Syllabus Cyber Security - [CCS340] UNIT I INTRODUCTION Cyber Security - History of Internet - Impact of Internet - CIA Triad; Reason for Cyber Crime - Need for Cyber Security - History of Cyber Crime; Cybercriminals - Classification of Cybercrimes - A Global Perspective on Cyber Crimes; Cyber Laws - The Indian IT Act - Cybercrime and Punishment. (Chapter - 1) UNIT II ATTACKS AND COUNTERMEASURES OSWAP; Malicious Attack Threats and Vulnerabilities : Scope of Cyber-Attacks - Security Breach - Types of Malicious Attacks - Malicious Software - Common Attack Vectors - Social engineering Attack - Wireless Network Attack - Web Application Attack - Attack Tools - Countermeasures. (Chapter - 2) UNIT III RECONNAISSANCE Harvester - Whois - Netcraft - Host - Extracting Information from DNS - Extracting Information from E-mail Servers - Social Engineering Reconnaissance; Scanning - Port Scanning - Network Scanning and Vulnerability Scanning - Scanning Methodology - Ping Sweer Techniques - Nmap Command Switches - SYN - Stealth - XMAS - NULL - IDLE - FIN Scans - Banner Grabbing and OS Finger printing Techniques. (Chapter - 3) UNIT IV INTRUSION DETECTION Host - Based Intrusion Detection - Network - Based Intrusion Detection - Distributed or Hybrid Intrusion Detection - Intrusion Detection Exchange Format - Honeypots - Example System Snort. (Chapter - 4) UNIT V INTRUSION PREVENTION Firewalls and Intrusion Prevention Systems : Need for Firewalls - Firewall Characteristics and Access Policy - Types of Firewalls - Firewall Basing - Firewall Location and Configurations - Intrusion Prevention Systems - Example Unified Threat Management Products. (Chapter - 5)