Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Notas de lectura

DIGITAL NOTES ON CYBER SECURITY (R18AO521)

Puntuación
-
Vendido
-
Páginas
38
Subido en
27-10-2023
Escrito en
2023/2024

Department of information technology

Institución
Grado

Vista previa del contenido

DIGITAL NOTES
ON
CYBER SECURITY
(R18A0521)




B.TECH III YEAR – II SEM (R18)




(2020-2021)


DEPARTMENT OF INFORMATION TECHNOLOGY

MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY
(Autonomous Institution – UGC, Govt. of India)
Recognized under 2(f) and 12 (B) of UGC ACT 1956
(Affiliated to JNTUH, Hyderabad, Approved by AICTE - Accredited by NBA & NAAC – ‘A’ Grade - ISO 9001:2015 Certified)

Maisammaguda, Dhulapally (Post Via. Hakimpet), Secunderabad – 500100, Telangana State, India




CYBER SECURITY Page 1

,MALLA REDDY COLLEGE OF ENGINEERING AND TECHNOLOGY
III Year B.Tech II Sem L T/P/D C
3 -/-/- 3

(RA18A0521) CYBER SECURITY
(Professional Elective 2)
Course objectives:
 To understand various types of cyber-attacks and cyber-crimes
 To learn threats and risks within context of the cyber security
 To have an overview of the cyber laws & concepts of cyber forensics
 To study the defensive techniques against these attacks


UNIT -I
Introduction to Cyber Security: Basic Cyber Security Concepts, layers of security,
Vulnerability, threat, Harmful acts, Internet Governance – Challenges and Constraints,
Computer Criminals, CIA Triad, Assets and Threat, motive of attackers, active attacks,
passive attacks, Software attacks, hardware attacks, Cyber Threats-Cyber Warfare, Cyber
Crime, Cyber terrorism, Cyber Espionage, etc., Comprehensive Cyber Security Policy.

UNIT - II
Cyberspace and the Law & Cyber Forensics: Introduction, Cyber Security Regulations,
Roles of International Law. The INDIAN Cyberspace, National Cyber Security Policy.
Introduction, Historical background of Cyber forensics, Digital Forensics Science, The
Need for Computer Forensics, Cyber Forensics and Digital evidence, Forensics Analysis
of Email, Digital Forensics Lifecycle, Forensics Investigation, Challenges in Computer
Forensics


UNIT - III
Cybercrime: Mobile and Wireless Devices: Introduction, Proliferation of Mobile and
Wireless Devices, Trends in Mobility, Credit card Frauds in Mobile and Wireless
Computing Era, Security Challenges Posed by Mobile Devices, Registry Settings for
Mobile Devices, Authentication service Security, Attacks on Mobile/Cell Phones,
Organizational security Policies and Measures in Mobile Computing Era, Laptops.

UNIT- IV
Cyber Security: Organizational Implications: Introduction, cost of cybercrimes and IPR
issues, web threats for organizations, security and privacy implications, social media
marketing: security risks and perils for organizations, social computing and the associated
challenges for organizations.

CYBER SECURITY Page 2

,UNIT - V
Privacy Issues: Basic Data Privacy Concepts: Fundamental Concepts, Data Privacy
Attacks, Datalinking and profiling, privacy policies and their specifications, privacy policy
languages, privacy in different domains- medical, financial, etc

Cybercrime: Examples and Mini-Cases
Examples: Official Website of Maharashtra Government Hacked, Indian Banks Lose
Millions of Rupees, Parliament Attack, Pune City Police Bust Nigerian Racket, e-mail
spoofing instances. Mini-Cases: The Indian Case of online Gambling, An Indian Case
of Intellectual Property Crime, Financial Frauds in Cyber Domain.


TEXT BOOKS:
1. Nina Godbole and SunitBelpure, Cyber Security Understanding Cyber
Crimes,Computer Forensics and Legal Perspectives,Wiley

2. B.B.Gupta,D.P.Agrawal,HaoxiangWang,ComputerandCyberSecurity:Principle
s, Algorithm, Applications, and Perspectives, CRC Press, ISBN
9780815371335,2018.


REFERENCES:
1. Cyber Security Essentials, James Graham, Richard Howard and Ryan Otson,
CRCPress.

2. Introduction to Cyber Security, Chwan-Hwa(john) Wu,J. David Irwin, CRC Press
T&FGroup.


Course Outcomes:
The students will be able to:
1. Analyze cyber-attacks, types of cybercrimes, cyber laws and also how to protect
them self and ultimately the entire Internet community from such attacks.
2. Interpret and forensically investigate security incidents
3. Apply policies and procedures to manage Privacy issues
4. Design and develop secure software modules




CYBER SECURITY Page 3

, MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY

DEPARTMENT OF INFORMATION TECHNOLOGY




S. No Topic Page no
Unit
I
1 Cyber security introduction -Basics 5

I
2 Layers of Security 9

I Security vulnerabilities, threats and Attacks
3 11

I
4 Cyber Threats-Cyber-Warfare 16

II
5 Cyberspace and the Law & Cyber Forensics 19

II
6 National Cyber security Policy 22

II
7 Cyber Forensics 23

III
8 Cybercrime-Mobile and wireless devices 30

III
9 Security Challenges proposed by Mobile devices 34

IV
10 Cyber security-Organizational Implications

IV
11 Social Media Marketing

V
12 Privacy Issues-Data Privacy attacks

V
13 Privacy Policy Languages




CYBER SECURITY Page 4

Libro relacionado

Escuela, estudio y materia

Institución
Grado

Información del documento

Subido en
27 de octubre de 2023
Número de páginas
38
Escrito en
2023/2024
Tipo
NOTAS DE LECTURA
Profesor(es)
B.tech
Contiene
Todas las clases

Temas

$4.99
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF

Conoce al vendedor
Seller avatar
Collouk

Conoce al vendedor

Seller avatar
Collouk Arizona State University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
-
Miembro desde
2 año
Número de seguidores
0
Documentos
87
Última venta
-
well speciallized documents

Clear, concise, and accurate, providing the necessary information for the intended audience without ambiguity.

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes