Notes of cyber security fundamentals
- Premium
Unit 1 Flashcards : Cyber Security Fundamentals
Flashcards covering symmetric ciphers, encryption techniques, and data security principles
- Premium
Unit 2 Flashcards : Cyber Security Fundamentals
Flashcards covering Public Key Cryptosystems, RSA algorithm, key management and distribution.
- Premium
Unit 3 Flashcards : Cyber Security Fundamentals
Flashcards covering cybercrimes, cyberattacks, malware types, vulnerabilities and threats.
- Premium
Unit 4 Flashcards : Cyber Security Fundamentals
Flashcards covering mobile device security, attacks, credit card fraud, and cybercrime tools.
- Premium
Unit 5 Flashcards : Cyber Security Fundamentals
Flashcards covering digital forensics, investigation methods, digital signatures, and cyber laws.
Unit 1: Cyber Security Fundamentals
Symmetric Cipher model, Substitution techniques, Transposition techniques, Steganography, Block cipher principles, Data Encryption Standard, Confidentiality using symmetric encryption Potential locations for confidentiality attacks, Link versus End-to-End Encryption.
Unit 2: Cyber Security Fundamentals
Public key Cryptosystems Principles, applications and requirements, RSA algorithm Key Management Distribution of Public keys and Secret keys, Diffie-Hellman key exchange. Message Authentication Authentication requirements, Authentication Functions like Message Encryption, Message Authentication code and Hash Function. Requirement for a Hash function, simple hash function, Block chaining techniques, Brute-force attack.
Unit 3: Cyber Security Fundamentals
Introduction and classification of Cybercrimes, Cyberattack and its types viz Passive attacks, Active attacks, Type of Malware and malware attack, Vulnerability and threats Classification of Vulnerability( Technology weakness, Configuration weakness, Security policy weakness ), Types of threat ( Unstructured, structured, external, internal etc), common cyber attack terms Hacker, Cracker, Phreaker, Spammer, Phisher, white hat, black hat etc.
Unit 4: Cyber Security Fundamentals
Proliferation of mobile and wireless devices, attacks on mobile phone, Security challenges in mobile devices, Registry setting and RAS security for Mobile devices, Credit card fraud. Tools and Methods used in cybercrimes Proxy anonymizers, Phishing, Password creaking, Keyloggers, Spywares, Virus, worms, Trojan Horses, Backdoors.
Unit 4: Cyber Security Fundamentals
Need of cyber laws, Basic Indian IT Act-2000 and its various sections, Amended IT Act-2000, Digital signature, Public key certificate. Digital forensics Basics, investigation methods, reporting and management of evidence.
- Premium
One Shot: Cyber Security Fundamentals
A comprehensive overview of Cyber Security Fundamentals covering cryptography, security principles, cyberattacks, and key cybersecurity concepts.