Cyber Security Essentials
Cyber Security Essentials
L T P C M
2 0 0 2 100
COURSE OBJECTIVES:
This course will enable the student to:
Understand the various types of cybercrimes.
Formulate the security problems in wireless devices and networks.
Identify the different types of cybercrimes and its associated cyber laws.
Gain knowledge about computer forensics and challenges in computer forensics.
Discuss the social impacts of cybercrime and privacy protection in an organization.
UNIT I - INTRODUCTION TO CYBERCRIME 9
Cybercrime : Mobile and Wireless Devices: Proliferation of Mobile and Wireless Devices-
Credit Card Frauds in Mobile and Wireless Computing Era -Security Challenges Posed by
Mobile Devices -Registry Settings for Mobile Devices -Authentication Service Security :
Cryptographic Security for Mobile Devices - LDAP Security for Hand- Held Mobile
Computing Devices -Attacks On Mobile Phones - Tools and Methods used in Cybercrime:
Proxy Servers and Anonymizers – Phishing - Password Cracking - Key Loggers and
Spywares - Buffer Overflow -Attacks on Wireless Networks.
UNIT III – CYBER SECURITY : LEAGAL PERSPECTIVE 9
Introduction - Cost of Cybercrime and IPR Issues -Web Threats for Organizations - Security
and Privacy Implications from Cloud Computing - Social Media Marketing -Social
Department of MCA Regulation - 2020 SEMESTER – III
6
Computing and Associated Challenges -Protecting People’s Privacy in the Organization -
Organizational Guide Lines for Internet Usage -Safe Computing Guidelines and Computer
Usage Policy - Incident Handling -Forensics Best Practices for Organizations - Media and
Asset Protection -Importance of endpoint Security in Organizations.
TOTAL = 30 Hours
COURSE OUTCOMES:
At the end of the course the student should be able to:
Acquire the knowledge about cybercrime and attacks in cybercrime.
Explore the tools and methods used to protect wireless devices and networks from
various attacks.
Analyse various Indian acts imposed in cybercrime.
Apply and know the importance of computer forensics in the digital world.
Exhibit the media and asset protection of an organization.
TEXT BOOKS
1. Nina Godbole, Sunit Belapure, “Cyber Security Understanding Cyber Crimes,
Computer Forensics and Legal Perspectives”, 2019, Wiley Publications ( Unit I – V).
REFERENCE BOOKS
2. Jennifer L. Bayuk,Jason Healey, Paul Rohmeyer, Marcus H. Sachs, Jeffrey Schmidt,
Joseph Weiss, “Cyber Security Policy Guidebook”, 2017, Wiley Pulications. (Unit -1)
3. Mayank Bhushan, Rajkumar Singh Rathore, Aatif jamshed “Fundamental of Cyber
Security Principles, Theory and Practices”, BPB Publications.
4. Thomas J. Mowbray, “Cyber Security Managing Systems, Conducting Testing and
Investigating Intrusions”, 2019, Wiley Publications.
5. Khadsare S, “ Cyber Security HandBook “, 2017, Mrs. Deepthy Chaudry
publications.