0% found this document useful (0 votes)
60 views2 pages

Cyber Security Essentials

This course will enable the student to:  Understand the various types of cybercrimes.  Formulate the security problems in wireless devices and networks.  Identify the different types of cybercrimes and its associated cyber laws.  Gain knowledge about computer forensics and challenges in computer forensics.  Discuss the social impacts of cybercrime and privacy protection in an organization.

Uploaded by

gprakas_74
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views2 pages

Cyber Security Essentials

This course will enable the student to:  Understand the various types of cybercrimes.  Formulate the security problems in wireless devices and networks.  Identify the different types of cybercrimes and its associated cyber laws.  Gain knowledge about computer forensics and challenges in computer forensics.  Discuss the social impacts of cybercrime and privacy protection in an organization.

Uploaded by

gprakas_74
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

P20MCA302 - CYBER SECURITY ESSENTIALS

L T P C M
2 0 0 2 100
COURSE OBJECTIVES:
This course will enable the student to:
 Understand the various types of cybercrimes.
 Formulate the security problems in wireless devices and networks.
 Identify the different types of cybercrimes and its associated cyber laws.
 Gain knowledge about computer forensics and challenges in computer forensics.
 Discuss the social impacts of cybercrime and privacy protection in an organization.
UNIT I - INTRODUCTION TO CYBERCRIME 9

Introduction: Cybercrime - Cybercrime and Information Security - Cyber Criminals-


Classification of Cybercrimes-Cyber Offenses: Attacks-Social Engineering- Cyberstalking-
Cyber Cafe and Cybercrimes-Botnets.
UNIT II – CYBERCRIME : MOBILE AND WIRELESS DEVICES 9

Cybercrime : Mobile and Wireless Devices: Proliferation of Mobile and Wireless Devices-
Credit Card Frauds in Mobile and Wireless Computing Era -Security Challenges Posed by
Mobile Devices -Registry Settings for Mobile Devices -Authentication Service Security :
Cryptographic Security for Mobile Devices - LDAP Security for Hand- Held Mobile
Computing Devices -Attacks On Mobile Phones - Tools and Methods used in Cybercrime:
Proxy Servers and Anonymizers – Phishing - Password Cracking - Key Loggers and
Spywares - Buffer Overflow -Attacks on Wireless Networks.
UNIT III – CYBER SECURITY : LEAGAL PERSPECTIVE 9

Introduction – Cyber Security Evolution – Cyber Security Objectives - Cyberlaws: The


Indian Context - Indian IT Act - Digital Signature and the Indian IT Act - Amendments to
the Indian IT Act - Cybercrime and the Punishment –Cyberlaw - Technology and Students:
Indian Scenario.
UNIT IV – COMPUTER FORENSICS 9

Introduction - Historical Background of Cyber Forensics - Digital Forensics Science - Need


for Computer Forensics -Cyber Forensics and Digital Evidence - Forensics Analysis of E-
Mail - Digital Forensics Life Cycle -Chain of Custody Concept - Network Forensics -
Computer Forensic Investigation - Computer Forensic and Steganography -Challenges in
Computer Forensics - Forensics Auditing – Anti-forensics.
UNIT V –SOCIAL IMPLICATIONS 9

Introduction - Cost of Cybercrime and IPR Issues -Web Threats for Organizations - Security
and Privacy Implications from Cloud Computing - Social Media Marketing -Social
Department of MCA Regulation - 2020 SEMESTER – III

6
Computing and Associated Challenges -Protecting People’s Privacy in the Organization -
Organizational Guide Lines for Internet Usage -Safe Computing Guidelines and Computer
Usage Policy - Incident Handling -Forensics Best Practices for Organizations - Media and
Asset Protection -Importance of endpoint Security in Organizations.
TOTAL = 30 Hours
COURSE OUTCOMES:
At the end of the course the student should be able to:
 Acquire the knowledge about cybercrime and attacks in cybercrime.
 Explore the tools and methods used to protect wireless devices and networks from
various attacks.
 Analyse various Indian acts imposed in cybercrime.
 Apply and know the importance of computer forensics in the digital world.
 Exhibit the media and asset protection of an organization.

TEXT BOOKS
1. Nina Godbole, Sunit Belapure, “Cyber Security Understanding Cyber Crimes,
Computer Forensics and Legal Perspectives”, 2019, Wiley Publications ( Unit I – V).
REFERENCE BOOKS
2. Jennifer L. Bayuk,Jason Healey, Paul Rohmeyer, Marcus H. Sachs, Jeffrey Schmidt,
Joseph Weiss, “Cyber Security Policy Guidebook”, 2017, Wiley Pulications. (Unit -1)
3. Mayank Bhushan, Rajkumar Singh Rathore, Aatif jamshed “Fundamental of Cyber
Security Principles, Theory and Practices”, BPB Publications.
4. Thomas J. Mowbray, “Cyber Security Managing Systems, Conducting Testing and
Investigating Intrusions”, 2019, Wiley Publications.
5. Khadsare S, “ Cyber Security HandBook “, 2017, Mrs. Deepthy Chaudry
publications.

Department of MCA Regulation - 2020 SEMESTER – III

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy