0% found this document useful (0 votes)
0 views

536S3A

The document outlines the syllabus for the M.Sc. degree program in Computer Science at the University of Madras, focusing on Cyber Security for the academic year 2023-2024. It includes objectives, outcomes, and detailed units covering cyber-attacks, laws, forensics, mobile security, organizational implications, and privacy issues. Recommended texts and references are also provided to support the curriculum.

Uploaded by

gayarhriezhmalai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views

536S3A

The document outlines the syllabus for the M.Sc. degree program in Computer Science at the University of Madras, focusing on Cyber Security for the academic year 2023-2024. It includes objectives, outcomes, and detailed units covering cyber-attacks, laws, forensics, mobile security, organizational implications, and privacy issues. Recommended texts and references are also provided to support the curriculum.

Uploaded by

gayarhriezhmalai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

UNIVERSITY OF MADRAS

M.Sc. DEGREE PROGRAMME IN COMPUTER SCIENCE


SYLLABUS WITH EFFECT FROM 2023-2024

Title of the Paper Cyber Security


SEC - II II Year & III Semester Credit:2 536S3A

Objectives:
To understand various types of cyber-attacks and cyber-crimes
To learn threats and risks within context of the cyber security
To have an overview of the cyber laws & concepts of cyber forensics
To study the defensive techniques against these attacks
To describe various legal responses to cybercrime

Outcomes:

1. Analyze cyber-attacks, types of cybercrimes, cyber laws and also how to K1, K2
protect them self and ultimately the entire Internet community from such
attacks.
2. Interpret and forensically investigate security incidents K2, K3
3. Apply policies and procedures to manage Privacy issues K4, K5
4. Design and develop secure software modules K5
5. Understand different forms of hacking techniques K5, K6
K1-Remember;K2-Understand;K3-Apply;K4-Analyze;K5-Evaluate; K6-Create

UNIT -I Introduction to Cyber Security: Basic Cyber Security Concepts, layers of security,
Vulnerability, threat, Harmful acts, Internet Governance – Challenges and Constraints, Computer
Criminals, CIA Triad, Assets and Threat, motive of attackers, active attacks, passive attacks,
Software attacks, hardware attacks, Cyber Threats-Cyber Warfare, Cyber Crime, Cyber
terrorism, Cyber Espionage, etc., Comprehensive Cyber Security Policy.

UNIT - II Cyberspace and the Law & Cyber Forensics: Introduction, Cyber Security
Regulations, Roles of International Law. The INDIAN Cyberspace, National Cyber Security
Policy. Introduction, Historical background of Cyber forensics, Digital Forensics Science, The
Need for Computer Forensics, Cyber Forensics and Digital evidence, Forensics Analysis of
Email, Digital Forensics Lifecycle, Forensics Investigation, Challenges in Computer Forensics

UNIT - III Cybercrime: Mobile and Wireless Devices: Introduction, Proliferation of Mobile and
Wireless Devices, Trends in Mobility, Credit card Frauds in Mobile and Wireless Computing
Era, Security Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices,
Authentication service Security, Attacks on Mobile/Cell Phones, Organizational security Policies
and Measures in Mobile Computing Era, Laptops.

Print to PDF with PDF Writer for Windows 8. This is a free evaluation copy. Buy full version now.
UNIVERSITY OF MADRAS
M.Sc. DEGREE PROGRAMME IN COMPUTER SCIENCE
SYLLABUS WITH EFFECT FROM 2023-2024

UNIT- IV Cyber Security: Organizational Implications: Introduction, cost of cybercrimes and


IPR issues, web threats for organizations, security and privacy implications, social media
marketing: security risks and perils for organizations, social computing and the associated
challenges for organizations

UNIT - V Privacy Issues: Basic Data Privacy Concepts: Fundamental Concepts, Data Privacy
Attacks, Datalinking and profiling, privacy policies and their specifications, privacy policy
languages, privacy in different domains- medical, financial, etc Cybercrime: Case study on
recent threats and attacks.

Recommended Texts:
1. Nina Godbole and SunitBelpure, Cyber Security Understanding Cyber Crimes, Computer
Forensics and Legal Perspectives, Wiley
Reference Books:
1. B.B. Gupta, D.P. Agrawal, Haoxiang Wang, Computer and Cyber Security: Principles,
Algorithm, Applications, and Perspectives, CRC Press, ISBN 9780815371335,2018.
2. Cyber Security Essentials, James Graham, Richard Howard and Ryan Otson,CRC Press.
3. Introduction to Cyber Security, Chwan-Hwa(john) Wu,J. David Irwin, CRC Press T&F
Group.
Web References:
1.https://www.youtube.com/watch?v=6wi5DI6du4&list=PL_uaeekrhGzJlB8XQBxU3z
hDwT95xlk
Mapping with Programme Outcomes:

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 M S M S S M L M L S

CO2 S M S L M L M L M S

CO3 S S L M S S L M L M

CO4 M L S M M L S L M S

CO5 S S M S L M L M S L

S-Strong M-Medium L-Low

Print to PDF with PDF Writer for Windows 8. This is a free evaluation copy. Buy full version now.

You might also like