-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:Digital forensics , Cyber security design and maintaining resilience , Malware analysis , Critical security components , Cloud Security and Application Security , Mobile security , Cyber risk
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:network software, reference models: OSI, Network applications, network hardware, TCP/IP, Internet, Connection oriented network, Theoretical basis for communication, guided transmission media, wireless transmission, the public switched telephone networks, mobile telephone system.
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:Active/ Passive – Interference , Active/ Passive – Interference , Impersonation – Worms –Virus , Spam’s – Ad ware - Spy ware, Backdoors – Bots , IP, Spoofing - ARP spoofing , Session Hijacking , Trojans and covert channels , Sabotage-Internal treats Environmental threats , Threats to Server security.
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:Authorization and Authentication , types, policies and techniques , Security certification , Security monitoring and Auditing , Security Requirements Specifications , Security Policies and Procedures, , Firewalls, IDS, Log Files, Honey Pots
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:Sources of security threats, Motives, Target Assets and vulnerabilities , Consequences of threats, E-mail threats , Web-threats , Intruders and Hackers, Insider threats, Cybercrimes.