Cyber Security: Trends and Globar War
-
Upload
nasirbhutta -
Category
Technology
-
view
433 -
download
0
description
Transcript of Cyber Security: Trends and Globar War
![Page 1: Cyber Security: Trends and Globar War](https://reader033.fdocuments.us/reader033/viewer/2022061207/5484aa40b4af9fa57d8b457f/html5/thumbnails/1.jpg)
Muhammad Nasir Mumtaz BhuttaCentre for Communication Systems Research
University of SurreyGuildford, Surrey
GU2 7XHEmail: [email protected],
Tel: 01483 68 3036
www.surrey.ac.uk
Cyber Security: Trends and Global War
21 September, 2012
![Page 2: Cyber Security: Trends and Globar War](https://reader033.fdocuments.us/reader033/viewer/2022061207/5484aa40b4af9fa57d8b457f/html5/thumbnails/2.jpg)
www.ee.surrey.ac.uk/CCSR
Presentation Outline
• Brief History of Cyber Security. • Discussion of different areas of
Cyber Security. • Future Trends in Cyber Security in
different areas. • Policies of Asia, Europe and America
for Cyber Security Warfare. • Top Ranked Areas in Cyber Security.
![Page 3: Cyber Security: Trends and Globar War](https://reader033.fdocuments.us/reader033/viewer/2022061207/5484aa40b4af9fa57d8b457f/html5/thumbnails/3.jpg)
www.ee.surrey.ac.uk/CCSR
History
Lorenz Cipher Machine: used during World War II
French Cyber Machine : 16 Century
Enigma: Cryptanalysis Machine
![Page 4: Cyber Security: Trends and Globar War](https://reader033.fdocuments.us/reader033/viewer/2022061207/5484aa40b4af9fa57d8b457f/html5/thumbnails/4.jpg)
www.ee.surrey.ac.uk/CCSR
Impact of Cyber Crimes
![Page 5: Cyber Security: Trends and Globar War](https://reader033.fdocuments.us/reader033/viewer/2022061207/5484aa40b4af9fa57d8b457f/html5/thumbnails/5.jpg)
www.ee.surrey.ac.uk/CCSR
Cyber Security
• Computers vulnerable to attacks.
![Page 6: Cyber Security: Trends and Globar War](https://reader033.fdocuments.us/reader033/viewer/2022061207/5484aa40b4af9fa57d8b457f/html5/thumbnails/6.jpg)
www.ee.surrey.ac.uk/CCSR
Vulnerabilities to Malwares
![Page 7: Cyber Security: Trends and Globar War](https://reader033.fdocuments.us/reader033/viewer/2022061207/5484aa40b4af9fa57d8b457f/html5/thumbnails/7.jpg)
www.ee.surrey.ac.uk/CCSR
OWASP Top 10
![Page 8: Cyber Security: Trends and Globar War](https://reader033.fdocuments.us/reader033/viewer/2022061207/5484aa40b4af9fa57d8b457f/html5/thumbnails/8.jpg)
www.ee.surrey.ac.uk/CCSR
Classification of different Cyber Security Areas
![Page 9: Cyber Security: Trends and Globar War](https://reader033.fdocuments.us/reader033/viewer/2022061207/5484aa40b4af9fa57d8b457f/html5/thumbnails/9.jpg)
www.ee.surrey.ac.uk/CCSR
What Roles can be Played in Cyber Security • Forensics Expert• Intrusion Detection/Prevention, Computer
Forensics, Exploitation Techniques, Reverse Engineering etc
• Penetration Tester• Systems, Networks, Web Hacking
• Security Architect • Security Management • Intrusion Analyst• Vulnerability Researcher
![Page 10: Cyber Security: Trends and Globar War](https://reader033.fdocuments.us/reader033/viewer/2022061207/5484aa40b4af9fa57d8b457f/html5/thumbnails/10.jpg)
www.ee.surrey.ac.uk/CCSR
Some Useful Links
• Hacking Tools List• http://
netsecurity.about.com/od/hackertools/Tools_and_Utilities_Commonly_Used_to_Hack_Computer_Systems.htm
• Some Top Blogs• http://taosecurity.blogspot.co.uk/• http://andyitguy.blogspot.co.uk/• http://pauldotcom.com/about.html• http://www.schneier.com/crypto-gram.html
• Top 15 Most Influential People in Security• http://www.eweek.com/c/a/Security/The-15-Most-Influen
tial-People-in-Security-Today/
![Page 11: Cyber Security: Trends and Globar War](https://reader033.fdocuments.us/reader033/viewer/2022061207/5484aa40b4af9fa57d8b457f/html5/thumbnails/11.jpg)
www.ee.surrey.ac.uk/CCSR
Global Security Wars
http://www.youtube.com/watch?v=Tkcxi-D5_C0
![Page 12: Cyber Security: Trends and Globar War](https://reader033.fdocuments.us/reader033/viewer/2022061207/5484aa40b4af9fa57d8b457f/html5/thumbnails/12.jpg)
www.ee.surrey.ac.uk/CCSR
Thank You !
Discussions ?