Subject Details
Dept     : CSE-IOT
Sem      : 4
Regul    : 2019
Faculty : RR.Kmalakkannan
phone  : NIL
E-mail  : kamalakannan.r.iot@snsce.ac.in
613
Page views
46
Files
0
Videos
0
R.Links

Icon
Announcements

  • Lecture Notes

    Dear Students the Lecture Notes has been uploaded for the following topics:
    Digital forensics ,
    Cyber security design and maintaining resilience ,
    Malware analysis ,
    Critical security components ,
    Cloud Security and Application Security ,
    Mobile security ,
    Cyber risk

  • Lecture Notes

    Dear Students the Lecture Notes has been uploaded for the following topics:
    network software, reference models: OSI,
    Network applications, network hardware,
    TCP/IP, Internet,
    Connection oriented network,
    Theoretical basis for communication,
    guided transmission media,
    wireless transmission,
    the public switched telephone networks,
    mobile telephone system.

  • Lecture Notes

    Dear Students the Lecture Notes has been uploaded for the following topics:
    Active/ Passive – Interference ,
    Active/ Passive – Interference ,
    Impersonation – Worms –Virus ,
    Spam’s – Ad ware - Spy ware,
    Backdoors – Bots ,
    IP, Spoofing - ARP spoofing ,
    Session Hijacking ,
    Trojans and covert channels ,
    Sabotage-Internal treats Environmental threats ,
    Threats to Server security.

  • Lecture Notes

    Dear Students the Lecture Notes has been uploaded for the following topics:
    Authorization and Authentication ,
    types, policies and techniques ,
    Security certification ,
    Security monitoring and Auditing ,
    Security Requirements Specifications ,
    Security Policies and Procedures, ,
    Firewalls,
    IDS, Log Files,
    Honey Pots

  • Lecture Notes

    Dear Students the Lecture Notes has been uploaded for the following topics:
    Sources of security threats,
    Motives,
    Target Assets and vulnerabilities ,
    Consequences of threats,
    E-mail threats ,
    Web-threats ,
    Intruders and Hackers,
    Insider threats,
    Cybercrimes.