diff --git a/7 SEMESTER/Management Information System/Week 10/Assignment/Assignment 10.pdf b/7 SEMESTER/Management Information System/Week 10/Assignment/Assignment 10.pdf new file mode 100644 index 0000000..c2a4de6 Binary files /dev/null and b/7 SEMESTER/Management Information System/Week 10/Assignment/Assignment 10.pdf differ diff --git a/7 SEMESTER/Management Information System/Week 10/Notes/Week 10 Notes.pdf b/7 SEMESTER/Management Information System/Week 10/Notes/Week 10 Notes.pdf new file mode 100644 index 0000000..7ef83c5 Binary files /dev/null and b/7 SEMESTER/Management Information System/Week 10/Notes/Week 10 Notes.pdf differ diff --git a/7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-46.pdf b/7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-46.pdf new file mode 100644 index 0000000..539ecc4 Binary files /dev/null and b/7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-46.pdf differ diff --git a/7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-47.pdf b/7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-47.pdf new file mode 100644 index 0000000..3b1e0ee Binary files /dev/null and b/7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-47.pdf differ diff --git a/7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-48.pdf b/7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-48.pdf new file mode 100644 index 0000000..d24c656 Binary files /dev/null and b/7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-48.pdf differ diff --git a/7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-49.pdf b/7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-49.pdf new file mode 100644 index 0000000..85e2bfe Binary files /dev/null and b/7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-49.pdf differ diff --git a/7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-50.pdf b/7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-50.pdf new file mode 100644 index 0000000..0ab5d36 Binary files /dev/null and b/7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-50.pdf differ diff --git a/7 SEMESTER/Management Information System/Week 11/Assignment/Assignment 11.pdf b/7 SEMESTER/Management Information System/Week 11/Assignment/Assignment 11.pdf new file mode 100644 index 0000000..ef5d41b Binary files /dev/null and b/7 SEMESTER/Management Information System/Week 11/Assignment/Assignment 11.pdf differ diff --git a/7 SEMESTER/Management Information System/Week 11/Notes/Malware Technology Solutions.html b/7 SEMESTER/Management Information System/Week 11/Notes/Malware Technology Solutions.html new file mode 100644 index 0000000..2c8be72 --- /dev/null +++ b/7 SEMESTER/Management Information System/Week 11/Notes/Malware Technology Solutions.html @@ -0,0 +1,192 @@ + + + + + + + + + + + Cybersecurity Protection Table + + + + +

Cybersecurity Protection Tools 🛡️

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Protection Tool 🛠️Definition 📖Examples 📝Features 🔑
Antivirus Software 🦠Detects and removes malicious software.Norton, McAfee, KasperskyReal-time scanning, virus removal, heuristic analysis.
Antispyware Software 👀Prevents and removes spyware infections.Spybot, MalwarebytesPrivacy protection, keystroke monitoring detection, updates.
Firewall 🔥Monitors and controls incoming/outgoing network traffic.Windows Defender, ZoneAlarmPacket filtering, access control, intrusion prevention.
Intrusion Detection System (IDS) 🚨Detects suspicious activity in a network.Snort, SuricataSignature-based detection, anomaly monitoring, real-time alerts.
Virtual Private Network (VPN) 🔒Encrypts internet traffic for privacy and security.NordVPN, ExpressVPNData encryption, IP masking, secure remote access.
Password Managers 🔑Securely stores and generates passwords.LastPass, DashlaneEncryption, auto-fill, password health checks.
Email Filtering Tools 📧Blocks spam and phishing emails.SpamTitan, MimecastContent filtering, domain blacklists, attachment scanning.
Multi-Factor Authentication (MFA) 🔑🔑Adds extra authentication layers for security.Google Authenticator, Duo2FA codes, biometric security, one-time passwords.
Endpoint Detection and Response (EDR) 💻Monitors endpoints for threats and vulnerabilities.CrowdStrike, Carbon BlackEndpoint monitoring, forensic tools, threat response.
+ + +
+ + + \ No newline at end of file diff --git a/7 SEMESTER/Management Information System/Week 11/Notes/Malware Technology Solutions.png b/7 SEMESTER/Management Information System/Week 11/Notes/Malware Technology Solutions.png new file mode 100644 index 0000000..f3b86dd Binary files /dev/null and b/7 SEMESTER/Management Information System/Week 11/Notes/Malware Technology Solutions.png differ diff --git a/7 SEMESTER/Management Information System/Week 11/Notes/Malware.html b/7 SEMESTER/Management Information System/Week 11/Notes/Malware.html new file mode 100644 index 0000000..acaa360 --- /dev/null +++ b/7 SEMESTER/Management Information System/Week 11/Notes/Malware.html @@ -0,0 +1,197 @@ + + + + + + + + + + + Cybersecurity Threats Table + + + + +

