0% found this document useful (0 votes)
187 views2 pages

Ai&ml R22

CS - Syllabus for my collage
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
187 views2 pages

Ai&ml R22

CS - Syllabus for my collage
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

AY 2022-23 J. B. Institute of Engineering and Technology B.

Tech: AI & ML

onwards (UGC Autonomous) III Year – II Sem

Course
Code: CYBER SECURITY L T P D
(Common to ECE, CIVIL, ME & MIE in III-I) and
J32M2
(Common to AI & ML, IT, EEE& ECM in III-II)
Credits: 0 2 0 0 0

Pre-Requisites: Nil
Course objectives:
The Student will:
1. Recognize cybercrimes and how they are planned
2. Identify the vulnerabilities of mobile and wireless devices
3. Examine the crimes in mobile and wireless devices and Acts.
4. Understand about Computer Forensics
5. Explored to Cyber Security- Organizational Implications

Module 1:
Introduction to Cyber Security: Basic Cyber Security Concepts, layers of security, Vulnerability,
threat, Harmful acts, Internet Governance – Challenges and Constraints, Computer Criminals, CIA
Triad, Assets and Threat, motive of attackers, active attacks, passive attacks, Software attacks,
hardware attacks, Spectrum of attacks, Taxonomy of various attacks, IP spoofing, Methods of
defense, Security Models, risk management, Cyber Threats-Cyber Warfare, Cyber Crime, Cyber
terrorism, Cyber Espionage, etc., Comprehensive Cyber Security Policy.

Module 2
Cyberspace and the Law & Cyber Forensics: Introduction, Cyber Security Regulations, Roles of
International Law. The INDIAN Cyberspace, National Cyber Security Policy.
Introduction, Historical background of Cyber forensics, Digital Forensics Science, The Need for
Computer Forensics, Cyber Forensics and Digital evidence, Forensics Analysis of Email, Digital
Forensics Lifecycle, Forensics Investigation, Challenges in Computer Forensics, Special Techniques
for Forensics Auditing.

Module 3:
Cybercrime: Mobile and Wireless Devices: Introduction, Proliferation of Mobile and Wireless
Devices, Trends in Mobility, Credit card Frauds in Mobile and Wireless Computing Era, Security
Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices, Authentication service
Security, Attacks on Mobile/Cell Phones, Mobile Devices: Security Implications for Organizations,
Organizational Measures for Handling Mobile, Organizational Security Policies and Measures in
Mobile Computing Era, Laptops.

J. B. Institute of Engineering and Technology Page 83


Module 4:
Cyber Security: Organizational Implications: Introduction cost of cybercrimes and IPR issues, web
threats for organizations, security and privacy implications, social media marketing: security risks
and perils for organizations, social computing and the associated challenges for organizations.
Cybercrime and Cyber terrorism: Introduction, intellectual property in the cyberspace, the ethical
dimension of cybercrimes the psychology, mindset and skills of hackers and other cyber criminals.

Module 5:
Privacy Issues: Basic Data Privacy Concepts: Fundamental Concepts, Data Privacy Attacks, Data
linking and profiling, privacy policies and their specifications, privacy policy languages, privacy in
different domains- medical, financial, etc.
Cybercrime: Examples and Mini-Cases
Examples: Official Website of Maharashtra Government Hacked, Indian Banks Lose Millions of
Rupees, Parliament Attack, Pune City Police Bust Nigerian Racket, e-mail spoofing instances.
Mini-Cases: The Indian Case of online Gambling, An Indian Case of Intellectual Property Crime,
Financial Frauds in Cyber Domain.
Text books:
1. Nina Godbole and SunitBelpure, Cyber Security Understanding Cyber Crimes, Computer
Forensics and Legal Perspectives, Wiley
2. B. B. Gupta, D. P. Agrawal, Haoxiang Wang, Computer and Cyber Security: Principles,
Algorithm, Applications, and Perspectives, CRC Press, ISBN 9780815371335, 2018.
Reference Books:
1. Cyber Security Essentials, James Graham, Richard Howard and Ryan Otson, CRC Press.
2. Introduction to Cyber Security, Chwan-Hwa(john) Wu,J. David Irwin, CRC Press T&F
Group.
E-Resources:
1. https://lecturenotes.in/subject/611/cyber-security .
2. https://www.slideshare.net/AvaniPatel61/ppt-on-cyber-security .
3. https://onlinecourses.swayam2.ac.in/ugc19_hs25/preview

Course outcomes:
The Student will be able to:
1. Demonstrate cybercrimes and how they are planned
2. Develop a framework to secure Mobile and wireless devices
3. Interpret crimes and Acts related to mobile and wireless devices
4. Recommend Computer Forensics and its related matters
5. Identify Cyber Security-Organizational Implications

J. B. Institute of Engineering and Technology Page 84

You might also like