Cyber Security
Section outline
-
-
The evolution of Information Communication Technology and growing security concerns demand flexible and generally comprehensive approach to the issue of cyber security. The rapid growth of ICT has raised various complex questions which need to be addressed. This course has been prepared with an aim to create more aware, responsive and responsible digital citizens, thereby contributing effectively to an overall healthy cyber security posture and ecosystem. It aims at equipping a learner with knowledge and skills in ensuring security against cyberattacks in data usage, e-commerce, social media as well as highlighting the laws, regulations, compliance, management and governance of cybersecurity.
The course will be facilitated by Dr. Samali V. Mlay. I look forward to imparting knowledge and also learning from you.
-
Please receive the course outline that will guide this course.
-
-
In this topic, we shall cover
- Cyber security terminologies
- Types of cyber attackers
- Cyber security increasing threat landscape
- Cyber terrorism Vs. Cyber warfare
- Critical IT and National Critical Infrastructure
- Case studies
-
Please watch this video about the greatest hacker in history
-
-
-
To Cover
- Cybercrimes targeting Computer systems
- Cybercrimes targeting Mobiles
- Online scams and frauds
- Social Media Scams and Frauds
- Social Engineering attacks
- Case studies
-
-
-
To Cover:
- End Point device and Mobile phone security
- Password policy
- Security patch management
- Data backup
- Downloading and management of third-party softwar
- Device security policy
- Host firewall and Anti-virus management
- Network security
- Cyber Security best practices
-
-
-
To Cover
- Definition of data, meta-data, big data, personal data and non-personal data.
- Data privacy and Data security
- Big data security issues and challenges
- Data protection
- Data protection principles
- Data protection regulations and compliance
- Social media- data privacy and security issues
-
-
-
To cover
- E-commerce, M-commerce and S-Commerce definitions
- Types, instruments and stakeholders of digital payments
- E-Commerce threats
- Digital payment frauds and preventive measures
- E-Commerce security
- PCI DSS and PA DSS Standards.
-
Please watch this short video to understand how e-payment works
-
-
-
Opened: Sunday, 14 September 2025, 12:00 AMDue: Tuesday, 23 September 2025, 12:00 AM
In your groups, prepare a summary presentation on the Acts and Laws in the assignment. Presentation will be done on September 23, 2025.
-
Please access the Act or Law you are to use for assignment 1
-
-
-
To Cover
- Cyber Laws and Legal and ethical aspects related to cyber security
- Cybercrime and legal landscape around the world
- IT Laws and Regulations in Uganda
- Cybercrime and punishments
-
-
-
Opened: Tuesday, 30 September 2025, 12:00 AMDue: Tuesday, 7 October 2025, 12:00 AM
The assignment is extracted from Topic 6 of the syllabus. In your groups prepare a summary presentation to be presented on October 7, 2025
-
-
-
To Cover
- Cyber security Management
- Cyber security Plan and Policy
- Cyber crisis management plan
- Risk assessmentBusiness continuity
- Cyber security audit and compliance
- Cyber security governance
-
-
-
Hello, please receive your course work results. In case of any queries, I will handle them between today and Friday November 14. Those who didn't present last week lost some marks so they have slightly less than their team members. Thank you
-