Stuff Sector
Prepared by
S.Santhosh (Admin)
Important questions
share it a link alone
Don't waste my hardwork and valuable time
Don't share as screenshot kind request
most viewed dept will get update at first So Dont screenshot and share
Unit-1
INTRODUCTION
CIA Triad Reason for Cyber Crane Need for Cyber Security***
Cyber Law Cybert A Global Comfective on Cyber Crimes
The Indian IT Art Cybercrime and Punishment.***
UNIT ATTACKS AND COUNTERMEASURES
Scope of Cyber Attacks ,Security Breach
Types of Malicious Attacks ,Software
Common Attack Vectors Social engineering Attack**
Wireless Network Attack Web Application Attack, Attack Tools ***
UNIT III
RECONNAISSANCE
Social Engineering Reconnaissance; Scanning Port ,Network ,Vulnerability Scanning Scanning Methodology Ping Sweet Techniques **
Nmap Command Switches SYN,Stealth XMAS, NULL IDLE-FIN Scans
Banner Grabbing and OS Finger printing Techniques**.
UNIT IV
INTRUSION DETECTION
Based Intrusion Detection Networ,-Based Intrusion Detection Distributed or Hybrid Intrusion Detection
Intrusion Detection Exchange Format Honeypots Example System Snort.***
UNITV INTRUSION PREVENTION
Need for Firewalls ,Characteristics and Access Policy***
Types of Firewalls Firewall Basing Firewall Location
Configurations Intrusion Prevention Systems Example Unified Threat Management Products.***
Don't share as screenshot -Stuff sector
**Very important questions are bolded and may be asked based on this topic
PART-C
1.Compulsory Questions {a case study where the student will have to read and analyse the subject }mostly asked from unit 2, 5(OR) a situation given and you have to answer on your own
Unit-1
INTRODUCTION
CIA Triad Reason for Cyber Crane Need for Cyber Security***
Cyber Law Cybert A Global Comfective on Cyber Crimes
The Indian IT Art Cybercrime and Punishment.***
UNIT ATTACKS AND COUNTERMEASURES
Scope of Cyber Attacks ,Security Breach
Types of Malicious Attacks ,Software
Common Attack Vectors Social engineering Attack**
Wireless Network Attack Web Application Attack, Attack Tools ***
UNIT III
RECONNAISSANCE
Social Engineering Reconnaissance; Scanning Port ,Network ,Vulnerability Scanning Scanning Methodology Ping Sweet Techniques **
Nmap Command Switches SYN,Stealth XMAS, NULL IDLE-FIN Scans
Banner Grabbing and OS Finger printing Techniques**.
UNIT IV
INTRUSION DETECTION
Based Intrusion Detection Networ,-Based Intrusion Detection Distributed or Hybrid Intrusion Detection
Intrusion Detection Exchange Format Honeypots Example System Snort.***
UNITV INTRUSION PREVENTION
Need for Firewalls ,Characteristics and Access Policy***
Types of Firewalls Firewall Basing Firewall Location
Configurations Intrusion Prevention Systems Example Unified Threat Management Products.***
Don't share as screenshot -Stuff sector
**Very important questions are bolded and may be asked based on this topic
don't waste my hardwork and valuable time