber Security Awareness:................................................................................................... 20 2.9 - Unprotected Broadband Communica-on:................................................................................... 21 2.10 - Access Control............................................................................................................................. 23 2.11 - Audit............................................................................................................................................ 24 2.12 - Authen-ca-on............................................................................................................................ 27 2.13 - Types of Authen-ca-on.............................................................................................................. 28 2.14 - Denial of Service:........................................................................................................................ 32 2.15 - Denial of Service Filters:............................................................................................................. 33 2.16 - Ethical Hacking:........................................................................................................................... 34 2.17 - Firewalls & IDS (Intrusion Detec-on System)............................................................................. 35 2.18 - Security Policy & Threat Management....................................................................................... 38 UNIT III:............................................................................................................................ 39 3.1 - Securing Web Applica-ons........................................................................................................... 39 3.2 - Services and Servers..................................................................................................................... 40 3.3 - Basic Security for HTTP Applica-ons & Services.......................................................................... 41 3.4 - Basic Security for SOAP Services:.................................................................................................. 43 3.5 - Iden-ty Management and Web Services:.................................................................................... 44 3.6 - Authoriza-on Pa_ern.................................................................................................................... 45 3.7 - Security Considera-on & Challenges in Web Services:................................................................ 47 3.8 - IPS: Intrusion Preven-on System.................................................................................................. 49 3.9 - Physical TheQ................................................................................................................................ 50 3.10 - Abuse of Privileges...................................................................................................................... 50 3.11 - Unauthorized access by outsiders.............................................................................................. 51 3.12 – Intrusion Detec-on & Preven-on Techniques.......................................................................... 52 3.13 – Malware Infec-on..................................................................................................................... 53 3.14 – An--Malware SoQware............................................................................................................. 55 3.15 – NIDS, NIPS, HIPS........................................................................................................................ 56 3.16 – Security Informa-on & Event Management............................................................................. 57 3.17 – System Integrity Valida-on........................................................................................................ 59 3.18 – Network Session Analysis.......................................................................................................... 61 UNIT IV:............................................................................................................................ 62 4.1 – Introduc-on to Cryptography...................................................................................................... 62 4.2 – Symmetric Key Cryptography...................................................................................................... 64 4.3 – Asymmetric Key Cryptography.................................................................................................... 65 4.4 - Message Authen-ca-on & Digital Signatures.............................................................................. 66 4.5 – Overview of Firewalls – Types of Firewalls.................................................................................. 67 4.6 – VPN Security: Types & Protocols................................................................................................. 69 4.7 - VPN Security at Applica-on Layer................................................................................................. 71 4.8 - VPN Security at Transport Layer................................................................................................... 73 4.9 - VPN Security at Network Layer..................................................................................................... 74 4.10 – Cyberspace & the Cyber Law Introduc-on............................................................................... 76 4.11 - Cybersecurity Regula-on............................................................................................................ 77 4.12 – Role of Interna-onal Law.......................................................................................................... 79 4.13 – The State & Private Sector in Cyberspace................................................................................. 80 4.14 – Cybersecurity Standards............................................................................................................ 81 4.15 – IT ACT 2000................................................................................................................................ 83 UNIT I: 1.1 - Introduc5on to Cyber Security: Cyber security is the applica