Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien 4.2 TrustPilot
logo-home
Resume

Summary INTRODUCTION TO CYBER SECURITY (BETCK105/205 I) NOTES For First/Second Semester B.E[VTU/CBCS, ] Syllabus

Note
-
Vendu
-
Pages
143
Publié le
10-11-2025
Écrit en
2025/2026

 Introduction  Cybercrime: Definition and Origins of the Word  Cybercrime and Information Security  Who are Cybercriminals?  Classifications of Cybercrimes  Cybercrime: The Legal Perspectives  Cybercrimes: An Indian Perspective  Cybercrime and the Indian ITA 2000  A Global Perspective on Cybercrimes  Cybercrime Era: Survival Mantra for the Netizens

Montrer plus Lire moins
Établissement
ECE Paris











Oups ! Impossible de charger votre document. Réessayez ou contactez le support.

Infos sur le Document

Publié le
10 novembre 2025
Nombre de pages
143
Écrit en
2025/2026
Type
Resume

Sujets

  • betck105205 i

Aperçu du contenu

INTRODUCTION TO CYBER SECURITY
(BETCK105/205 I)
NOTES


For First/Second Semester B.E[VTU/CBCS, 2023-2024] Syllabus




Jyothi R, Assistant Professor, Dept.of ISE Introduction to Cyber Security (BETCK105I/205I) 1

, Syllabus
Course Title: Introduction to Cyber Security Course Code: : BETCK105I/205
MODULE-I Teaching
Hours
Introduction to Cybercrime: Cybercrime: Definition and Origins of the Word, Cybercrime and
Information Security, Who are Cybercriminals? Classifications of Cybercrimes, An Indian
Perspective, Hacking and Indian Laws., Global PerspectivesTextbook:1 Chapter 1 (1.1 to 1.5, 8
1.7-1.9)
Blooms Taxonomy: L1 – Remembering, L2 – Understanding

MODULE-II Teaching
Hours
Cyber Offenses: How Criminals Plan Them: Introduction, How criminals plan the attacks,
Social Engineering, Cyber Stalking, Cybercafe & cybercrimes. Botnets: The fuel for cybercrime, 8
Attack Vector. Textbook:1 Chapter 2 (2.1 to 2.7)
Blooms Taxonomy: L1 – Remembering, L2 – Understanding

MODULE-III Teaching
Hours
Tools and Methods used in Cybercrime: Introduction, Proxy Servers, Anonymizers, Phishing,
Password Cracking, Key Loggers and Spyways, Virus and Worms, Trozen Horses and
Backdoors, Steganography, DoS and DDOS Attackes, Attacks on Wireless networks. 8
Textbook:1 Chapter 4 (4.1 to 4.9, 4.12)


Blooms Taxonomy: L1 – Remembering, L2 – Understanding
MODULE-IV Teaching
Hours
Phishing and Identity Theft: Introduction, methods of phishing, phishing, phising techniques,
spear phishing, types of phishing scams, phishing toolkits and spy phishing, counter measures,
Identity Theft Textbook:1 Chapter 5 (5.1. to 5.3) 8

Blooms Taxonomy: L1 – Remembering , L2 – Understanding
MODULE-V
Teaching
Hours
Understanding Computer Forensics: Introdcution, Historical Background of Cyberforensics,
Digital Foresics Science, Need for Computer Foresics, Cyber Forensics and Digital Evidence,
Digital Forensic Life cycle, Chain of Custody Concepts, network forensics. Textbook:1 Chapter 8
7 (7.1. to 7.5, 7.7 to 7.9)


Blooms Taxonomy: L1 – Remembering, L2 – Understanding
SL Name Of the Name Of the Edition and
Title Of The Book ISBN
No Author/s Publisher Year
, “Cyber Security: Understanding Sunit Belapure First Edition
Wiley India Pvt
1 Cyber Crimes, Computer Forensics and Nina (Reprinted 978-81- 265-21791, 2011,
Ltd
And Legal Perspectives” Godbole 2018)



Jyothi R, Assistant Professor, Dept.of ISE Introduction to Cyber Security (BETCK105I/205I) 2

, MODULE 1. INTRODUCTION TO CYBERCRIME


List of Topics:
 Introduction
 Cybercrime: Definition and Origins of the Word
 Cybercrime and Information Security
 Who are Cybercriminals?
 Classifications of Cybercrimes
 Cybercrime: The Legal Perspectives
 Cybercrimes: An Indian Perspective
 Cybercrime and the Indian ITA 2000
 A Global Perspective on Cybercrimes
 Cybercrime Era: Survival Mantra for the Netizens


INTRODUCTION


 “Cyber security is the protection of internet-connected systems, including hardware, software and data,
from cyber attacks”.
 “Cybersecurity” means protecting information, equipment, devices, computer, computer resource,
communication device and information stored therein from unauthorized access, use, disclosure, disruption,
modification or destruction.
 Almost everyone is aware of the rapid growth of the Internet.
 Given the unrestricted number of free websites, the Internet has undeniably opened a new way of
exploitation known as cybercrime.
 These activities involve the use of computers, the Internet, cyberspace and the worldwide web (WWW).
 Interestingly, cybercrime is not a new phenomena; the first recorded cybercrime took place in the year
1820.
 It is one of the most talked about topics in the recent years.
 Based on a 2008 survey in Australia, the below shows the cybercrime trend




Jyothi R, Assistant Professor, Dept.of ISE Introduction to Cyber Security (BETCK105I/205I) 3

, Figure: Cybercrime Trend


 Indian corporate and government sites have been attacked or defaced more than 780 times between
February 2000 and December 2002.
 There are also stories/news of other attacks; for example, according to a story posted on 3 December
2009, a total of 3,286 Indian websites were hacked in 5 months – between January and June 2009.
 Various cybercrimes and cases registered under cybercrimes by motives and suspects in States and
Union Territories (UTs).


CYBERCRIME: DEFINITION AND ORIGINS OF THE WORD


Definition:
“A crime conducted in which a computer was directly and significantly instrumental is called as a
Cybercrime.”


Alternative definitions of Cybercrime are as follows:
1. Any illegal act where a special knowledge of computer technology is essential for its perpetration (to
commit a crime), investigation or prosecution.
2. Any traditional crime that has acquired a new dimension or order of magnitude through the aid of a
computer, and abuses that have come into being because of computers.
3. Any financial dishonesty that takes place in a computer environment.




Jyothi R, Assistant Professor, Dept.of ISE Introduction to Cyber Security (BETCK105I/205I) 4
3,08 €
Accéder à l'intégralité du document:

Garantie de satisfaction à 100%
Disponible immédiatement après paiement
En ligne et en PDF
Tu n'es attaché à rien

Faites connaissance avec le vendeur
Seller avatar
Collouk

Faites connaissance avec le vendeur

Seller avatar
Collouk Arizona State University
Voir profil
S'abonner Vous devez être connecté afin de pouvoir suivre les étudiants ou les formations
Vendu
0
Membre depuis
2 année
Nombre de followers
0
Documents
87
Dernière vente
-
well speciallized documents

Clear, concise, and accurate, providing the necessary information for the intended audience without ambiguity.

0,0

0 revues

5
0
4
0
3
0
2
0
1
0

Récemment consulté par vous

Pourquoi les étudiants choisissent Stuvia

Créé par d'autres étudiants, vérifié par les avis

Une qualité sur laquelle compter : rédigé par des étudiants qui ont réussi et évalué par d'autres qui ont utilisé ce document.

Le document ne convient pas ? Choisis un autre document

Aucun souci ! Tu peux sélectionner directement un autre document qui correspond mieux à ce que tu cherches.

Paye comme tu veux, apprends aussitôt

Aucun abonnement, aucun engagement. Paye selon tes habitudes par carte de crédit et télécharge ton document PDF instantanément.

Student with book image

“Acheté, téléchargé et réussi. C'est aussi simple que ça.”

Alisha Student

Foire aux questions