Cyber Security: Trends and Globar War

  • 176 views
Uploaded on

 

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
176
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
15
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Cyber Security: Trends and Global War 21 September, 2012 Muhammad Nasir Mumtaz Bhutta Centre for Communication Systems Research University of Surrey Guildford, Surrey GU2 7XH Email: m.bhutta@surrey.ac.uk, Tel: 01483 68 3036 www.surrey.ac.uk
  • 2. Presentation Outline• Brief History of Cyber Security.• Discussion of different areas of Cyber Security.• Future Trends in Cyber Security in different areas.• Policies of Asia, Europe and America for Cyber Security Warfare.• Top Ranked Areas in Cyber Security. www.ee.surrey.ac.uk/CCSR
  • 3. History French Cyber Machine : 16 CenturyLorenz Cipher Machine: used during World War II Enigma: Cryptanalysis Machine www.ee.surrey.ac.uk/CCSR
  • 4. Impact of Cyber Crimes www.ee.surrey.ac.uk/CCSR
  • 5. Cyber Security• Computers vulnerable to attacks. www.ee.surrey.ac.uk/CCSR
  • 6. Vulnerabilities to Malwares www.ee.surrey.ac.uk/CCSR
  • 7. OWASP Top 10 www.ee.surrey.ac.uk/CCSR
  • 8. Classification of different CyberSecurity Areas www.ee.surrey.ac.uk/CCSR
  • 9. What Roles can be Played inCyber Security• Forensics Expert • Intrusion Detection/Prevention, Computer Forensics, Exploitation Techniques, Reverse Engineering etc• Penetration Tester • Systems, Networks, Web Hacking• Security Architect• Security Management• Intrusion Analyst• Vulnerability Researcher www.ee.surrey.ac.uk/CCSR
  • 10. Some Useful Links• Hacking Tools List • http://netsecurity.about.com/od/hackertools/Tools_and_Utilities_Commonly_Used_to_Hack_Computer_Systems.htm• Some Top Blogs • http://taosecurity.blogspot.co.uk/ • http://andyitguy.blogspot.co.uk/ • http://pauldotcom.com/about.html • http://www.schneier.com/crypto-gram.html• Top 15 Most Influential People in Security • http://www.eweek.com/c/a/Security/The-15-Most-Influential- People-in-Security-Today/ www.ee.surrey.ac.uk/CCSR
  • 11. Global Security Wars http://www.youtube.com/watch?v=Tkcxi-D5_C0 www.ee.surrey.ac.uk/CCSR
  • 12. Thank You ! Discussions ? www.ee.surrey.ac.uk/CCSR