100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Basics of cybersecurity $7.99   Add to cart

Class notes

Basics of cybersecurity

 2 views  0 purchase
  • Course
  • Institution

This is used to learn the basics of cybersecurity.

Preview 4 out of 75  pages

  • April 13, 2024
  • 75
  • 2023/2024
  • Class notes
  • Hari
  • All classes
avatar-seller
DEPARTMENT OF COMPUTER SCIENCE AND
ENGINEERING

DIGITAL NOTES
ON
CYBER SECURITY
(R20A6202)

B.TECH III YEAR–II SEM
(R20) REGULATION
(2023-24)




Prepared by S J Shruthi Rani Yadav

MALLAREDDY COLLEGE OF ENGINEERING &TECHNOLOGY
(AutonomousInstitution–UGC,Govt.ofIndia)
Recognizedunder2(f)and12(B) ofUGC ACT1956
(AffiliatedtoJNTUH,Hyderabad,ApprovedbyAICTE-AccreditedbyNBA&NAAC–‘A’Grade-
ISO9001:2015Certified)

Maisammaguda,Dhulapally(PostVia.Hakimpet),Secunderabad–500100,TelanganaState,India

, MALLA REDDY COLLEGE OF ENGINEERING AND TECHNOLOGY
III Year B.Tech. CSE- II Sem L/T/P/C

PROFESSIONALELCTIVE – IV
(R20A6202)

CYBER SECURITY
COURSE OBJECTIVES:
This course will enable the students:
1. To familiarize various types of cyber-attacks and cyber-crimes
2. To give an overview of the cyber laws
3. To study the defensive techniques against these attacks
4. To study cyber security challenges and implications.
5. To know about Cyber Security.

UNIT - I
Introduction to Cyber Security: Basic Cyber Security Concepts, layers of security,
Vulnerability, threat, Harmful acts, Internet Governance – Challenges and Constraints,
Computer Criminals, CIATriad, Assets and Threat, motive of attackers, active attacks, passive
attacks, Software attacks, hardware attacks, Spectrum of attacks, Taxonomy of various attacks,
IP spoofing, Methods of defense, Security Models, risk management, Cyber Threats- Cyber
Warfare, Cyber Crime, Cyber terrorism, Cyber Espionage, etc., Comprehensive Cyber Security
Policy.


UNIT - II
Cyberspace and the Law & Cyber Forensics: Introduction, Cyber Security Regulations,
Roles of International Law. The INDIAN Cyberspace, National Cyber Security Policy.
Introduction, Historical background of Cyber forensics, Digital Forensics Science, The Need for
Computer Forensics, Cyber Forensics and Digital evidence, Forensics Analysis of Email,
Digital Forensics Lifecycle, Forensics Investigation, Challenges in Computer Forensics, Special
Techniques for Forensics Auditing.

UNIT - III
Cybercrime: Mobile and Wireless Devices: Introduction, Proliferation of Mobile and
Wireless Devices, Trends in Mobility, Credit card Frauds in Mobile and Wireless Computing
Era, Security Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices,
Authentication service Security, Attacks on Mobile/Cell Phones, Mobile Devices: Security

,Implications for Organizations,Organizational Measures for Handling Mobile, Organizational
Security Policies and Measures in Mobile Computing Era, Laptops.

UNIT - IV
Cyber Security: Organizational Implications: Introduction, cost of cybercrimes and IPR
issues,web threats for organizations, security and privacy implications, social media marketing:
securityrisks and perils for organizations, social computing and the associated challenges for
organizations.Cybercrime and Cyber terrorism: Introduction, intellectual property in the
cyberspace, the ethical dimension of cybercrimes the psychology, mindset and skills of hackers
and other cybercriminals.

UNIT - V
Privacy Issues: Basic Data Privacy Concepts: Fundamental Concepts, Data Privacy Attacks,
Data linking and profiling, privacy policies and their specifications, privacy policy languages,
privacy indifferent domains- medical, financial ,,etc.
Cybercrime: Examples and Mini-Cases
Examples: Official Website of Maharashtra Government Hacked, Indian Banks Lose Millions
of Rupees, Parliament Attack, Pune City Police Bust Nigerian Racket, e-mail spoofing
instances. Mini-Cases: The Indian Case of online Gambling, An Indian Case of Intellectual
Property Crime, Financial Frauds in Cyber Domain.

TEXT BOOKS:
1. Nina Godbole and Sunit Belpure, Cyber Security Understanding
Cyber Crimes, Computer Forensics and Legal Perspectives, Wiley
2. B. B. Gupta, D. P. Agrawal, Haoxiang Wang, Computer and Cyber
Security: Principles, Algorithm, Applications, and Perspectives, CRC Press,
ISBN 9780815371335, 2018.

REFERENCE BOOKS:
1. Cyber Security Essentials, James Graham, Richard Howard and Ryan Otson, CRC Press.
2. Introduction to Cyber Security , Chwan-Hwa(john) Wu,J.David Irwin.CRC
PressT&FGroup

COURSE OUTCOMES:
Student will be able to
1. Understand basic concepts of Cyber Crimes.
2. Ability to identify the attacks in Cyber Crimes
3. Able to specify the suitable methods used in CyberCrime
4. Abilityto face cyber security challenges
5. Understand Cyber laws

, INDEX
S.NO UNIT TOPIC PAGE NO

1 I Introduction to Cyber Security 1-23


2 II Cyberspace and the Law & Cyber 24-37
Forensics

3 III Cybercrime: Mobile and Wireless
38-47
Devices

4 IV Cyber Security: Organizational 48-68
Implications
5 V Privacy Issues,Cybercrime: Examples and 69-74
Mini-Cases

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller rajeswari1. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

73314 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
  Add to cart