Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
College aantekeningen

DIGITAL NOTES ON CYBER SECURITY (R18AO521)

Beoordeling
-
Verkocht
-
Pagina's
38
Geüpload op
27-10-2023
Geschreven in
2023/2024

Department of information technology

Instelling
Vak

Voorbeeld van de inhoud

DIGITAL NOTES
ON
CYBER SECURITY
(R18A0521)




B.TECH III YEAR – II SEM (R18)




(2020-2021)


DEPARTMENT OF INFORMATION TECHNOLOGY

MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY
(Autonomous Institution – UGC, Govt. of India)
Recognized under 2(f) and 12 (B) of UGC ACT 1956
(Affiliated to JNTUH, Hyderabad, Approved by AICTE - Accredited by NBA & NAAC – ‘A’ Grade - ISO 9001:2015 Certified)

Maisammaguda, Dhulapally (Post Via. Hakimpet), Secunderabad – 500100, Telangana State, India




CYBER SECURITY Page 1

,MALLA REDDY COLLEGE OF ENGINEERING AND TECHNOLOGY
III Year B.Tech II Sem L T/P/D C
3 -/-/- 3

(RA18A0521) CYBER SECURITY
(Professional Elective 2)
Course objectives:
 To understand various types of cyber-attacks and cyber-crimes
 To learn threats and risks within context of the cyber security
 To have an overview of the cyber laws & concepts of cyber forensics
 To study the defensive techniques against these attacks


UNIT -I
Introduction to Cyber Security: Basic Cyber Security Concepts, layers of security,
Vulnerability, threat, Harmful acts, Internet Governance – Challenges and Constraints,
Computer Criminals, CIA Triad, Assets and Threat, motive of attackers, active attacks,
passive attacks, Software attacks, hardware attacks, Cyber Threats-Cyber Warfare, Cyber
Crime, Cyber terrorism, Cyber Espionage, etc., Comprehensive Cyber Security Policy.

UNIT - II
Cyberspace and the Law & Cyber Forensics: Introduction, Cyber Security Regulations,
Roles of International Law. The INDIAN Cyberspace, National Cyber Security Policy.
Introduction, Historical background of Cyber forensics, Digital Forensics Science, The
Need for Computer Forensics, Cyber Forensics and Digital evidence, Forensics Analysis
of Email, Digital Forensics Lifecycle, Forensics Investigation, Challenges in Computer
Forensics


UNIT - III
Cybercrime: Mobile and Wireless Devices: Introduction, Proliferation of Mobile and
Wireless Devices, Trends in Mobility, Credit card Frauds in Mobile and Wireless
Computing Era, Security Challenges Posed by Mobile Devices, Registry Settings for
Mobile Devices, Authentication service Security, Attacks on Mobile/Cell Phones,
Organizational security Policies and Measures in Mobile Computing Era, Laptops.

UNIT- IV
Cyber Security: Organizational Implications: Introduction, cost of cybercrimes and IPR
issues, web threats for organizations, security and privacy implications, social media
marketing: security risks and perils for organizations, social computing and the associated
challenges for organizations.

CYBER SECURITY Page 2

,UNIT - V
Privacy Issues: Basic Data Privacy Concepts: Fundamental Concepts, Data Privacy
Attacks, Datalinking and profiling, privacy policies and their specifications, privacy policy
languages, privacy in different domains- medical, financial, etc

Cybercrime: Examples and Mini-Cases
Examples: Official Website of Maharashtra Government Hacked, Indian Banks Lose
Millions of Rupees, Parliament Attack, Pune City Police Bust Nigerian Racket, e-mail
spoofing instances. Mini-Cases: The Indian Case of online Gambling, An Indian Case
of Intellectual Property Crime, Financial Frauds in Cyber Domain.


TEXT BOOKS:
1. Nina Godbole and SunitBelpure, Cyber Security Understanding Cyber
Crimes,Computer Forensics and Legal Perspectives,Wiley

2. B.B.Gupta,D.P.Agrawal,HaoxiangWang,ComputerandCyberSecurity:Principle
s, Algorithm, Applications, and Perspectives, CRC Press, ISBN
9780815371335,2018.


REFERENCES:
1. Cyber Security Essentials, James Graham, Richard Howard and Ryan Otson,
CRCPress.

2. Introduction to Cyber Security, Chwan-Hwa(john) Wu,J. David Irwin, CRC Press
T&FGroup.


Course Outcomes:
The students will be able to:
1. Analyze cyber-attacks, types of cybercrimes, cyber laws and also how to protect
them self and ultimately the entire Internet community from such attacks.
2. Interpret and forensically investigate security incidents
3. Apply policies and procedures to manage Privacy issues
4. Design and develop secure software modules




CYBER SECURITY Page 3

, MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY

DEPARTMENT OF INFORMATION TECHNOLOGY




S. No Topic Page no
Unit
I
1 Cyber security introduction -Basics 5

I
2 Layers of Security 9

I Security vulnerabilities, threats and Attacks
3 11

I
4 Cyber Threats-Cyber-Warfare 16

II
5 Cyberspace and the Law & Cyber Forensics 19

II
6 National Cyber security Policy 22

II
7 Cyber Forensics 23

III
8 Cybercrime-Mobile and wireless devices 30

III
9 Security Challenges proposed by Mobile devices 34

IV
10 Cyber security-Organizational Implications

IV
11 Social Media Marketing

V
12 Privacy Issues-Data Privacy attacks

V
13 Privacy Policy Languages




CYBER SECURITY Page 4

Gekoppeld boek

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
27 oktober 2023
Aantal pagina's
38
Geschreven in
2023/2024
Type
College aantekeningen
Docent(en)
B.tech
Bevat
Alle colleges

Onderwerpen

€4,45
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
Collouk

Maak kennis met de verkoper

Seller avatar
Collouk Arizona State University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
2 jaar
Aantal volgers
0
Documenten
87
Laatst verkocht
-
well speciallized documents

Clear, concise, and accurate, providing the necessary information for the intended audience without ambiguity.

0,0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen