Cyber Security
Section outline
-
-
Please receive the course outline for Cybersecurity
-
-
To cover
- Cybersecurity terminologies
- Types of cyber attackers
- Cybersecurity increasing threat landscape
- Cyber terrorism Vs. Cyber warfare
- Critical IT and national critical infrastructure
- Case studies
-
Please watch this video about the greatest hacker in history
-
-
-
To Cover
1. Cybercrimes targeting Computer systems2. Cybercrimes targeting Mobiles3. Online scams and frauds4. Social Media Scams and Frauds5. Social Engineering attacks6. Case studies
-
-
-
To Cover;
- End Point device and Mobile phone security
- Password policy
- Security patch management
- Data backup
- Downloading and management of third-party software.
- Device security policy
- Host firewall and Anti-virus management
- Network security
- Cyber Security best practices
-
-
-
To Cover
- Definition of data, meta-data, big data, personal data and non-personal data.
- Data privacy and Data security
- Big data security issues and challenges
- Data protection
- Data protection principles
- Data protection regulations and compliance
- Social media- data privacy and security issues
-
-
-
To cover
- E-commerce, M-commerce and S-Commerce definitions
- Types, instruments and stakeholders of digital payments
- E-Commerce threats
- Digital payment frauds and preventive measures
- E-Commerce security
- PCI DSS and PA DSS Standards.
-
Please watch this short video to understand how ePayment works
-
-
-
Study the Acts provided as assigned and prepare a summary presentation on them
-
-
-
In this folder are a number of Acts and Laws. It is important to acquaint yourself with them
-
To Cover
- Cyber Laws and Legal and ethical aspects related to cyber security
- Cybercrime and legal landscape around the world
- IT Laws and Regulations in Uganda
- Cybercrime and punishments
-
-
-
This assignment is extracted from Topic 6 of the syllabus. Prepare a write up as instructed.
-
-
-
- Cyber security Management
- Cyber security Plan and Policy
- Cyber crisis management plan
- Risk assessment
- Business continuity
- Cyber security audit and compliance
- Cyber security governance
- Cyber security Management
-
-
-
Please find your results.
-