Professional Documents
Culture Documents
Resource Person 1
NAME : MTS.D.RAJASELVI
Emailld : tharuntharshini@gmail.com
Experienee : 10 years
Noolmi! Opposite,
Vandavasi-504 408.
f. nciPal,
I ndo-American Collegle,
MODUTE 1:
!ntroduction: Definition of cyber security risk and associated terminology, the position of risk analysis
and management in relation to the other components of a cyber security program. Principles:
Assets,
vulnerabilities, threats, threat actors, likelihood. Management of risks compared to simple acceptance
Risk treatment qptiQnS: avoidance, mitigation, transfer, acceptance'
MODULE 2:
f
Assets: Tangibte and intangible assets in the cyber world (hardware / softwa re data, classificatfon,
criticality based on the importance and value to organization (not just monetary), dependencies,
potential for critical national infrastructure. Vulnerabilities: Sources of cyber vulnerability, complexity
of modern software, attack surface of modern systems, development of software for functionality and
not with security considerations, existing known and zero-day system vulnerabilities, vulnerability
databases and open information
MODULE 3
Threats: Cyberthreat categorization, sources, motivation, type, technicalvs. non technical(e.g. attacks
to cooling systems to disrupt cyber systems), threat actors, exBtoitation of cyber vulnerabilities leading
to impact.and associated likelihood. Risk management: Risk evaluation and associated selection of risk
(or a
treatment options, effects and selection of risk avoidance, mitigation, transfer, acceptance
combination thereof), risk management as an iterative process, risk profile stemming from modifications
from
in an organization's environment, building an organization's cyber security control environment
the results of risk analysis, introductioir to basic cyber security controls'
/ Describe the underlying principles of risk analysis and management and the
purpose and
matrix, etc.
,/ Recognize the difference between vulnerabilities and threats'
,/ Classify and describe a number of different risk assessment/management methodologies.
./ Classify and describe different assets and their values (including tangible and intangible
assets).
,/ ldentify and explain various threat sources'and the impacts that their materialization may -4-
' .manifest.
,/ Describe the risk management process, as it pertaihs to the protection of assets.
I Evaluate and select appropriate risk treatment options according to the combination
of impacts
and probabilities that the ris
4 t6h'-
PrinciPal'
,'t1lfi;l':k3""?'l"r*'
Department of Computer Science
Academic Yea r :2020 -2021
Course Schedute - CSCRM21
30 Hours Training Schedule
DAY 1
Mrs.D.Raj aselvi,A sst.Prof, Introduction: Definition of cyber
&, 2,45 pm to 3.45 prn
SAWE Co llege,Van liavasi security risk and associated terminology
ts.02.202r
DAY 2 The position of risk analysis and
f,
Mrs. D. Raj aselvi,A sst. Pro
& 2.45 pm to 3.45 pm management in relation to the other
SAWE College,Vandavasi components of a cyber security
16.02.202t
DAY 3 Principles: Assets, vulnerabilities,
f,
Mrs. D. Raj aselvi,A sst. Pro
& 2.45 pm to 3.45 pm threats, threat actors, likelihood
SAWE College,Vandavasi
Management of risks compared to
t7.02.2021
DAY 4 Assets: Tangible and intangible assets
Mrs. D.Raj ase I v i,A sst.Pro f,
8. 2.45 pm to 3.45 pm in the cyber world (hardware / software
SAWE College,Vandavasi
t8.02.2021 / data, classification
d&- -=514"{F€'ryt-a- t: -.
6-
Coordinator Principal
3 Prin cipal,
Ph: i2I@6 m ndo-American Colle$€,
* *
I
CheYYar'604 4Q7"
DEPARTMENT OF COMPUTER SCIENCE
ACADEMIC YEAR : 2021-2022
PROGRAM NAME: Cyber Risk Management
l. What does cyber security protect?
a) Cyber security protects criminals b) Cyber security protects internet-connected
systems
c) Cyber security protects hackers d) None of the mentioned
2. Who is the father of computer security?
a) August Kerckhoffs b) Bob Thomas c) Robert d) Charles
3. Which of the following is a type of cybei security?
a) Cloud Security b) Network Security c) Application Security d) All of the
above
4. Which of the following is an objective of network security?
a) Confidentiality b) Integrity c) Availability d) AII of the above
5. Which of the following is not a cybercrime?
a) Denial of Sen-ice b) Man in the Middle c) Malware d) AES
6. Which of the following is a component of cyber security?
a) Internet Of Things b) AI c) Database d) Attacks
7. Which of the follpwing is a type of cyber attack?
a) Phishing b) SQL Injections c) Password Attack d) All of the
above
8. "Cyberspace" was coined by --
a) Richard Stallman b) William Gibson c) Andrew Tannenbaum d) Scott
Fahlman
9. In which year has hacking become a practical crime and a matter of concern in the field of
cyber technology?
a) 1991 b) 1983 c) 1970 d) 1964
10. Which of the following act violates cyber security?
a) Exploit b) Attack c) Threat d) Vulnerability
+
Ph:
ee2OO6 5 cipal,
* lndoAmerlcan College,
- 604 Cheyyar- 604 4Ol
Firewalls can be of ---- kinds'
15 .
c)3 d)4
a) I b)2
16. Which of the following is
not a software'firewall?
Firewall Pro c) Endian Firewall d) LinksYs
a) Windows Firewall b) Outpost
Firewall
17. A firewall protects which
of the following attacks?
of Service (DoS) d) Shoulder
Phishing
a) b) DumPster diving c) Denial
surfing
18. There are tYPes of firewall'
d)2
b)4 c)3
a)5
19. Packet filtering firewalls are deployed on d)
bi switchts c) hubs
a) routers
rePeaters
20. ACL stands for
b) Anti-Control List
a) Access Condition List
d) Access Control List
c) Access Control Logs various details from its
web scripting languages dre used by attackers to fetch
21. What common
+
a i
*
DEPARTMENT OF COMPUTER SCIENCE
-Larnhr
ACADEMIC YEAR: 2021_2022
PROGRAM NAME: CYBER RISK MANAGEMENT_ CSCRM21
REG. No:LOf q PlT,
I o NAME: V'l P )i1 lA l:ini
YEAR/SEM: I DArE: ZO I '9
lV )'t-.a
8.
A. 1991 B. 1983
Which of the fo llowing:ct violates clber security?
g.rrrd D.1964
A. Exploit C. Threat
@ttackr,/ D. Vulnerability
*
'u!
(5 sootrde
.rfd i {
PrinciPal,
I ndo-Arire rica
n Coll eEle"
,U7
CtreYyar - 604 4Al
13. Which of the following is not a software firewall?
A. Windows Firewall B. Outpost Firewall Pro y(@e"Oian Firewall D. Linksys
Firewall
14. A firewall protects which of the following attacks? ' ./
A. Phishing B. Dumpster diving of Service (DoSy'D. Shoulder
@eniat
surfing
i5. There are types of firewall.
A.5 @- c.3 D.2
1 6. Packet filteringffialls are deployed on
I
@. routers
V B. switches C. hubs D
repeaters
17. What common web scripting languages are used by attackers to fetch various details from its
strfing useis?
A. Tcl and C# B. C++ and HTML C. HTML and and JavaScript
18 is the first phase of ethica].hacking.
A. DNS poisoning @nootp.inting \/ C. ARP-poisoning D. Enumeration
19. Enumeration does not depend on which of the following services?
A. DNS enumeration B. SNMP enumeration C. NTP enumeration @K,
enumeration
20. is used that tries for guessing the usernames by using SMTP service.
B. smtp-enum ' C. . snmp-enum D. snmp-user-enum
DEPARTMENT OF COMPUTER SCIENCE
ACADEMIC YEAR: 2021-2022
PROGRAM NAME: CYBER RISK MANAGEMENT_ CSCRM21
REG" ; 11? ITDD I
NO: LD . NAME, ?aofft'\
YEAR/sEM: E
/g
DArFI: 2A I l) ao z-l
,,/
l. Wly,f?oes cyber security protect?
-.g{CyU.r r."u.ity p.ot"ct. security protects systems
a
".i ^ir*K€Cyber
. C. Cyber security protects hackers D. None of the mentioned
2. Which of the following is a type of cyber security?
A. Cloud Security B. Network Security C. Application Security I of the
above
3. Which of the following is an objective of network security?
A, Confidentiality B.Integrity C. Availability All above-]
4. Which of the following is not a cybercrime?
A.Dentz(of Service B. Man in the Middle C. Malware
./
5. Wh)zl of the following is a component of cyber security?
\ffitemet Of Things B. AI C. Database D. Attacks
6. Which of the following is a type of cyber attack?
A. Phishing B. SQL Injections C. Password Attack of the
above
7. In which year has hacking.become a practical crime and a matter of concern in the field of
'gy?
A 99
8. Which of the.following
983
cyber security?
c.1970 D.1964
20 is used that tries for guessing the usernames by using SMTP service.
B. smtp-enum C. snmp-enum D. snmp-user-enum
DEPARTMENT OF COMPUTER SCIENCE
ACADEMIC YEAR: Z,OZL-ZOZZ
@routers
' B. switches C. hubs D
' repeaters
17. What common web scripting languages are used by attackers to fetch various details from its
surfing users? ,/
A. Tcl-andC# B. C++ and HTML C. HTML and Pytho@derl and JavaScript
18.
n. ONS poi*ring @no*printing C. ARP-poisoning D. Enumeration
which of the following services?
19. Enumeration does not depend on
A. DNS enumeration B. SNMP enumeration C. NTP S
enumeration
20. is used that tries for guessing the usernames by using SMTP seruice.
B. smtp-enum C. snmp-enum D. snmp-user-enum
xne$:ct*&fryr &r$tr *#1 ffierl$ffi#ffi
3t ailf ;{r.nsf or.s?,{}*,.*qc.sr r*il*g6x
$:rxr &r*rn*n$.[3r &S]tr$Bttsd
ti] ?h{
$fqL$\^trAt*L c.i\dd{fq U f1$ $'tEf t
S$T' "d_ \Jx $linre.
J\**.rl}dlt{3$ $3y f*lL_S* r*i$lh 'ffi- {irsrd*
f{ eq sgfrliet*{, {..}ndef, SBstSsn:{&e**{k}or
*",3fiS&rt
FEEDBACK FORM
COURSI ; ",,'.., ,,i. 1t'ir;-[-H CODE cTbe;- t'isn gS c-kv\ Ll
DEPARI\,I[,,.
z
,
: C4uEut ScraltuLt-
DURATIuI,T i ..,;_,,iS
DATE O$- C$i,,i.".[; iON
: 3o
z 2-o-t;LoLl
STUDEN"| i,i, .i;,iil &i REG NO
: I. Ast^rrrnr\ r LoF tq F t5O q I
SIGNATL,i'i;i: .; lf'l-l DATE
.,-o\et 2-\
1. How ;,,ii: i,:sliEiaj Was the cOUfsg is?
./
a/SriorLell'.':r.gice b. Agree c. Moderate
d. Disagree e. strongly Disagree
2. How ttr"iis cur){..{r"se useful for you?
e./st;,,::"-:r.r' Asree b. Agree c. Moderate d. Disagree e. Strongly
Disagree
3. Hov,; it;* ri,*i:lisiicat support hetped.in
this course?
/./
a/ s[; rus.j', A,.r.i'ee b. Agree c. Moderate d. Disagree e. strongly
Disagree
4. How iir t irrstructor teach the course?
a. sir"ri::,ly Agree {Agre" c. Moderate d. Disagree e. strongly
Disagree
5. i{ouv i.i;i",: uofit€nt of the course herped in your
knowredge upgradation?
a. stror;glyAgree {Agree c.Moderate d.Disagree
e. StronglyDisagree
6. Hovu'ii;+ i*structor provide information
about the course?
a' si1:.;1''lyAgree fuAgree .c. Moderate d. Disagree e. stronglyDisagree
7. Hovt;",,.: course help in your career?
g,4rr'c*gly Agree b..Agree c. Moderate d. Disagree e. strongly
Disagree
8. How L; .),{3u rate this overalt programme?
a. Sl,..,r:gly Agree
1," e c. Moderate d. Disagree e. Strongly Disagree
c
i
6 I
pal,
Pri
",+ lndoAmerican Colle$e'
CheYYar - 604 4OZ
Ir"lc*tp*&trYt& r$rcxn ffi *fr**6m
,?d*a. fu;s:r &q?***r{.r *:rxf {.*gg*
fu rnrsneorfiy,&ffffu tsd tr) T** *ffi *n"f&LL{,$l.di{#t
e-**,.j }tl.Effi srT K \qsllmr
,&.e*,ri?ij{**{r
hy e{}\*{* wffh rB- {},raarx er
FEEDBACK FORM
COURSI ,,riE W;TH CODE c$ Wl rqR
DEPARI,, ;"
nerft. Cs cK {z/
C" sc-ua1c-
DURATi- ,i\.I HoUFTS
3A
'"1 !,*[a+
DATE C;. ;MPLETION iz.<a* 3 - Z-oZ-S
STUDEI]"I ,.\ME & REG NO 'cr-K Y ^rl 2-6fl g(rr-ocS
,
slGNAl"i , wtTHDATE
.-...,,.',.,,
1. Hor. . ,.i,€sti ng was the course is?
g bla
a. i, i. 51y Agree . p/egr""
c. Moderate d. Disagree e. Strongly
Disagree
2. Hor,,' ; course useful for you?
,/
? i' 1ly Agree vAg,"" c. Moderate d, Disagree e. strongly
Disagree
3. Ho, iechnical support helped in this couise?
a.
"rly Agree VAgr"" c. Moderate d. Disagree e. strongly Disagree
!iir
4. Hov .. instructur teach the
course?
/,
&/ t, rrlyAgree b.'Agree c. Moderate Disagree
d. e. Strongly Disagree
5. Hor rontent of the course hetped in your knowtedge
./ upgradation?
a/ 1,. ri1'Agrec b.'Agree c. Moderate d. Disagree
e. Strongry Disagree
5. Hov
' i*structor: provide information about the course? l
cAl{
5-Pri n
pal,
Z Ph:2220O6 *
I r ndo-America n Collefle,