Skip to main content
  1. Resources/
  2. Study Materials/
  3. Information & Communication Technology Engineering/
  4. ICT Semester 5/
  5. Cyber Security (4353204)/

2 mins· ·
Milav Dabgar
Author
Milav Dabgar
Experienced lecturer in the electrical and electronic manufacturing industry. Skilled in Embedded Systems, Image Processing, Data Science, MATLAB, Python, STM32. Strong education professional with a Master’s degree in Communication Systems Engineering from L.D. College of Engineering - Ahmedabad.
Table of Contents

Cyber Security Slide Deck Plan
#

Overview
#

Creating professional Reveal.js slide decks for each major topic in the Cyber Security book. Each slide deck will cover one major topic with appropriate diagrams and structured content.

Slide Deck Structure
#

Unit 1: Introduction to Cyber Security & Cryptography
#

1. Cyber Security Fundamentals
#

  • File: 01-cyber-security-fundamentals.html
  • Topics:
    • Introduction to Cyber Security
    • Evolution of Cyber Security
    • Importance in modern world
    • Security domains comparison
  • Diagrams:
    • complete-cybersecurity-framework.svg
    • cyber-security-evolution-timeline.svg
    • cyber-security-fundamentals-overview.svg

2. CIA Triad
#

  • File: 02-cia-triad.html
  • Topics:
    • Confidentiality, Integrity, Availability
    • Each component detailed
    • Interrelationship
    • Real-world applications
  • Diagrams:
    • cia-triad-comprehensive.svg
    • cia-triad-detailed-implementation.svg

3. Cyber Security Key Terms
#

  • File: 03-cyber-security-key-terms.html
  • Topics:
    • Adversary, Attack, Countermeasure
    • Risk, Security Policy, System Resource
    • Threat, Vulnerability
    • Memorization techniques
  • Diagrams:
    • cyber-security-key-terms.svg
    • cyber-security-key-terms-relationships.svg

4. OSI Model Security
#

  • File: 04-osi-model-security.html
  • Topics:
    • Security at each OSI layer
    • Attacks, mechanisms, services
    • Layer-specific vulnerabilities
  • Diagrams:
    • osi-model-security.svg
    • osi-model-complete-security.svg
    • security-attacks-mechanisms-services.svg

5. Cryptography Basics
#

  • File: 05-cryptography-basics.html
  • Topics:
    • Overview of cryptography
    • Key concepts
    • Types of cryptography
    • Cryptographic protocols
  • Diagrams:
    • cryptography-basics.svg
    • cryptography-comprehensive-overview.svg

6. Symmetric vs Asymmetric Encryption
#

  • File: 06-symmetric-vs-asymmetric.html
  • Topics:
    • Symmetric encryption principles
    • Asymmetric encryption principles
    • Comparison and use cases
    • Digital signatures
  • Diagrams:
    • symmetric-vs-asymmetric.svg
    • symmetric-vs-asymmetric-detailed.svg

7. Classical Cryptography Techniques
#

  • File: 07-classical-cryptography.html
  • Topics:
    • Substitution techniques
    • Transposition techniques
    • Caesar cipher
    • Columnar transposition
  • Diagrams:
    • substitution-transposition.svg
    • caesar-cipher-mechanism.svg
    • columnar-transposition-cipher.svg

8. Hashing Algorithms
#

  • File: 08-hashing-algorithms.html
  • Topics:
    • Principles of hashing
    • Common algorithms (MD5, SHA)
    • Applications
    • Data integrity and authentication
  • Diagrams:
    • hashing-algorithms.svg
    • md5-algorithm.svg
    • hash-function-process.svg

Unit 2: Account & Data Security
#

9. Authentication Methods
#

  • File: 09-authentication-methods.html
  • Topics:
    • Passwords, Biometrics
    • Multi-factor Authentication
    • Single Sign-On
    • Cookies
  • Diagrams:
    • authentication-methods-comprehensive.svg
    • multi-factor-authentication.svg

10. Authorization and Access Control
#

  • File: 10-authorization-access-control.html
  • Topics:
    • Authorization principles
    • Access control methods
    • RBAC, ABAC, MAC, DAC
  • Diagrams:
    • authorization-methods.svg

11. CAPTCHA and Firewalls
#

  • File: 11-captcha-firewalls.html
  • Topics:
    • CAPTCHA mechanisms
    • Firewall types and architecture
    • Implementation considerations
  • Diagrams:
    • captcha-systems-comprehensive.svg
    • firewall-types-architecture.svg

12. Malicious Software
#

  • File: 12-malicious-software.html
  • Topics:
    • Types of malware
    • Virus, Worm, Trojan Horse
    • Effects and prevention
  • Diagrams:
    • malware-types-comprehensive.svg
    • malware-classification.svg

Progress Tracking
#

Completed Slide Decks
#

  • 01-cyber-security-fundamentals.html
  • 02-cia-triad.html
  • 03-cyber-security-key-terms.html
  • 04-osi-model-security.html
  • 05-cryptography-basics.html
  • 06-symmetric-vs-asymmetric.html
  • 07-classical-cryptography.html
  • 08-hashing-algorithms.html
  • 09-authentication-methods.html
  • 10-authorization-access-control.html
  • 11-captcha-firewalls.html
  • 12-malicious-software.html

Notes
#

  • Each slide deck will be self-contained
  • Professional design with consistent styling
  • Appropriate use of diagrams from the diagrams folder
  • Clear, concise content suitable for presentations
  • Interactive elements where appropriate