Cybersecurity Threats 🚨

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Threat Type 🛡️Definition 📖Examples 📝Properties 🔑
Virus 🦠A malicious code that replicates by attaching itself to programs.ILOVEYOU, MelissaSelf-replicating, requires host program, spreads via infected files.
Bug 🐞Software flaw causing unintended behavior or vulnerabilities.Heartbleed, ShellshockExploitable flaws, unintentional errors, patchable.
Malware 💻Malicious software designed to harm or exploit systems.Ransomware, TrojansInfiltration, disruption, data theft, various types (adware, spyware).
Spyware 👀Software that secretly monitors user activity.CoolWebSearch, FinFisherTracks user data, keystroke logging, hides in legit software.
Adware 📢Software displaying unwanted ads, often bundled with other apps.Fireball, DollarRevenueIntrusive, collects data, slows down systems.
Ransomware 💰Locks or encrypts data until a ransom is paid.WannaCry, PetyaData encryption, extortion, spreads via phishing emails.
Trojan Horse 🐎Malicious code disguised as legitimate software.Emotet, ZeusBackdoor access, spreads malware, data theft.
Phishing 🎣Fraudulent attempts to steal sensitive information.Email scams, fake websitesDeception, impersonation, data theft.
Worm 🪱Self-replicating malware that spreads across networks.Code Red, MydoomNo host needed, network spread, consumes resources.
Rootkit 🛠️Allows unauthorized access by masking its presence.ZeroAccess, FlameHides in OS, grants administrative control, hard to detect.
+ + +
+ + + \ No newline at end of file diff --git a/7 SEMESTER/Management Information System/Week 11/Notes/Malware.png b/7 SEMESTER/Management Information System/Week 11/Notes/Malware.png new file mode 100644 index 0000000..cdebe14 Binary files /dev/null and b/7 SEMESTER/Management Information System/Week 11/Notes/Malware.png differ diff --git a/7 SEMESTER/Management Information System/Week 11/Notes/Week 11 Notes.pdf b/7 SEMESTER/Management Information System/Week 11/Notes/Week 11 Notes.pdf new file mode 100644 index 0000000..fdd4eee Binary files /dev/null and b/7 SEMESTER/Management Information System/Week 11/Notes/Week 11 Notes.pdf differ diff --git a/7 SEMESTER/Management Information System/Week 11/Transcript/Lecture-51.pdf b/7 SEMESTER/Management Information System/Week 11/Transcript/Lecture-51.pdf new file mode 100644 index 0000000..09a0a1b Binary files /dev/null and b/7 SEMESTER/Management Information System/Week 11/Transcript/Lecture-51.pdf differ diff --git a/7 SEMESTER/Management Information System/Week 11/Transcript/Lecture-52.pdf b/7 SEMESTER/Management Information System/Week 11/Transcript/Lecture-52.pdf new file mode 100644 index 0000000..524f30c Binary files /dev/null and b/7 SEMESTER/Management Information System/Week 11/Transcript/Lecture-52.pdf differ diff --git a/7 SEMESTER/Management Information System/Week 11/Transcript/Lecture-53.pdf b/7 SEMESTER/Management Information System/Week 11/Transcript/Lecture-53.pdf new file mode 100644 index 0000000..a99b5b4 Binary files /dev/null and b/7 SEMESTER/Management Information System/Week 11/Transcript/Lecture-53.pdf differ diff --git a/7 SEMESTER/Management Information System/Week 11/Transcript/Lecture-54.pdf b/7 SEMESTER/Management Information System/Week 11/Transcript/Lecture-54.pdf new file mode 100644 index 0000000..51db031 Binary files /dev/null and b/7 SEMESTER/Management Information System/Week 11/Transcript/Lecture-54.pdf differ diff --git a/7 SEMESTER/Management Information System/Week 11/Transcript/Lecture-55.pdf b/7 SEMESTER/Management Information System/Week 11/Transcript/Lecture-55.pdf new file mode 100644 index 0000000..aaa43b7 Binary files /dev/null and b/7 SEMESTER/Management Information System/Week 11/Transcript/Lecture-55.pdf differ