Ai&ml R22
Ai&ml R22
Tech: AI & ML
Course
Code: CYBER SECURITY L T P D
(Common to ECE, CIVIL, ME & MIE in III-I) and
J32M2
(Common to AI & ML, IT, EEE& ECM in III-II)
Credits: 0 2 0 0 0
Pre-Requisites: Nil
Course objectives:
The Student will:
1. Recognize cybercrimes and how they are planned
2. Identify the vulnerabilities of mobile and wireless devices
3. Examine the crimes in mobile and wireless devices and Acts.
4. Understand about Computer Forensics
5. Explored to Cyber Security- Organizational Implications
Module 1:
Introduction to Cyber Security: Basic Cyber Security Concepts, layers of security, Vulnerability,
threat, Harmful acts, Internet Governance – Challenges and Constraints, Computer Criminals, CIA
Triad, Assets and Threat, motive of attackers, active attacks, passive attacks, Software attacks,
hardware attacks, Spectrum of attacks, Taxonomy of various attacks, IP spoofing, Methods of
defense, Security Models, risk management, Cyber Threats-Cyber Warfare, Cyber Crime, Cyber
terrorism, Cyber Espionage, etc., Comprehensive Cyber Security Policy.
Module 2
Cyberspace and the Law & Cyber Forensics: Introduction, Cyber Security Regulations, Roles of
International Law. The INDIAN Cyberspace, National Cyber Security Policy.
Introduction, Historical background of Cyber forensics, Digital Forensics Science, The Need for
Computer Forensics, Cyber Forensics and Digital evidence, Forensics Analysis of Email, Digital
Forensics Lifecycle, Forensics Investigation, Challenges in Computer Forensics, Special Techniques
for Forensics Auditing.
Module 3:
Cybercrime: Mobile and Wireless Devices: Introduction, Proliferation of Mobile and Wireless
Devices, Trends in Mobility, Credit card Frauds in Mobile and Wireless Computing Era, Security
Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices, Authentication service
Security, Attacks on Mobile/Cell Phones, Mobile Devices: Security Implications for Organizations,
Organizational Measures for Handling Mobile, Organizational Security Policies and Measures in
Mobile Computing Era, Laptops.
Module 5:
Privacy Issues: Basic Data Privacy Concepts: Fundamental Concepts, Data Privacy Attacks, Data
linking and profiling, privacy policies and their specifications, privacy policy languages, privacy in
different domains- medical, financial, etc.
Cybercrime: Examples and Mini-Cases
Examples: Official Website of Maharashtra Government Hacked, Indian Banks Lose Millions of
Rupees, Parliament Attack, Pune City Police Bust Nigerian Racket, e-mail spoofing instances.
Mini-Cases: The Indian Case of online Gambling, An Indian Case of Intellectual Property Crime,
Financial Frauds in Cyber Domain.
Text books:
1. Nina Godbole and SunitBelpure, Cyber Security Understanding Cyber Crimes, Computer
Forensics and Legal Perspectives, Wiley
2. B. B. Gupta, D. P. Agrawal, Haoxiang Wang, Computer and Cyber Security: Principles,
Algorithm, Applications, and Perspectives, CRC Press, ISBN 9780815371335, 2018.
Reference Books:
1. Cyber Security Essentials, James Graham, Richard Howard and Ryan Otson, CRC Press.
2. Introduction to Cyber Security, Chwan-Hwa(john) Wu,J. David Irwin, CRC Press T&F
Group.
E-Resources:
1. https://lecturenotes.in/subject/611/cyber-security .
2. https://www.slideshare.net/AvaniPatel61/ppt-on-cyber-security .
3. https://onlinecourses.swayam2.ac.in/ugc19_hs25/preview
Course outcomes:
The Student will be able to:
1. Demonstrate cybercrimes and how they are planned
2. Develop a framework to secure Mobile and wireless devices
3. Interpret crimes and Acts related to mobile and wireless devices
4. Recommend Computer Forensics and its related matters
5. Identify Cyber Security-Organizational Implications