Subject Details
Dept     : CSE-IOT
Sem      : 4
Regul    : 2019
Faculty : RR.Kmalakkannan
phone  : NIL
E-mail  : kamalakannan.r.iot@snsce.ac.in
697
Page views
46
Files
0
Videos
0
R.Links

Icon
Lecture Notes

UNIT 1:
word
download   open file
network software, reference models: OSI
word
download   open file
Network applications, network hardware
word
download   open file
TCP/IP, Internet
word
download   open file
Connection oriented network
word
download   open file
Theoretical basis for communication
word
download   open file
guided transmission media
word
download   open file
wireless transmission
word
download   open file
the public switched telephone networks
word
download   open file
mobile telephone system.
UNIT 2:
word
download   open file
Sources of security threats
word
download   open file
Motives
word
download   open file
Target Assets and vulnerabilities
word
download   open file
Consequences of threats
word
download   open file
E-mail threats
word
download   open file
Web-threats
word
download   open file
Intruders and Hackers
word
download   open file
Insider threats
word
download   open file
Cybercrimes.
UNIT 3:
word
download   open file
Active/ Passive – Interference
word
download   open file
Active/ Passive – Interference
word
download   open file
Impersonation – Worms –Virus
word
download   open file
Impersonation – Worms –Virus
word
download   open file
Spam’s – Ad ware - Spy ware
word
download   open file
Backdoors – Bots
word
download   open file
IP, Spoofing - ARP spoofing
word
download   open file
Session Hijacking
word
download   open file
Trojans and covert channels
word
download   open file
Sabotage-Internal treats Environmental threats
word
download   open file
Threats to Server security.
UNIT 4:
word
download   open file
Authorization and Authentication
word
download   open file
types, policies and techniques
word
download   open file
Security certification
word
download   open file
Security monitoring and Auditing
word
download   open file
Security Requirements Specifications
word
download   open file
Security Policies and Procedures,
word
download   open file
Firewalls
word
download   open file
IDS, Log Files
word
download   open file
IDS, Log Files
word
download   open file
Honey Pots
UNIT 5:
word
download   open file
Digital forensics
word
download   open file
Cyber security design and maintaining resilience
word
download   open file
Malware analysis
word
download   open file
Critical security components
word
download   open file
Cloud Security and Application Security
word
download   open file
Mobile security
word
download   open file
Cyber risk