100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

Summary INTRODUCTION TO CYBER SECURITY (BETCK105/205 I) NOTES For First/Second Semester B.E[VTU/CBCS, ] Syllabus

Rating
-
Sold
-
Pages
143
Uploaded on
10-11-2025
Written in
2025/2026

 Introduction  Cybercrime: Definition and Origins of the Word  Cybercrime and Information Security  Who are Cybercriminals?  Classifications of Cybercrimes  Cybercrime: The Legal Perspectives  Cybercrimes: An Indian Perspective  Cybercrime and the Indian ITA 2000  A Global Perspective on Cybercrimes  Cybercrime Era: Survival Mantra for the Netizens

Show more Read less
Institution
Module











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Study
Module

Document information

Uploaded on
November 10, 2025
Number of pages
143
Written in
2025/2026
Type
Summary

Subjects

Content preview

INTRODUCTION TO CYBER SECURITY
(BETCK105/205 I)
NOTES


For First/Second Semester B.E[VTU/CBCS, 2023-2024] Syllabus




Jyothi R, Assistant Professor, Dept.of ISE Introduction to Cyber Security (BETCK105I/205I) 1

, Syllabus
Course Title: Introduction to Cyber Security Course Code: : BETCK105I/205
MODULE-I Teaching
Hours
Introduction to Cybercrime: Cybercrime: Definition and Origins of the Word, Cybercrime and
Information Security, Who are Cybercriminals? Classifications of Cybercrimes, An Indian
Perspective, Hacking and Indian Laws., Global PerspectivesTextbook:1 Chapter 1 (1.1 to 1.5, 8
1.7-1.9)
Blooms Taxonomy: L1 – Remembering, L2 – Understanding

MODULE-II Teaching
Hours
Cyber Offenses: How Criminals Plan Them: Introduction, How criminals plan the attacks,
Social Engineering, Cyber Stalking, Cybercafe & cybercrimes. Botnets: The fuel for cybercrime, 8
Attack Vector. Textbook:1 Chapter 2 (2.1 to 2.7)
Blooms Taxonomy: L1 – Remembering, L2 – Understanding

MODULE-III Teaching
Hours
Tools and Methods used in Cybercrime: Introduction, Proxy Servers, Anonymizers, Phishing,
Password Cracking, Key Loggers and Spyways, Virus and Worms, Trozen Horses and
Backdoors, Steganography, DoS and DDOS Attackes, Attacks on Wireless networks. 8
Textbook:1 Chapter 4 (4.1 to 4.9, 4.12)


Blooms Taxonomy: L1 – Remembering, L2 – Understanding
MODULE-IV Teaching
Hours
Phishing and Identity Theft: Introduction, methods of phishing, phishing, phising techniques,
spear phishing, types of phishing scams, phishing toolkits and spy phishing, counter measures,
Identity Theft Textbook:1 Chapter 5 (5.1. to 5.3) 8

Blooms Taxonomy: L1 – Remembering , L2 – Understanding
MODULE-V
Teaching
Hours
Understanding Computer Forensics: Introdcution, Historical Background of Cyberforensics,
Digital Foresics Science, Need for Computer Foresics, Cyber Forensics and Digital Evidence,
Digital Forensic Life cycle, Chain of Custody Concepts, network forensics. Textbook:1 Chapter 8
7 (7.1. to 7.5, 7.7 to 7.9)


Blooms Taxonomy: L1 – Remembering, L2 – Understanding
SL Name Of the Name Of the Edition and
Title Of The Book ISBN
No Author/s Publisher Year
, “Cyber Security: Understanding Sunit Belapure First Edition
Wiley India Pvt
1 Cyber Crimes, Computer Forensics and Nina (Reprinted 978-81- 265-21791, 2011,
Ltd
And Legal Perspectives” Godbole 2018)



Jyothi R, Assistant Professor, Dept.of ISE Introduction to Cyber Security (BETCK105I/205I) 2

, MODULE 1. INTRODUCTION TO CYBERCRIME


List of Topics:
 Introduction
 Cybercrime: Definition and Origins of the Word
 Cybercrime and Information Security
 Who are Cybercriminals?
 Classifications of Cybercrimes
 Cybercrime: The Legal Perspectives
 Cybercrimes: An Indian Perspective
 Cybercrime and the Indian ITA 2000
 A Global Perspective on Cybercrimes
 Cybercrime Era: Survival Mantra for the Netizens


INTRODUCTION


 “Cyber security is the protection of internet-connected systems, including hardware, software and data,
from cyber attacks”.
 “Cybersecurity” means protecting information, equipment, devices, computer, computer resource,
communication device and information stored therein from unauthorized access, use, disclosure, disruption,
modification or destruction.
 Almost everyone is aware of the rapid growth of the Internet.
 Given the unrestricted number of free websites, the Internet has undeniably opened a new way of
exploitation known as cybercrime.
 These activities involve the use of computers, the Internet, cyberspace and the worldwide web (WWW).
 Interestingly, cybercrime is not a new phenomena; the first recorded cybercrime took place in the year
1820.
 It is one of the most talked about topics in the recent years.
 Based on a 2008 survey in Australia, the below shows the cybercrime trend




Jyothi R, Assistant Professor, Dept.of ISE Introduction to Cyber Security (BETCK105I/205I) 3

, Figure: Cybercrime Trend


 Indian corporate and government sites have been attacked or defaced more than 780 times between
February 2000 and December 2002.
 There are also stories/news of other attacks; for example, according to a story posted on 3 December
2009, a total of 3,286 Indian websites were hacked in 5 months – between January and June 2009.
 Various cybercrimes and cases registered under cybercrimes by motives and suspects in States and
Union Territories (UTs).


CYBERCRIME: DEFINITION AND ORIGINS OF THE WORD


Definition:
“A crime conducted in which a computer was directly and significantly instrumental is called as a
Cybercrime.”


Alternative definitions of Cybercrime are as follows:
1. Any illegal act where a special knowledge of computer technology is essential for its perpetration (to
commit a crime), investigation or prosecution.
2. Any traditional crime that has acquired a new dimension or order of magnitude through the aid of a
computer, and abuses that have come into being because of computers.
3. Any financial dishonesty that takes place in a computer environment.




Jyothi R, Assistant Professor, Dept.of ISE Introduction to Cyber Security (BETCK105I/205I) 4
£2.69
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
Collouk

Get to know the seller

Seller avatar
Collouk Arizona State University
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
2 year
Number of followers
0
Documents
87
Last sold
-
well speciallized documents

Clear, concise, and accurate, providing the necessary information for the intended audience without ambiguity.

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions