JNTUK R16 3-2 Cyber Security
OBJECTIVES:
·
The Cyber security Course will provide the students with
foundational Cyber Security principles, Security architecture, risk management,
attacks, incidents, and emerging IT and IS technologies.
·
Students will gain insight into the importance of Cyber Security
and the integral role of Cyber Security professionals.
UNIT-1
Introduction to Cybercrime: Introduction, Cybercrime: Definition
and Origins of the Word, Cybercrime and Information Security ,Who are
Cybercriminals? , Classifications of Cybercrimes, Cybercrime: The Legal
Perspectives, Cybercrimes: An Indian Perspective, Cybercrime and the Indian ITA
2000, A Global Perspective on Cybercrimes, Cybercrime Era: Survival Mantra for
the Netizens
UNIT-2
Cyber offenses: How Criminals Plan Them –Introduction, How
Criminals Plan the Attacks, Social Engineering, Cyber stalking, Cyber cafe and
Cybercrimes, Botnets: The Fuel for Cybercrime, Attack Vector Cloud Computing.
UNIT-3
Cybercrime Mobile and Wireless Devices: Introduction,
Proliferation of Mobile and Wireless Devices, Trends in Mobility, Credit Card
Frauds in Mobile and Wireless Computing Era, Security Challenges Posed by
Mobile Devices, Registry Settings for Mobile Devices, Authentication Service
Security, Attacks on Mobile/Cell Phones, Mobile Devices: Security Implications
for Organizations, Organizational Measures for Handling Mobile, Organizational
Security Policies and Measures in Mobile Computing Era, Laptops.
UNIT-4:
Tools and Methods Used in Cybercrime: Introduction, Proxy
Servers and Anonymizers, Phishing, Password Cracking, Key loggers and Spywares,
Virus and Worms, Trojan Horses and Backdoors, Steganography, DoS and DDoS
Attacks, SQL Injection, Buffer Overflow, Attacks on Wireless Networks, Phishing
and Identity Theft: Introduction, Phishing, Identity Theft (ID Theft)
UNIT-5:
Cybercrimes and Cyber security: Why Do We Need Cyber laws: The
Indian Context, The Indian IT Act, Challenges to Indian Law and Cybercrime
Scenario in India, Consequences of Not Addressing the Weakness in Information
Technology Act, Digital Signatures and the Indian IT Act, Information Security
Planning and Governance, Information Security Policy Standards, Practices, The
information Security Blueprint, Security education, Training and awareness
program, Continuing Strategies.
UNIT-6:
Understanding Computer Forensics: Introduction, Historical
Background of Cyber forensics, Digital Forensics Science, The Need for Computer
Forensics, Cyber forensics and Digital Evidence, Forensics Analysis of E-Mail,
Digital Forensics Life Cycle, Chain of Custody Concept, Network Forensics,
Approaching a Computer Forensics Investigation, Computer Forensics and Steganography,
Relevance of the OSI 7 Layer Model to Computer Forensics, Forensics and Social
Networking Sites: The Security/Privacy Threats, Computer Forensics from
Compliance Perspective, Challenges in Computer Forensics, Special Tools and
Techniques, Forensics Auditing, Antiforensics
TEXT BOOKS:
1.
Cyber Security: Understanding Cyber Crimes, Computer Forensics
and Legal Perspectives, Nina Godbole, SunitBelapure, Wiley.
2.
Principles of Information Security, MichealE.Whitman and Herbert
J.Mattord, Cengage Learning
REFERENCE BOOKS:
1.
Information Security, Mark Rhodes, Ousley, MGH.
OUTCOMES:
·
Cyber Security architecture principles
·
Identifying System and application security threats and
vulnerabilities
·
Identifying different classes of attacks
·
Cyber Security incidents to apply appropriate response
·
Describing risk management processes and practices
·
Evaluation of decision making outcomes of Cyber Security
scenarios
కామెంట్లు లేవు:
కామెంట్ను పోస్ట్ చేయండి