100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

Summary CYBER SECURITY [R18A0521] LECTURE NOTES B.TECH III YEAR – II SEM (R18) ()

Rating
-
Sold
-
Pages
37
Uploaded on
10-11-2025
Written in
2020/2021

DEPARTMENT OF CSE MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY (Autonomous Institution – UGC, Govt. of India) Recognized under 2(f) and 12 (B) of UGC ACT 1956 (Affiliated to JNTUH, Hyderabad, Approved by AICTE - Accredited by NBA & NAAC – ‘A’ Grade - ISO 9001:2015 Certified) Maisammaguda, Dhulapally (Post Via. Hakimpet), Secunderabad – 500100, Telangana State, India

Show more Read less
Institution
Course











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Course

Document information

Uploaded on
November 10, 2025
Number of pages
37
Written in
2020/2021
Type
Summary

Subjects

Content preview

CYBER SECURITY
[R18A0521]
LECTURE NOTES


B.TECH III YEAR – II SEM (R18)


(2020-2021)




DEPARTMENT OF CSE

MALLA REDDY COLLEGE OF ENGINEERING &
TECHNOLOGY
(Autonomous Institution – UGC, Govt. of
India)
Recognized under 2(f) and 12 (B) of UGC ACT 1956
(Affiliated to JNTUH, Hyderabad, Approved by AICTE - Accredited by NBA & NAAC – ‘A’ Grade - ISO 9001:2015
Certified)

Maisammaguda, Dhulapally (Post Via. Hakimpet), Secunderabad – 500100,
Telangana State, India

,MALLA REDDY COLLEGE OF ENGINEERING AND TECHNOLOGY

III Year B.Tech II Sem

LT/P/D
C3-/-/-3
(RA18A0521) CYBER SECURITY
(Professional Elective 2)
Course objectives:
• To understand various types of cyber-attacks and cyber-crimes
• To learn threats and risks within context of the cyber security
• To have an overview of the cyber laws & concepts of cyber forensics
• To study the defensive techniques against these attacks


UNIT -I
Introduction to Cyber Security: Basic Cyber Security Concepts, layers of security,
Vulnerability, threat, Harmful acts, Internet Governance – Challenges and Constraints,
Computer Criminals, CIA Triad, Assets and Threat, motive of attackers, active attacks,
passive attacks, Software attacks, hardware attacks, Cyber Threats-Cyber Warfare, Cyber
Crime, Cyber terrorism, Cyber Espionage, etc., Comprehensive Cyber Security Policy.

UNIT - II
Cyberspace and the Law & Cyber Forensics: Introduction, Cyber Security Regulations,
Roles of International Law. The INDIAN Cyberspace, National Cyber Security Policy.

Introduction, Historical background of Cyber forensics, Digital Forensics Science, The
Need for Computer Forensics, Cyber Forensics and Digital evidence, Forensics Analysis of
Email, Digital Forensics Lifecycle, Forensics Investigation, Challenges in Computer
Forensics


UNIT - III
Cybercrime: Mobile and Wireless Devices: Introduction, Proliferation of Mobile and
Wireless Devices, Trends in Mobility, Credit card Frauds in Mobile and Wireless
Computing Era, Security Challenges Posed by Mobile Devices, Registry Settings for Mobile
Devices, Authentication service Security, Attacks on Mobile/Cell Phones, Organizational
security Policies and Measures in Mobile Computing Era, Laptops.

UNIT- IV
Cyber Security: Organizational Implications: Introduction, cost of cybercrimes and IPR
issues, web threats for organizations, security and privacy implications, social media

,marketing: security risks and perils for organizations, social computing and the associated
challenges for organizations.

UNIT - V
Privacy Issues: Basic Data Privacy Concepts: Fundamental Concepts, Data Privacy Attacks,
Datalinking and profiling, privacy policies and their specifications, privacy policy languages,
privacy in different domains- medical, financial, etc

Cybercrime: Examples and Mini-Cases
Examples: Official Website of Maharashtra Government Hacked, Indian Banks Lose
Millions of Rupees, Parliament Attack, Pune City Police Bust Nigerian Racket, e-mail
spoofing instances. Mini-Cases: The Indian Case of online Gambling, An Indian Case of
Intellectual Property Crime, Financial Frauds in Cyber Domain.


TEXT BOOKS:
1. Nina Godbole and SunitBelpure, Cyber Security Understanding Cyber
Crimes,Computer Forensics and Legal Perspectives,Wiley

2. B.B.Gupta,D.P.Agrawal,HaoxiangWang,ComputerandCyberSecurity:Principle
s, Algorithm, Applications, and Perspectives, CRC Press, ISBN
9780815371335,2018.


REFERENCES:
1. Cyber Security Essentials, James Graham, Richard Howard and Ryan Otson,
CRCPress.

2. Introduction to Cyber Security, Chwan-Hwa(john) Wu,J. David Irwin, CRC Press
T&FGroup.


Course Outcomes:
The students will be able to:

1. Analyze cyber-attacks, types of cybercrimes, cyber laws and also how to protect
them self and ultimately the entire Internet community from such attacks.
2. Interpret and forensically investigate security incidents
3. Apply policies and procedures to manage Privacy issues
4. Design and develop secure software modules

, UNIT-I

Introduction to Cyber Security

Cyber Security Introduction - Cyber Security Basics:

Cyber security is the most concerned matter as cyber threats and attacks are overgrowing.
Attackers are now using more sophisticated techniques to target the systems. Individuals,
small-scale businesses or large organization, are all being impacted. So, all these firms whether
IT or non-IT firms have understood the importance of Cyber Security and focusing on adopting
all possible measures to deal with cyber threats.

What is cyber security?

"Cyber security is primarily about people, processes, and technologies working together to
encompass the full range of threat reduction, vulnerability reduction, deterrence, international
engagement, incident response, resiliency, and recovery policies and activities, including
computer network operations, information assurance, law enforcement, etc."
OR
Cyber security is the body of technologies, processes, and practices designed to protect
networks, computers, programs and data from attack, damage or unauthorized access.

• The term cyber security refers to techniques and practices designed to protect digital
data.

• The data that is stored, transmitted or used on an information system.
OR
Cyber security is the protection of Internet-connected systems, including hardware, software,
and data from cyber attacks.
It is made up of two words one is cyber and other is security.
• Cyber is related to the technology which contains systems, network and programs or
data.

• Whereas security related to the protection which includes systems security, network
security and application and information security.
Why is cyber security important?
Listed below are the reasons why cyber security is so important in what’s become a
predominant digital world:

• Cyber attacks can be extremely expensive for businesses to endure.
• In addition to financial damage suffered by the business, a data breach can also inflict
untold reputational damage.
• Cyber-attacks these days are becoming progressively destructive. Cybercriminals are
using more sophisticated ways to initiate cyber attacks.
$4.39
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
Collouk

Get to know the seller

Seller avatar
Collouk Arizona State University
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
2 year
Number of followers
0
Documents
87
Last sold
-
well speciallized documents

Clear, concise, and accurate, providing the necessary information for the intended audience without ambiguity.

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions