-
Notifications
You must be signed in to change notification settings - Fork 2
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Showing
18 changed files
with
389 additions
and
0 deletions.
There are no files selected for viewing
Binary file added
BIN
+135 KB
7 SEMESTER/Management Information System/Week 10/Assignment/Assignment 10.pdf
Binary file not shown.
Binary file added
BIN
+4.53 MB
7 SEMESTER/Management Information System/Week 10/Notes/Week 10 Notes.pdf
Binary file not shown.
Binary file added
BIN
+1.99 MB
7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-46.pdf
Binary file not shown.
Binary file added
BIN
+1.53 MB
7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-47.pdf
Binary file not shown.
Binary file added
BIN
+1.5 MB
7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-48.pdf
Binary file not shown.
Binary file added
BIN
+1.46 MB
7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-49.pdf
Binary file not shown.
Binary file added
BIN
+146 KB
7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-50.pdf
Binary file not shown.
Binary file added
BIN
+105 KB
7 SEMESTER/Management Information System/Week 11/Assignment/Assignment 11.pdf
Binary file not shown.
192 changes: 192 additions & 0 deletions
192
7 SEMESTER/Management Information System/Week 11/Notes/Malware Technology Solutions.html
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,192 @@ | ||
<!-- | ||
Author: Madhurima Rawat | ||
Date: 21 November 2024 | ||
Brief: This table provides an overview of various cybersecurity protection tools, detailing their definitions, | ||
examples, and key features. The tools listed include antivirus software, firewalls, intrusion detection systems, | ||
and more, each designed to protect users from cyber threats and ensure data privacy and security. | ||
Additional Details: | ||
- Color Palette: The table uses a soft pastel color scheme to visually separate sections, including shades | ||
such as light teal, lavender, and muted pink for a clean and professional design. | ||
- Emoji Usage: Emojis are included to make the content visually engaging. Each protection tool is paired | ||
with a relevant emoji (e.g., 🦠 for Antivirus Software, 🔒 for VPN) to symbolize the purpose or function | ||
of the tool. | ||
- Design: The table is designed to be clear and easy to navigate, with alternating background colors for | ||
each row to improve readability. The headers have a bold and contrasting color to stand out. | ||
- Purpose: The goal of this table is to provide an informative and educational overview of cybersecurity | ||
protection tools that are crucial for securing digital environments. It is intended for anyone seeking to | ||
learn about or implement cybersecurity solutions to safeguard against cyber threats. | ||
--> | ||
|
||
|
||
<!DOCTYPE html> | ||
<html lang="en"> | ||
|
||
<head> | ||
<meta charset="UTF-8"> | ||
<meta http-equiv="X-UA-Compatible" content="IE=edge"> | ||
<meta name="viewport" content="width=device-width, initial-scale=1.0"> | ||
<title>Cybersecurity Protection Table</title> | ||
<style> | ||
body { | ||
font-family: Arial, sans-serif; | ||
background-color: #f7f7ff; | ||
margin: 20px; | ||
color: #333; | ||
text-align: center; | ||
} | ||
|
||
h1 { | ||
color: #FF6347; | ||
} | ||
|
||
table { | ||
width: 100%; | ||
border-collapse: collapse; | ||
font-family: Arial, sans-serif; | ||
} | ||
|
||
th, | ||
td { | ||
padding: 12px; | ||
border: 1px solid #ccc; | ||
} | ||
|
||
th { | ||
background-color: #FF6347; | ||
color: #fff; | ||
} | ||
|
||
tr:nth-child(2) th, | ||
tr:nth-child(2) td { | ||
background-color: #ffe4e1; | ||
} | ||
|
||
/* Muted pink */ | ||
tr:nth-child(3) th, | ||
tr:nth-child(3) td { | ||
background-color: #e6e6fa; | ||
} | ||
|
||
/* Lavender */ | ||
tr:nth-child(4) th, | ||
tr:nth-child(4) td { | ||
background-color: #e0ffff; | ||
} | ||
|
||
/* Cyan */ | ||
tr:nth-child(5) th, | ||
tr:nth-child(5) td { | ||
background-color: #ffebcd; | ||
} | ||
|
||
/* Lemon */ | ||
tr:nth-child(6) th, | ||
tr:nth-child(6) td { | ||
background-color: #ffcccb; | ||
} | ||
|
||
/* Coral */ | ||
tr:nth-child(7) th, | ||
tr:nth-child(7) td { | ||
background-color: #e0f2f1; | ||
} | ||
|
||
/* Teal */ | ||
tr:nth-child(8) th, | ||
tr:nth-child(8) td { | ||
background-color: #fafad2; | ||
} | ||
|
||
/* Lemon Chiffon */ | ||
tr:nth-child(9) th, | ||
tr:nth-child(9) td { | ||
background-color: #d0f0c0; | ||
} | ||
|
||
/* Light Teal */ | ||
td:first-child { | ||
font-weight: bold; | ||
} | ||
|
||
/* Last Child */ | ||
tr:last-child th, | ||
tr:last-child td { | ||
background-color: #FFFEA3; | ||
/* Light teal */ | ||
} | ||
</style> | ||
</head> | ||
|
||
<body> | ||
<h1>Cybersecurity Protection Tools 🛡️</h1> | ||
<table> | ||
<tr> | ||
<th>Protection Tool 🛠️</th> | ||
<th>Definition 📖</th> | ||
<th>Examples 📝</th> | ||
<th>Features 🔑</th> | ||
</tr> | ||
<tr> | ||
<td>Antivirus Software 🦠</td> | ||
<td>Detects and removes malicious software.</td> | ||
<td>Norton, McAfee, Kaspersky</td> | ||
<td>Real-time scanning, virus removal, heuristic analysis.</td> | ||
</tr> | ||
<tr> | ||
<td>Antispyware Software 👀</td> | ||
<td>Prevents and removes spyware infections.</td> | ||
<td>Spybot, Malwarebytes</td> | ||
<td>Privacy protection, keystroke monitoring detection, updates.</td> | ||
</tr> | ||
<tr> | ||
<td>Firewall 🔥</td> | ||
<td>Monitors and controls incoming/outgoing network traffic.</td> | ||
<td>Windows Defender, ZoneAlarm</td> | ||
<td>Packet filtering, access control, intrusion prevention.</td> | ||
</tr> | ||
<tr> | ||
<td>Intrusion Detection System (IDS) 🚨</td> | ||
<td>Detects suspicious activity in a network.</td> | ||
<td>Snort, Suricata</td> | ||
<td>Signature-based detection, anomaly monitoring, real-time alerts.</td> | ||
</tr> | ||
<tr> | ||
<td>Virtual Private Network (VPN) 🔒</td> | ||
<td>Encrypts internet traffic for privacy and security.</td> | ||
<td>NordVPN, ExpressVPN</td> | ||
<td>Data encryption, IP masking, secure remote access.</td> | ||
</tr> | ||
<tr> | ||
<td>Password Managers 🔑</td> | ||
<td>Securely stores and generates passwords.</td> | ||
<td>LastPass, Dashlane</td> | ||
<td>Encryption, auto-fill, password health checks.</td> | ||
</tr> | ||
<tr> | ||
<td>Email Filtering Tools 📧</td> | ||
<td>Blocks spam and phishing emails.</td> | ||
<td>SpamTitan, Mimecast</td> | ||
<td>Content filtering, domain blacklists, attachment scanning.</td> | ||
</tr> | ||
<tr> | ||
<td>Multi-Factor Authentication (MFA) 🔑🔑</td> | ||
<td>Adds extra authentication layers for security.</td> | ||
<td>Google Authenticator, Duo</td> | ||
<td>2FA codes, biometric security, one-time passwords.</td> | ||
</tr> | ||
<tr> | ||
<td>Endpoint Detection and Response (EDR) 💻</td> | ||
<td>Monitors endpoints for threats and vulnerabilities.</td> | ||
<td>CrowdStrike, Carbon Black</td> | ||
<td>Endpoint monitoring, forensic tools, threat response.</td> | ||
</tr> | ||
</table> | ||
</body> | ||
|
||
<br> | ||
<footer> | ||
<p style="color: #FF6347; font-size: 20px;"><b>© 2024 Madhurima Rawat. All rights reserved.</b></p> | ||
</footer> | ||
|
||
</html> |
Binary file added
BIN
+116 KB
...ER/Management Information System/Week 11/Notes/Malware Technology Solutions.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
197 changes: 197 additions & 0 deletions
197
7 SEMESTER/Management Information System/Week 11/Notes/Malware.html
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,197 @@ | ||
<!-- | ||
Author: Madhurima Rawat | ||
Date: 21 November 2024 | ||
Brief: This table outlines common cybersecurity threats, their definitions, examples, and key properties. | ||
It provides a quick reference to understand different types of cyber threats and how they can impact systems | ||
and users, including viruses, spyware, ransomware, and phishing. | ||
Additional Details: | ||
- Color Palette: The table uses a light pastel color scheme with alternating shades such as lavender, coral, | ||
cyan, and light teal for different rows, ensuring the table is easy to read and visually appealing. | ||
- Emoji Usage: Each threat type is paired with a relevant emoji (e.g., 🦠 for Virus, 🛠️ for Rootkit, 🎣 for Phishing), | ||
enhancing the visual representation and making the content more engaging. | ||
- Design: The table is designed for clarity, with each row colored differently for easy differentiation. | ||
The headers use a contrasting color to stand out and maintain a cohesive design. | ||
- Purpose: The goal of this table is to educate users about various cybersecurity threats, the characteristics of | ||
each, and examples of well-known threats that have posed security risks in the past. This information is valuable | ||
for individuals and organizations looking to strengthen their cybersecurity knowledge and practices. | ||
--> | ||
|
||
|
||
<!DOCTYPE html> | ||
<html lang="en"> | ||
|
||
<head> | ||
<meta charset="UTF-8"> | ||
<meta http-equiv="X-UA-Compatible" content="IE=edge"> | ||
<meta name="viewport" content="width=device-width, initial-scale=1.0"> | ||
<title>Cybersecurity Threats Table</title> | ||
<style> | ||
body { | ||
font-family: Arial, sans-serif; | ||
background-color: #f7f7ff; | ||
margin: 20px; | ||
color: #333; | ||
text-align: center; | ||
} | ||
|
||
h1 { | ||
color: #FF6347; | ||
} | ||
|
||
table { | ||
width: 100%; | ||
border-collapse: collapse; | ||
font-family: Arial, sans-serif; | ||
} | ||
|
||
th, | ||
td { | ||
padding: 12px; | ||
border: 1px solid #ccc; | ||
} | ||
|
||
th { | ||
background-color: #FF6347; | ||
color: #fff; | ||
} | ||
|
||
tr:nth-child(2) th, | ||
tr:nth-child(2) td { | ||
background-color: #ffe4e1; | ||
} | ||
|
||
/* Muted pink */ | ||
tr:nth-child(3) th, | ||
tr:nth-child(3) td { | ||
background-color: #e6e6fa; | ||
} | ||
|
||
/* Lavender */ | ||
tr:nth-child(4) th, | ||
tr:nth-child(4) td { | ||
background-color: #e0ffff; | ||
} | ||
|
||
/* Cyan */ | ||
tr:nth-child(5) th, | ||
tr:nth-child(5) td { | ||
background-color: #ffebcd; | ||
} | ||
|
||
/* Lemon */ | ||
tr:nth-child(6) th, | ||
tr:nth-child(6) td { | ||
background-color: #ffcccb; | ||
} | ||
|
||
/* Coral */ | ||
tr:nth-child(7) th, | ||
tr:nth-child(7) td { | ||
background-color: #e0f2f1; | ||
} | ||
|
||
/* Teal */ | ||
tr:nth-child(8) th, | ||
tr:nth-child(8) td { | ||
background-color: #fafad2; | ||
} | ||
|
||
/* Lemon Chiffon */ | ||
tr:nth-child(9) th, | ||
tr:nth-child(9) td { | ||
background-color: #d0f0c0; | ||
} | ||
|
||
/* Light Teal */ | ||
td:first-child { | ||
font-weight: bold; | ||
} | ||
|
||
