0% found this document useful (0 votes)
18 views2 pages

Cyber Security

abc

Uploaded by

DARK DEVIL
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views2 pages

Cyber Security

abc

Uploaded by

DARK DEVIL
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

1.

Introduction to Cyber Crime and Cyber Security (07 Lectures)


1.1 Introduction
1.2 Cybercrime: Definition and Origin of the Word
1.3 Cybercrime and Information Security
1.4 Who are Cybercriminals?
1.5 Classifications of Cybercrimes: E-mail Spoofing, Spamming, Cyber Defamation,
Web Internet Time Theft, Salami Attack/Salami Technique, Data Diddling, Forgery,
Industrial Jacking, Newsgroup Spam/Crimes Emanating from Usenet Newsgroups,
Industrial Spying/Industrial Espionage, Hacking, Online Frauds, Computer Sabotage,
Email Bombing/Mail Bombs, Computer Network Intrusions, Password Sniffing, Credit
Card Frauds, Identity Theft
1.6 Definition of Cyber Security
1.7 Vulnerability, Threats, and Harmful Acts
1.8 CIA Triad
1.9 Cyber Security Policy and Domains of Cyber Security Policy

2. Cyber Offenses and Cyberstalking (10 Lectures)


2.1 Criminals Plan: Categories of Cybercrime Cyber Attacks: Reconnaissance, Passive
Attack, Active Attacks, Scanning/Scrutinizing Gathered Information, Attack (Gaining
and Maintaining the System Access), Social Engineering, and Classification of
Social Engineering
2.2 Cyberstalking: Types of Stalkers, Cases Reported on Cyberstalking, Working of
Stalking
2.3 Real-Life Incident of Cyberstalking
2.4 Cybercafé and Cybercrime
2.5 Botnets: The Fuel for Cybercrime, Botnet, Attack Vector
2.6 Cybercrime: Mobile and Wireless Devices - Proliferation - Trends in Mobility
2.7 Credit Card Frauds in Mobile and Wireless Computing Era
2.8 Security Challenges Posed by Mobile Devices
2.9 Authentication Service Security
2.10 Attacks on Mobile/Cell Phones

3. Tools and Methods Used in Cybercrime (05 Lectures)


3.1 Introduction
3.2 Proxy Servers and Anonymizers
3.3 Phishing
3.4 Password Cracking
3.5 Keyloggers and Spywares
3.6 Virus and Worms
3.7 Trojan Horses and Backdoors
3.8 Steganography
3.9 DoS and DDoS Attacks
3.10 SQL Injection

4. Cybercrimes and Cyber Security: The Legal Perspectives (07 Lectures)


4.1 Introduction
4.2 Cybercrime and the Legal Landscape around the World
4.3 Why Do We Need Cyberlaws: The Indian Context
4.4 The Indian IT Act
4.5 Challenges to Indian Law and Cybercrime Scenario in India
4.6 Consequences of not Addressing the Weaknesses in Information Technology Act
4.7 Digital Signatures and the Indian IT Act
4.8 Amendments to the Indian IT Act
4.9 Cybercrime and Punishment
4.10 Cyberlaw, Technology, and Students: Indian Scenario

5. Cyber Forensics (06 Lectures)


5.1 Introduction
5.2 Historical Background of Cyber Forensics
5.3 Digital Forensics Science
5.4 The Need for Computer Forensics
5.5 Cyber Forensics and Digital Evidence
5.6 Forensics Analysis of Email
5.7 Digital Forensics Lifecycle
5.8 Challenges in Computer Forensics

You might also like