Unit-1
Introduction
- Confidentiality
- Integrity
- Availability
Extra:
- Authenticity
- Accountability
Information System
Components:
- Hardware
- Software
- People
- Procedures
- Network
- Data
Types:
- TPS (Transaction Processing System)
- DSS (Decision Support System)
- MIS (Management Information System)
- EIS (Executive Information System)
Cyber Attacks
- Cyber Stalking
- Child Pornography
- Forgery and Counterfeiting
- Software Piracy and Crime related to IPRs
- Cyber Terrorism
- Phishing
- Computer Vandalism
- Computer Hacking
Malware
- Adware
- Spyware
- Browser Hijacking Software
- Virus
- Worms
- Trojan Horse
- Scareware
Threats (Malicious and Deliberate Attack)
- Malware
- Phishing
- Man in the Middle
- Denial of Service
- Distributed Denial of Service
- SQL Injection
- Zero-day Exploit
- Ransomware
- DNS Attack
Unit-2
Intrusion Detection System
Logical Components:
- Sensors
- Analyzers
- User Interface
Types:
- Host-based IDS
- Network-based IDS
- Hybrid or Distributed IDS
Intrusion Prevention System
- Host-based IPS
- Network-based IPS
- Hybrid IPS
Authentication Methods
User Authentication:
- Identification Step
- Verification Step
Types
- Password based
- Electronic User Authentication
- Biometric
- Taken Based
- Remote User
Biometric Authentication:
- Facial Recognition
- Fingerprint Recognition
- Retina / Iris
- Voice Recognition
- Vein Recognition
- Gait Recognition