0% found this document useful (0 votes)
68 views2 pages

cyber security syllabus

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views2 pages

cyber security syllabus

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING AND TECHNOLOGY

B.Tech. VI Semester

(22PE1CS304) CYBER SECURITY

TEACHING SCHEME EVALUATION SCHEME


L T/P C SE CA ELA SEE TOTAL
3 0 3 30 5 5 60 100

COURSE OBJECTIVES:
To summarize various types of cyber-attacks and cyber-crimes
To understand cyber laws and the concepts of digital forensics
To discuss safety measures for the protection of mobile and wireless devices
To learn the organizational security implications and threats
To study the impact of data privacy attacks on various domains

COURSE OUTCOMES: After completion of the course, the student should be able to
CO-1: Identify the need of cyber security and various types of attacks
CO-2: Understand national and international regulations of cyber security and cyber
forensics
CO-3: Interpret the security challenges related to mobile and wireless devices
CO-4: Analyze the security and privacy implications of an organization
CO-5: Examine the data privacy concepts and cybercrime in different domains

COURSE ARTICULATION MATRIX:


(Correlation of Course Outcomes with Program Outcomes and Program Specific Outcomes using
mapping levels 1 = Slight, 2 = Moderate and 3 = Substantial)
PROGRAM SPECIFIC
PROGRAM OUTCOMES (PO)
CO OUTCOMES (PSO)
PO-1 PO-2 PO-3 PO-4 PO-5 PO-6 PO-7 PO-8 PO-9 PO-10 PO-11 PO-12 PSO-1 PSO-2 PSO-3

CO-1 2 2 1 2 2 2 - 3 2 2 - 2 2 3 3
CO-2 1 1 3 3 1 1 - - 3 3 - 2 3 3 3
CO-3 2 2 3 2 2 2 - - 3 3 - 3 2 3 2
CO-4 2 2 3 2 3 2 - 3 3 3 2 3 2 2 3
CO-5 1 2 2 3 3 3 - 3 3 3 2 3 3 3 2

UNIT-I:
Introduction to Cyber Security: Basic Cyber Security Concepts, layers of security,
Vulnerability, threat, Harmful acts, Internet Governance Challenges and Constraints,
Computer Criminals, CIA Triad, Assets and Threat, motive of attackers, active attacks,
passive attacks, Software attacks, hardware attacks, Cyber Threats-Cyber Warfare,
Cyber Crime, Cyber terrorism, Cyber Espionage, etc., Comprehensive Cyber Security
Policy.

UNIT-II:
Cyberspace and the Law & Cyber Forensics: Introduction, Cyber Security Regulations,
Roles of International Law. The INDIAN Cyberspace, National Cyber Security Policy,
Historical background of Cyber forensics, Digital Forensics Science, The Need for
Computer Forensics, Cyber Forensics and Digital evidence, Forensics Analysis of Email,
Digital Forensics Lifecycle, Forensics Investigation, Challenges in Computer Forensics
UNIT-III:
Cybercrime: Mobile and Wireless Devices: Introduction, Proliferation of Mobile and
Wireless Devices, Trends in Mobility, Credit card Frauds in Mobile and Wireless
Computing Era, Security Challenges Posed by Mobile Devices, Registry Settings for
Mobile Devices, Authentication service Security, Attacks on Mobile/Cell Phones,
Organizational security Policies and Measures in Mobile Computing Era, Laptops.

UNIT-IV:
Cyber Security: Organizational Implications: Introduction, cost of cybercrimes and IPR
issues, web threats for organizations, OWASP top 10 web application security risks,
social media marketing: security risks and perils for organizations, social computing
and the associated challenges for organizations

UNIT-V:
Privacy Issues: Basic Data Privacy Concepts: Fundamental Concepts, Data Privacy
Attacks, Data linking and profiling, privacy policies and their specifications, privacy
policy languages, privacy in different domains- medical, financial, etc Cybercrime:
Examples and Mini-Cases Examples: Official Website of Maharashtra Government
Hacked, Indian Banks Lose Millions of Rupees, Parliament Attack, Pune City Police Bust
Nigerian Racket, e-mail spoofing instances. Mini Cases: The Indian Case of Online
Gambling, An Indian Case of Intellectual Property Crime, Financial Frauds in Cyber
Domain.

TEXT BOOKS:
1. Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal
Perspectives, Nina Godbole and Sunit Belpure, Wiley
2. Computer and Cyber Security: Principles, Algorithm, Applications, and
Perspectives, B. B. Gupta, D. P. Agrawal, Haoxiang Wang, CRC Press

REFERENCES:
1. Mining of Massive Datasets, v2.1, Jure Leskovek, Anand Rajaraman, Jeffrey Ullman,
Cambridge University Press, 2014
2. Data Science from Scratch: First Principles with Python, Joel Grus, 1 st Edition, 2015
3. Doing Data Science, Straight Talk from the Frontline, Cathy O'Neil, Rachel Schutt,
st E 2013
4. Mining of Massive Datasets, Jure Leskovec, Anand Rajaraman, Jeffrey David
Ullman, 2nd Edition, Cambridge University Press, 2014

You might also like