Connected successfully
Introduction - Computer Security - Threats -Harm - Vulnerabilities - Controls - Authentication - Access Control and Cryptography – Web User Side - Browser Attacks - Web Attacks Targeting Users - Obtaining User or Website Data - Email Attacks
Security in Operating Systems - Security in the Design of Operating Systems - Rootkit - Network security attack - Threats to Network Communications - Wireless Network Security - Denial of Service - Distributed Denial-of-Service.
Cryptography in Network Security - Firewalls - Intrusion Detection and Prevention Systems - Network Management - Databases - Security Requirements of Databases - Reliability and Integrity - Database Disclosure - Data Mining and Big Data.
Privacy Concepts -Privacy Principles and Policies -Authentication and Privacy – Data Mining -Privacy on the Web - Email Security - Privacy Impacts of Emerging Technologies - Where the Field Is Headed.
Security Planning - Business Continuity Planning - Handling Incidents - Risk Analysis - Dealing with Disaster - Emerging Technologies - The Internet of Things - Economics - Electronic Voting - Cyber Warfare- Cyberspace and the Law - International Laws – Cyber crime - Cyber Warfare and Home Land Security.
Reference Book:
1. George K. Kostopoulous, Cyber Space and Cyber Security, CRC Press, 2013. 2. Martti Lehto, Pekka Neittaanmäki, Cyber Security: Analytics, Technology and Automation edited, Springer International Publishing Switzerland 2015 3. Nelson Phillips and Enfinger Steuart, ―Computer Forensics and Investigations‖, Cengage Learning, New Delhi, 2009.
Text Book:
1.Charles P. Pfleeger Shari Lawrence Pfleeger Jonathan Margulies, Security in Computing, 5th Edition , Pearson Education , 2015