/* Last Child */ | ||
tr:last-child th, | ||
tr:last-child td { | ||
background-color: #FFFEA3; | ||
/* Light teal */ | ||
} | ||
</style> | ||
</head> | ||
|
||
<body> | ||
<h1>Cybersecurity Threats 🚨</h1> | ||
<table> | ||
<tr> | ||
<th>Threat Type 🛡️</th> | ||
<th>Definition 📖</th> | ||
<th>Examples 📝</th> | ||
<th>Properties 🔑</th> | ||
</tr> | ||
<tr> | ||
<td>Virus 🦠</td> | ||
<td>A malicious code that replicates by attaching itself to programs.</td> | ||
<td>ILOVEYOU, Melissa</td> | ||
<td>Self-replicating, requires host program, spreads via infected files.</td> | ||
</tr> | ||
<tr> | ||
<td>Bug 🐞</td> | ||
<td>Software flaw causing unintended behavior or vulnerabilities.</td> | ||
<td>Heartbleed, Shellshock</td> | ||
<td>Exploitable flaws, unintentional errors, patchable.</td> | ||
</tr> | ||
<tr> | ||
<td>Malware 💻</td> | ||
<td>Malicious software designed to harm or exploit systems.</td> | ||
<td>Ransomware, Trojans</td> | ||
<td>Infiltration, disruption, data theft, various types (adware, spyware).</td> | ||
</tr> | ||
<tr> | ||
<td>Spyware 👀</td> | ||
<td>Software that secretly monitors user activity.</td> | ||
<td>CoolWebSearch, FinFisher</td> | ||
<td>Tracks user data, keystroke logging, hides in legit software.</td> | ||
</tr> | ||
<tr> | ||
<td>Adware 📢</td> | ||
<td>Software displaying unwanted ads, often bundled with other apps.</td> | ||
<td>Fireball, DollarRevenue</td> | ||
<td>Intrusive, collects data, slows down systems.</td> | ||
</tr> | ||
<tr> | ||
<td>Ransomware 💰</td> | ||
<td>Locks or encrypts data until a ransom is paid.</td> | ||
<td>WannaCry, Petya</td> | ||
<td>Data encryption, extortion, spreads via phishing emails.</td> | ||
</tr> | ||
<tr> | ||
<td>Trojan Horse 🐎</td> | ||
<td>Malicious code disguised as legitimate software.</td> | ||
<td>Emotet, Zeus</td> | ||
<td>Backdoor access, spreads malware, data theft.</td> | ||
</tr> | ||
<tr> | ||
<td>Phishing 🎣</td> | ||
<td>Fraudulent attempts to steal sensitive information.</td> | ||
<td>Email scams, fake websites</td> | ||
<td>Deception, impersonation, data theft.</td> | ||
</tr> | ||
<tr> | ||
<td>Worm 🪱</td> | ||
<td>Self-replicating malware that spreads across networks.</td> | ||
<td>Code Red, Mydoom</td> | ||
<td>No host needed, network spread, consumes resources.</td> | ||
</tr> | ||
<tr> | ||
<td>Rootkit 🛠️</td> | ||
<td>Allows unauthorized access by masking its presence.</td> | ||
<td>ZeroAccess, Flame</td> | ||
<td>Hides in OS, grants administrative control, hard to detect.</td> | ||
</tr> | ||
</table> | ||
</body> | ||
|
||
<br> | ||
<footer> | ||
<p style="color: #FF6347; font-size: 20px;"><b>© 2024 Madhurima Rawat. All rights reserved.</b></p> | ||
</footer> | ||
|
||
</html> |
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+2.71 MB
7 SEMESTER/Management Information System/Week 11/Notes/Week 11 Notes.pdf
Binary file not shown.
Binary file added
BIN
+924 KB
7 SEMESTER/Management Information System/Week 11/Transcript/Lecture-51.pdf
Binary file not shown.
Binary file added
BIN
+1.11 MB
7 SEMESTER/Management Information System/Week 11/Transcript/Lecture-52.pdf
Binary file not shown.
Binary file added
BIN
+981 KB
7 SEMESTER/Management Information System/Week 11/Transcript/Lecture-53.pdf
Binary file not shown.
Binary file added
BIN
+769 KB
7 SEMESTER/Management Information System/Week 11/Transcript/Lecture-54.pdf
Binary file not shown.
Binary file added
BIN
+660 KB
7 SEMESTER/Management Information System/Week 11/Transcript/Lecture-55.pdf
Binary file not shown.