Unit-1

Introduction

  1. Confidentiality
  2. Integrity
  3. Availability

Extra:

  • Authenticity
  • Accountability

Information System

Components:

  1. Hardware
  2. Software
  3. People
  4. Procedures
  5. Network
  6. Data

Types:

  1. TPS (Transaction Processing System)
  2. DSS (Decision Support System)
  3. MIS (Management Information System)
  4. EIS (Executive Information System)

Cyber Attacks

  1. Cyber Stalking
  2. Child Pornography
  3. Forgery and Counterfeiting
  4. Software Piracy and Crime related to IPRs
  5. Cyber Terrorism
  6. Phishing
  7. Computer Vandalism
  8. Computer Hacking

Malware

  1. Adware
  2. Spyware
  3. Browser Hijacking Software
  4. Virus
  5. Worms
  6. Trojan Horse
  7. Scareware

Threats (Malicious and Deliberate Attack)

  1. Malware
  2. Phishing
  3. Man in the Middle
  4. Denial of Service
  5. Distributed Denial of Service
  6. SQL Injection
  7. Zero-day Exploit
  8. Ransomware
  9. DNS Attack

Unit-2

Intrusion Detection System

Logical Components:

  • Sensors
  • Analyzers
  • User Interface

Types:

  1. Host-based IDS
  2. Network-based IDS
  3. Hybrid or Distributed IDS

Intrusion Prevention System

  1. Host-based IPS
  2. Network-based IPS
  3. Hybrid IPS

Authentication Methods

User Authentication:

  • Identification Step
  • Verification Step

Types

  1. Password based
  2. Electronic User Authentication
  3. Biometric
  4. Taken Based
  5. Remote User

Biometric Authentication:

  • Facial Recognition
  • Fingerprint Recognition
  • Retina / Iris
  • Voice Recognition
  • Vein Recognition
  • Gait Recognition