LEC 1
LEC 1
LEC 1
Data Security :
Fundamentals of Cyber
Security
Programming in
Basics of computer Basis of computer C/Java/Python
systems architecture Networks
systems, networking,
operating
systems, ....
3 This course
…
• This course is an applied course covering
various topics in computer and network
security. We will investigate the theory, tools
and problems of contemporary security.
4 Course Topics
1. Introduction to Security
1. What is cyber Security
2. Cyber Security importance
3. Cyber Security goal
4. Cyber Security Terms
5. Security Threats
2. Firewall and Anti-virus
3. Classical Encryption Techniques
4. Encryption Algorithms stream and block
5. Symmetric Keys (DES, AES)
6. Encryption algorithms mode of operations
7. Asymmetric (Public-Key) (RSA, ElGamal )
8. Digital Signature
9. Message Authentication and Hash Functions
10. Cybersecurity Technologies: proxy and ips and ids,
security mail gateway ,sandbox, Antivirus and
Anti-Malware and cyber attacks
5 Course overview
Lectur 2 hours/week
2 hours/week Tut/Labs
e
marks
Exploit
An exploit is a code or Command that takes advantage of a software or a System vulnerability
to remotely access a system,
gain a privileges on the System, or run a malicious code on the system.
Patch
A patch is a set of changes to a system program or its supporting data designed to update, fix,
or improve it. This includes
fixing security vulnerabilities
Asset
any data, device, people, or other component of the environment that supports information-
related activities.
Threat
Malicious Actor that seek to Abuse Asset, damage or steal data, steal Credentials, or disrupt
digital life in general.
Breach
Malicious Actor was Succeeded to gain unauthorized Access to organization protected Systems
or Data which lead to system
damage, data loss, etc..
Malware
software that is specifically designed to disrupt, damage, or gain unauthorized
access to a computer system
Attacker\Bad Guy
The adversary that seek to gaining unauthorized access to you environment in order
to damage systems or data or steal sensitive
info.
Threat and Computer’s
Attacking Methods
Security
threats
12
Security
1. Interruption :threats
An asset of the system is destroyed or
becomes unavailable or unusable
This is an attack on availability.
13
Security threats
Passive threats
Interception (secrecy)
Traffic analysis Release of
message
contents
Active threats
Interruptio
Fabrication Modificatio
n
authenticati( n
availabilit(
)ng )integrity(
)y