0% found this document useful (0 votes)
52 views2 pages

20cs41j2 - Cyber Security

Final year syllabus

Uploaded by

bborigarla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views2 pages

20cs41j2 - Cyber Security

Final year syllabus

Uploaded by

bborigarla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

20CS41J2 - CYBER SECURITY

Course
Job Oriented Elective Credits: 3
Category:
Course
Theory Lecture-Tutorial-Practical: 3-0-0
Type:
Sessional Evaluation: 40
Knowledge in computer and network
Prerequisite: Univ. Exam Evaluation: 60
fundamentals and basic Security essentials.
Total Marks: 100
 To familiarize various types of cyber-attacks and cyber-crimes.
 To give an overview of the cyber laws.
Objectives:
 To study the defensive techniques against these attacks.

Upon successful completion of the course, the students will be able to:
CO1 Understand the basic concepts of Cyber Security.
CO2 Acquire the knowledge about various types of Cyber Laws.
Course
CO3 Exposure on cybercrimes in devices.
Outcomes
CO4 Learn the concept of protection mechanism in social media.
CO5 Know about policy Management in internet community.
CO6 Analyze different case studies in Cyber Security,
Course UNIT-I
Content Introduction to Cybercrime: Definition, Cybercrime and information security,
Classification of Cybercrimes, Cybercrime: The legal perspectives, An Indian
perspective, Cybercrime and the Indian ITA 2000, A global perspective on
Cybercrimes.

UNIT-II
Cyberoffenses: Categories of Cybercrime, how criminals plan the attacks, Social
Engineering, Cyberstalking, Cybercafe and Cybercrimes, Botnets, Attack vector.

UNIT-III
Tools and Methods used in Cybercrime: Introduction, Proxy Servers and
Anonymizers, Phishing, Password Cracking, Keyloggers and Spywares, Virus and
Worms, Trojan Horses and Backdoors.

UNIT-IV
Understanding Computer Forensics: Historical background of Cyberforensics,
Digital Forensics Science, The need for Computer Forensics, Cyberforensics and
Digital Evidence, Digital Forensics Life Cycle, Network Forensics.

UNIT-V
Cybersecurity: Organizational Implications
Introduction, Cost of Cybercrimes and IPR issues, Web Threats for organizations,
Social media marketing, Social Computing and the associated challenges for
organizations, Protecting People’s privacy in the organization, Organizational
guidelines for internet usage, Safe Computing guidelines and Computer usage policy.

UNIT-VI

1
Cybercrime and Cyberterrorism: Introduction, Intellectual property in the
Cyberspace, The Ethical Dimension of Cybercrimes, The psychology, Mindset and
Skills of Hackers and Other Cybercriminals, Sociology of Cybercriminals.

TEXT BOOKS:
1. Nina Godbole and Sunit Belpure, Cyber Security Understanding Cyber Crimes,
Computer Forensics and Legal Perspectives, Wiley.

Text Books REFERENCE BOOKS:


& 1. Cyber Security Essentials, James Graham, Richard Howard and Ryan Otson,
Reference CRC Press.
Books 2. Introduction to Cyber Security, Chwan-Hwa(john) Wu,J. David Irwin, CRC
Press T&F Group.
3. B. B. Gupta, D. P. Agrawal, Haoxiang Wang, Computer and Cyber Security:
Principles, Algorithm, Applications, and Perspectives, CRC Press.

https://nptel.ac.in/courses
E-Resources

CO-PO Mapping: 3-High Mapping, 2-Moderate Mapping, 1-Low Mapping

PO10

PO11

PO12
PO1

PO2

PO3

PO4

PO5

PO6

PO7

PO8

PO9

CO1 2 1 3 2
CO2 3 2 2 3 3
CO3 2 3 3 3 2
CO4 3 3 2 2 2
CO5 2 3 2 3 2 2
CO6 3 3 3 3 3

You might also like