(BETCK105/205 I)
NOTES
For First/Second Semester B.E[VTU/CBCS, 2023-2024] Syllabus
Jyothi R, Assistant Professor, Dept.of ISE Introduction to Cyber Security (BETCK105I/205I) 1
, Syllabus
Course Title: Introduction to Cyber Security Course Code: : BETCK105I/205
MODULE-I Teaching
Hours
Introduction to Cybercrime: Cybercrime: Definition and Origins of the Word, Cybercrime and
Information Security, Who are Cybercriminals? Classifications of Cybercrimes, An Indian
Perspective, Hacking and Indian Laws., Global PerspectivesTextbook:1 Chapter 1 (1.1 to 1.5, 8
1.7-1.9)
Blooms Taxonomy: L1 – Remembering, L2 – Understanding
MODULE-II Teaching
Hours
Cyber Offenses: How Criminals Plan Them: Introduction, How criminals plan the attacks,
Social Engineering, Cyber Stalking, Cybercafe & cybercrimes. Botnets: The fuel for cybercrime, 8
Attack Vector. Textbook:1 Chapter 2 (2.1 to 2.7)
Blooms Taxonomy: L1 – Remembering, L2 – Understanding
MODULE-III Teaching
Hours
Tools and Methods used in Cybercrime: Introduction, Proxy Servers, Anonymizers, Phishing,
Password Cracking, Key Loggers and Spyways, Virus and Worms, Trozen Horses and
Backdoors, Steganography, DoS and DDOS Attackes, Attacks on Wireless networks. 8
Textbook:1 Chapter 4 (4.1 to 4.9, 4.12)
Blooms Taxonomy: L1 – Remembering, L2 – Understanding
MODULE-IV Teaching
Hours
Phishing and Identity Theft: Introduction, methods of phishing, phishing, phising techniques,
spear phishing, types of phishing scams, phishing toolkits and spy phishing, counter measures,
Identity Theft Textbook:1 Chapter 5 (5.1. to 5.3) 8
Blooms Taxonomy: L1 – Remembering , L2 – Understanding
MODULE-V
Teaching
Hours
Understanding Computer Forensics: Introdcution, Historical Background of Cyberforensics,
Digital Foresics Science, Need for Computer Foresics, Cyber Forensics and Digital Evidence,
Digital Forensic Life cycle, Chain of Custody Concepts, network forensics. Textbook:1 Chapter 8
7 (7.1. to 7.5, 7.7 to 7.9)
Blooms Taxonomy: L1 – Remembering, L2 – Understanding
SL Name Of the Name Of the Edition and
Title Of The Book ISBN
No Author/s Publisher Year
, “Cyber Security: Understanding Sunit Belapure First Edition
Wiley India Pvt
1 Cyber Crimes, Computer Forensics and Nina (Reprinted 978-81- 265-21791, 2011,
Ltd
And Legal Perspectives” Godbole 2018)
Jyothi R, Assistant Professor, Dept.of ISE Introduction to Cyber Security (BETCK105I/205I) 2
, MODULE 1. INTRODUCTION TO CYBERCRIME
List of Topics:
Introduction
Cybercrime: Definition and Origins of the Word
Cybercrime and Information Security
Who are Cybercriminals?
Classifications of Cybercrimes
Cybercrime: The Legal Perspectives
Cybercrimes: An Indian Perspective
Cybercrime and the Indian ITA 2000
A Global Perspective on Cybercrimes
Cybercrime Era: Survival Mantra for the Netizens
INTRODUCTION
“Cyber security is the protection of internet-connected systems, including hardware, software and data,
from cyber attacks”.
“Cybersecurity” means protecting information, equipment, devices, computer, computer resource,
communication device and information stored therein from unauthorized access, use, disclosure, disruption,
modification or destruction.
Almost everyone is aware of the rapid growth of the Internet.
Given the unrestricted number of free websites, the Internet has undeniably opened a new way of
exploitation known as cybercrime.
These activities involve the use of computers, the Internet, cyberspace and the worldwide web (WWW).
Interestingly, cybercrime is not a new phenomena; the first recorded cybercrime took place in the year
1820.
It is one of the most talked about topics in the recent years.
Based on a 2008 survey in Australia, the below shows the cybercrime trend
Jyothi R, Assistant Professor, Dept.of ISE Introduction to Cyber Security (BETCK105I/205I) 3
, Figure: Cybercrime Trend
Indian corporate and government sites have been attacked or defaced more than 780 times between
February 2000 and December 2002.
There are also stories/news of other attacks; for example, according to a story posted on 3 December
2009, a total of 3,286 Indian websites were hacked in 5 months – between January and June 2009.
Various cybercrimes and cases registered under cybercrimes by motives and suspects in States and
Union Territories (UTs).
CYBERCRIME: DEFINITION AND ORIGINS OF THE WORD
Definition:
“A crime conducted in which a computer was directly and significantly instrumental is called as a
Cybercrime.”
Alternative definitions of Cybercrime are as follows:
1. Any illegal act where a special knowledge of computer technology is essential for its perpetration (to
commit a crime), investigation or prosecution.
2. Any traditional crime that has acquired a new dimension or order of magnitude through the aid of a
computer, and abuses that have come into being because of computers.
3. Any financial dishonesty that takes place in a computer environment.
Jyothi R, Assistant Professor, Dept.of ISE Introduction to Cyber Security (BETCK105I/205I) 4