SlideShare a Scribd company logo
1 of 25
Download to read offline
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
1
Foundations of Security
Simplifying Security.
Module 1
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
2
Scenario
Franklin, an employee working for an 
organization, downloads free software 
from a website. After installing the 
software, however, Franklin's system 
reboots and starts to malfunction.
What might have gone
wrong with Franklin’s system?
What would you have done in
Franklin’s place?
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
3
Home‐computer Users at Risk Due to Use of ‘Folk Model’ Security
EAST LANSING, Mich. — Most home computers are vulnerable to hacker attacks because the users either mistakenly think they have 
enough security in place or they don’t believe they have enough valuable information that would be of interest to a hacker.
That’s the point of a paper published this month by Michigan State University’s Rick Wash, who says that most home‐computer users rely 
on what are known as “folk models.” Those are beliefs about what hackers or viruses are that people use to make decisions about security 
– to keep their information safe.
Unfortunately, they don’t often work the way they should.
“Home security is hard because people are untrained in security,” said Wash, an assistant professor in the Department of 
Telecommunication, Information Studies and Media. “But it isn’t because people are idiots. Rather they try their best to make sense of 
what’s going on and frequently make choices that leave them vulnerable.”
May 23, 2011 
http://news.msu.edu
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
4
'Fakefrag' Trojan Scares You into Paying Up
A devious new Trojan is putting the fear of hard drive failure 
into computer owners, and then rushing in to "save" the day —
at your expense.
Once the "Fakefrag" Trojan finds its way onto your system via 
specially crafted malicious Web pages, it gets to work on the 
task of making you believe all your files have been erased from 
your hard drive, the security firm Symantec reported.
Scareware scams, which try to convince users they have a 
computer virus, and then trick them into purchasing fake 
antivirus software, are nothing new. However, Fakefrag takes 
the crime a step further: it actually moves your files from the 
"All Users" folder to a temporary location, and hides files in the 
"Current User" folder, Symantec said. 
http://www.msnbc.msn.com
May 23, 2011 8:21:51 PM ET
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
5
Module Objectives
Security Incidents
Essential Terminologies
Computer Security
Why Security?
Potential Losses Due to Security 
Attacks
Elements of Security
Fundamental Concepts of Security
Layers of Security
Security Risks to Home Users
What to Secure?
What Makes a Home Computer 
Vulnerable?
What Makes a System Secure?
Benefits of Computer Security 
Awareness
Basic Computer Security Mechanisms
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
6
Computer 
Security
Potential 
Losses Due 
to Security 
Attacks
Essential 
Terminologies
Elements of 
Security
What Makes    
a Home 
Computer 
Vulnerable?
Benefits of 
Computer 
Security 
Awareness
Basic 
Computer 
Security 
Mechanisms
What to 
Secure?
Module Flow
Layers of 
Security
Security 
Risks to 
Home Users
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
7
0
100
200
300
400
500
600
700
2002 2003 2004 2005 2006 2007 2008 2009 2010
http://datalossdb.org
800
900
Security Incident Occurrences Over Time
2011
Report on January, 2011
SecurityIncidentOccurrencesOverTime
Years
6 14 23
141
537
511
787
604
409
10
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
8
Security Incidents by Breach Type - 2011
A security incident is “Any real or suspected adverse event in relation to the 
security of computer systems or computer networks.”
http://www.cert.org
10% 10% 10% 10% 10% 10%
40%
HackStolen 
Laptop
Stolen 
Document
Lost 
Laptop
Disposal 
Document
Web Unknown
http://datalossdb.org
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
9
Essential Terminologies
Threat Exploit Vulnerability
Cracker, Attacker, 
or Intruder
Attack Data Theft
An action or event that 
has the potential to 
compromise and/or 
violate security
A defined way to breach 
the security of an IT 
system through 
vulnerability
Existence of a weakness, 
design, or implementation 
error that can lead to an 
unexpected, undesirable 
event compromising the 
security of the system
An individual who breaks 
into computer systems in 
order to steal, change, or 
destroy information
Any action derived from 
intelligent threats to 
violate the security of the 
system
Any action of stealing 
the information from the 
users’ system
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
10
21
Security is a state of well‐
being of information and 
infrastructure
Computer security refers to 
the protection of computer 
systems and the 
information a user stores or 
processes 
Users should focus on 
various security threats and 
countermeasures in order to 
protect their information 
assets
Computer Security
3
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
11
Why Security?
Computer security is 
important for protecting the 
confidentiality, integrity, and 
availability of computer 
systems and their resources
Computer administration 
and management have 
become more complex 
which produces more attack 
avenues
Network environments and 
network‐based applications 
provide more attack paths
Evolution of technology has 
focused on the ease of use
while the skill level needed 
for exploits has decreased
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
12
Misuse of computer 
resources
Data loss/theft
Loss of trust
Financial loss
Unavailability of 
resources
Identity theft
Potential Losses Due to
Security Attacks
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
13
Module Flow
Computer 
Security
Potential 
Losses Due 
to Security 
Attacks
Essential 
Terminologies
Elements of 
Security
What Makes    
a Home 
Computer 
Vulnerable?
Benefits of 
Computer 
Security 
Awareness
Basic 
Computer 
Security 
Mechanisms
What to 
Secure?
Layers of 
Security
Security 
Risks to 
Home Users
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
14
Elements of Security
Authenticity is “the 
identification and assurance 
of the origin of information”
Confidentiality is “ensuring 
that information is accessible 
only to those authorized to 
have access” (ISO‐17799)
Availability is “ensuring that the 
information is accessible to 
authorized persons when 
required without delay”
Integrity is “ensuring that the 
information is accurate, 
complete, reliable, and is in its 
original form”
Non‐repudiation is “ensuring that a 
party to a contract or a communication 
cannot deny the authenticity of their 
signature on a document”
Non‐
Repudiation
AvailabilityIntegrityAuthenticityConfidentiality
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
15
The Security, Functionality, and Ease
of Use Triangle
Functionality
(Features)
Ease of
Use
Security
(Restrictions)
Moving the ball toward 
security means moving 
away from the 
functionality and ease of 
use
Applications/software products by default are preconfigured for ease of use, which makes the 
user vulnerable to various security flaws
Similarly, increased functionality (features) in an application make it difficult to use in addition 
to being less secure
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
16
Precaution
Maintenance
Reaction 
Adhering to the preventative measures while 
using computer system and applications
Managing all the changes in the computer 
applications and keeping them up to date
Acting timely when security incidents occur
Fundamental Concepts of Security
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
17
Layers of Security
Layer 1
Layer 2
Layer 3
Layer 4
Layer 5
Physical 
Security
Safeguards the 
personnel, 
hardware, programs, 
networks, and data 
from physical 
threats
Network 
Security
Protects the 
networks and 
their services from 
unauthorized 
modification, 
destruction, or 
disclosure
System 
Security
Protects the system 
and its information 
from theft, 
corruption, 
unauthorized 
access, or misuse
Application 
Security
Covers the use of 
software, 
hardware, and 
procedural 
methods to protect 
applications from 
external threats
User 
Security
Ensures that a valid 
user is logged in 
and that the 
logged‐in user is 
allowed to use an 
application/ 
program
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
18
Security Risks to Home Users
Home computers are prone to various cyber attacks as they provide attackers easy 
targets due to a low level of security awareness
Security risk to home users arise from various computer attacks and accidents
causing physical damage to computer systems
Computer Attacks
Malware attacks
Email attacks
Mobile code (Java/JavaScript/ActiveX) attacks
Denial of service and cross‐site scripting attacks
Identity theft and computer frauds
Packet sniffing
Being an intermediary for another attack 
(zombies)
Computer Accidents
Hard disk or other component failures
Power failure and surges
Theft of a computing device
Note: These threats and their countermeasures will be discussed in detail in the later modules
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
19
What to Secure?
Hardware  Software 
Information Communications
Laptops, Desktop PCs, CPU, 
hard disk, storage devices, 
cables, etc.
Operating system and software 
applications
Personal identification such as 
Social Security Number (SSN), 
passwords, credit card numbers, 
etc.
Emails, instant messengers, and 
browsing activites
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
20
Module Flow
Computer 
Security
Potential 
Losses Due 
to Security 
Attacks
Essential 
Terminologies
Elements of 
Security
What Makes    
a Home 
Computer 
Vulnerable?
Benefits of 
Computer 
Security 
Awareness
Basic 
Computer 
Security 
Mechanisms
What to 
Secure?
Layers of 
Security
Security 
Risks to 
Home Users
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
21
What Makes a Home Computer
Vulnerable?
Low level of 
security awareness
Default computer and 
application settings
Increasing online 
activities
None or very little 
investment in 
security systems
Not following any 
standard security 
policies or guidelines
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
22
System Access Controls Data Access Controls
System and Security 
Administration
System Design
What Makes a System Secure?
System security measures help protect computers and information stored in the systems 
from accidental loss, malicious threats, unauthorized access, etc.
Ensure that unauthorized users do not 
get into the system
Force legal users to be conscious about 
security
Monitor system activities such as who is 
accessing the data and for what purpose
Define access rules based on the system 
security levels
Perform regular system and security 
administration tasks such as configuring 
system settings,  implementing security 
policies, monitoring system state, etc.
Deploy various security characteristics in 
system hardware and software design 
such as memory segmentation, privilege 
isolation, etc.
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
23
Benefits of Computer Security
Awareness
Computer security awareness helps minimize the chances of computer attacks
It helps prevent the loss of information stored on the systems
It helps users to prevent cybercriminals from using their systems in order to 
launch attacks on the other computer systems
It helps users minimize losses in case of an accident that causes physical damage 
to computer systems
It enables users to protect sensitive information and computing resources from 
unauthorized access
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
24
Module Summary
 Security is a state of well‐being of information and infrastructures 
 Computer security is the protection of computing systems and the data that they 
store or access
 Confidentiality, integrity, non‐repudiation, authenticity, and availability are the 
elements of security
 Security risk to home users arise from various computer attacks and accidents 
causing physical damage to computer systems
 Computer security awareness helps minimize the chances of computer attacks and 
prevent the loss of information stored on the systems
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
25
Basic Computer Security Checklist
Regular backup of important files
Use of strong passwords
Use of firewall and intrusion detection systems
Use of anti‐virus systems
Use of encryption techniques and digital signatures
Regular update of operating system and other installed applications
Following standard guidelines for Internet activities
Physical security of computing infrastructure
Awareness of current security scenario and attack techniques

More Related Content

What's hot

Incident Response & Contingency PlanningCase Journal
Incident Response & Contingency PlanningCase JournalIncident Response & Contingency PlanningCase Journal
Incident Response & Contingency PlanningCase Journal
brittanyjespersen
 
ISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_Intindolo
John Intindolo
 
12102 vipre business-protecting-against-the-new-wave-of-malware
12102 vipre business-protecting-against-the-new-wave-of-malware12102 vipre business-protecting-against-the-new-wave-of-malware
12102 vipre business-protecting-against-the-new-wave-of-malware
Digital Pymes
 
Attack of the killer virus!
Attack of the killer virus!Attack of the killer virus!
Attack of the killer virus!
UltraUploader
 

What's hot (19)

C3
C3C3
C3
 
LIFARS - Financial Cybercrime
LIFARS - Financial CybercrimeLIFARS - Financial Cybercrime
LIFARS - Financial Cybercrime
 
Its report 050516
Its report 050516Its report 050516
Its report 050516
 
Quality of Information and Malware by Ashok Panwar
Quality of Information and Malware by Ashok PanwarQuality of Information and Malware by Ashok Panwar
Quality of Information and Malware by Ashok Panwar
 
Incident Response & Contingency PlanningCase Journal
Incident Response & Contingency PlanningCase JournalIncident Response & Contingency PlanningCase Journal
Incident Response & Contingency PlanningCase Journal
 
ISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_Intindolo
 
Internet Safety 2013 update for parents
Internet Safety 2013 update for parentsInternet Safety 2013 update for parents
Internet Safety 2013 update for parents
 
LIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to ChildrenLIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to Children
 
P50 fahl
P50 fahlP50 fahl
P50 fahl
 
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
 
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
 
Appreciating Contradications: The Cyberpsychology of Information Security
Appreciating Contradications: The Cyberpsychology of Information SecurityAppreciating Contradications: The Cyberpsychology of Information Security
Appreciating Contradications: The Cyberpsychology of Information Security
 
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONSCYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
 
Doc handout
Doc handoutDoc handout
Doc handout
 
12102 vipre business-protecting-against-the-new-wave-of-malware
12102 vipre business-protecting-against-the-new-wave-of-malware12102 vipre business-protecting-against-the-new-wave-of-malware
12102 vipre business-protecting-against-the-new-wave-of-malware
 
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and Forensics
 
Attack of the killer virus!
Attack of the killer virus!Attack of the killer virus!
Attack of the killer virus!
 
Keynote : CODE BLUE in the ICU! by Jeff Moss
Keynote : CODE BLUE in the ICU! by Jeff MossKeynote : CODE BLUE in the ICU! by Jeff Moss
Keynote : CODE BLUE in the ICU! by Jeff Moss
 

Similar to Cscu module 01 foundations of security

Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of security
Sejahtera Affif
 
Week 6 GuidancePsychological ResearchThere are many ways to co
Week 6 GuidancePsychological ResearchThere are many ways to coWeek 6 GuidancePsychological ResearchThere are many ways to co
Week 6 GuidancePsychological ResearchThere are many ways to co
ladonnacamplin
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
Gemy Chan
 
Cyber Security DepartmentGraduation Project (407422)
Cyber Security DepartmentGraduation Project  (407422)Cyber Security DepartmentGraduation Project  (407422)
Cyber Security DepartmentGraduation Project (407422)
OllieShoresna
 
Chapter 1 a
Chapter 1 aChapter 1 a
Chapter 1 a
kibrutry
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
Joy Chakraborty
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
Joy Chakraborty
 
Safety And Security on the Net Podcast
Safety And Security on the Net PodcastSafety And Security on the Net Podcast
Safety And Security on the Net Podcast
Kylie Stewart
 

Similar to Cscu module 01 foundations of security (20)

Are Your IT Systems Secure?
Are Your IT Systems Secure?Are Your IT Systems Secure?
Are Your IT Systems Secure?
 
Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of security
 
hacking and Computer viruses for Cyber Security
hacking and Computer viruses for Cyber Securityhacking and Computer viruses for Cyber Security
hacking and Computer viruses for Cyber Security
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Week 6 GuidancePsychological ResearchThere are many ways to co
Week 6 GuidancePsychological ResearchThere are many ways to coWeek 6 GuidancePsychological ResearchThere are many ways to co
Week 6 GuidancePsychological ResearchThere are many ways to co
 
Introduction to ethics 1
Introduction to ethics 1Introduction to ethics 1
Introduction to ethics 1
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
 
A Secure Network Bridging the Gap
A Secure Network Bridging the GapA Secure Network Bridging the Gap
A Secure Network Bridging the Gap
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data Security
 
Cyber Security DepartmentGraduation Project (407422)
Cyber Security DepartmentGraduation Project  (407422)Cyber Security DepartmentGraduation Project  (407422)
Cyber Security DepartmentGraduation Project (407422)
 
Seminar on Internet security
Seminar on Internet securitySeminar on Internet security
Seminar on Internet security
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Chapter 1 a
Chapter 1 aChapter 1 a
Chapter 1 a
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
A Hacker's perspective on ransomware
A Hacker's perspective on ransomwareA Hacker's perspective on ransomware
A Hacker's perspective on ransomware
 
Safety And Security on the Net Podcast
Safety And Security on the Net PodcastSafety And Security on the Net Podcast
Safety And Security on the Net Podcast
 

Recently uploaded

Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Sérgio Sacani
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Lokesh Kothari
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptx
gindu3009
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Sérgio Sacani
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Sérgio Sacani
 
Seismic Method Estimate velocity from seismic data.pptx
Seismic Method Estimate velocity from seismic  data.pptxSeismic Method Estimate velocity from seismic  data.pptx
Seismic Method Estimate velocity from seismic data.pptx
AlMamun560346
 

Recently uploaded (20)

GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)
 
Zoology 4th semester series (krishna).pdf
Zoology 4th semester series (krishna).pdfZoology 4th semester series (krishna).pdf
Zoology 4th semester series (krishna).pdf
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
 
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
 
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
 
VIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PVIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C P
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
 
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLKochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdf
 
CELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdfCELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdf
 
Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)
 
Creating and Analyzing Definitive Screening Designs
Creating and Analyzing Definitive Screening DesignsCreating and Analyzing Definitive Screening Designs
Creating and Analyzing Definitive Screening Designs
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptx
 
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls AgencyHire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
 
Chemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfChemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdf
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
 
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptxCOST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
 
Seismic Method Estimate velocity from seismic data.pptx
Seismic Method Estimate velocity from seismic  data.pptxSeismic Method Estimate velocity from seismic  data.pptx
Seismic Method Estimate velocity from seismic data.pptx
 

Cscu module 01 foundations of security