Cyber Security (Open Elective) Objectives
Cyber Security (Open Elective) Objectives
(Open Elective)
OBJECTIVES:
• The Cyber security Course will provide the students with foundational Cyber Security
principles, Security architecture, risk management, attacks, incidents, and emerging IT and IS
technologies.
• Students will gain insight into the importance of Cyber Security and the integral role of Cyber
Security professionals.
Introduction, Cybercrime: Definition and Origins of the Word, Cybercrime and Information
Security Who are Cybercriminals? , Classifications of Cybercrimes, Cybercrime: The Legal
Perspectives, Cybercrimes: An Indian Perspective, Cybercrime and the Indian ITA 2000, A
Global Perspective on Cybercrimes, Cybercrime Era: Survival Mantra for the Netizens
How Criminals Plan Them –Introduction, How Criminals Plan the Attacks, Social Engineering,
Cyber stalking, Cyber cafe and Cybercrimes, Botnets: The Fuel for Cybercrime, Attack Vector
Cloud Computing.
Introduction, Proliferation of Mobile and Wireless Devices, Trends in Mobility, Credit Card
Frauds in Mobile and Wireless Computing Era, Security Challenges Posed by Mobile Devices,
Registry Settings for Mobile Devices, Authentication Service Security, Attacks on Mobile/Cell
Phones, Mobile Devices: Security Implications for Organizations, Organizational Measures for
Handling Mobile, Organizational Security Policies and Measures in Mobile Computing Era,
Laptops.
Introduction, Proxy Servers and Anonymizers, Phishing, Password Cracking, Key loggers and
Spywares, Virus and Worms, Trojan Horses and Backdoors, Steganography, DoS and DDoS
Attacks, SQL Injection, Buffer Overflow, Attacks on Wireless Networks, Phishing and Identity
Theft:Introduction,Phishing, IdentityTheft(IDTheft)
Why Do We Need Cyber laws: The Indian Context, The Indian IT Act, Challenges to Indian
Law and Cybercrime Scenario in India, Consequences of Not Addressing the Weakness in
Information Technology Act, Digital Signatures and the Indian IT Act, Information Security
Planning and Governance, Information Security Policy Standards, Practices, The information
Security Blueprint, Security education, Training and awareness program, Continuing Strategies.
Introduction, Historical Background of Cyber forensics, Digital Forensics Science, The Need for
Computer Forensics, Cyber forensics and Digital Evidence, Forensics Analysis of E-Mail,
Digital Forensics Life Cycle, Chain of Custody Concept, Network Forensics, Approaching a
Computer Forensics Investigation, Computer Forensics and Steganography, Relevance of the
OSI 7 Layer Model to Computer Forensics, Forensics and Social Networking Sites: The
Security/Privacy Threats, Computer Forensics from Compliance Perspective, Challenges in
Computer Forensics, Special Tools and Techniques, Forensics Auditing, Antiforensics
OUTCOMES:
TEXT BOOKS:
1. Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives,
Nina Godbole, SunitBelapure, Wiley.
REFERENCES: