536S3A
536S3A
Objectives:
To understand various types of cyber-attacks and cyber-crimes
To learn threats and risks within context of the cyber security
To have an overview of the cyber laws & concepts of cyber forensics
To study the defensive techniques against these attacks
To describe various legal responses to cybercrime
Outcomes:
1. Analyze cyber-attacks, types of cybercrimes, cyber laws and also how to K1, K2
protect them self and ultimately the entire Internet community from such
attacks.
2. Interpret and forensically investigate security incidents K2, K3
3. Apply policies and procedures to manage Privacy issues K4, K5
4. Design and develop secure software modules K5
5. Understand different forms of hacking techniques K5, K6
K1-Remember;K2-Understand;K3-Apply;K4-Analyze;K5-Evaluate; K6-Create
UNIT -I Introduction to Cyber Security: Basic Cyber Security Concepts, layers of security,
Vulnerability, threat, Harmful acts, Internet Governance – Challenges and Constraints, Computer
Criminals, CIA Triad, Assets and Threat, motive of attackers, active attacks, passive attacks,
Software attacks, hardware attacks, Cyber Threats-Cyber Warfare, Cyber Crime, Cyber
terrorism, Cyber Espionage, etc., Comprehensive Cyber Security Policy.
UNIT - II Cyberspace and the Law & Cyber Forensics: Introduction, Cyber Security
Regulations, Roles of International Law. The INDIAN Cyberspace, National Cyber Security
Policy. Introduction, Historical background of Cyber forensics, Digital Forensics Science, The
Need for Computer Forensics, Cyber Forensics and Digital evidence, Forensics Analysis of
Email, Digital Forensics Lifecycle, Forensics Investigation, Challenges in Computer Forensics
UNIT - III Cybercrime: Mobile and Wireless Devices: Introduction, Proliferation of Mobile and
Wireless Devices, Trends in Mobility, Credit card Frauds in Mobile and Wireless Computing
Era, Security Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices,
Authentication service Security, Attacks on Mobile/Cell Phones, Organizational security Policies
and Measures in Mobile Computing Era, Laptops.
Print to PDF with PDF Writer for Windows 8. This is a free evaluation copy. Buy full version now.
UNIVERSITY OF MADRAS
M.Sc. DEGREE PROGRAMME IN COMPUTER SCIENCE
SYLLABUS WITH EFFECT FROM 2023-2024
UNIT - V Privacy Issues: Basic Data Privacy Concepts: Fundamental Concepts, Data Privacy
Attacks, Datalinking and profiling, privacy policies and their specifications, privacy policy
languages, privacy in different domains- medical, financial, etc Cybercrime: Case study on
recent threats and attacks.
Recommended Texts:
1. Nina Godbole and SunitBelpure, Cyber Security Understanding Cyber Crimes, Computer
Forensics and Legal Perspectives, Wiley
Reference Books:
1. B.B. Gupta, D.P. Agrawal, Haoxiang Wang, Computer and Cyber Security: Principles,
Algorithm, Applications, and Perspectives, CRC Press, ISBN 9780815371335,2018.
2. Cyber Security Essentials, James Graham, Richard Howard and Ryan Otson,CRC Press.
3. Introduction to Cyber Security, Chwan-Hwa(john) Wu,J. David Irwin, CRC Press T&F
Group.
Web References:
1.https://www.youtube.com/watch?v=6wi5DI6du4&list=PL_uaeekrhGzJlB8XQBxU3z
hDwT95xlk
Mapping with Programme Outcomes:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M S M S S M L M L S
CO2 S M S L M L M L M S
CO3 S S L M S S L M L M
CO4 M L S M M L S L M S
CO5 S S M S L M L M S L
Print to PDF with PDF Writer for Windows 8. This is a free evaluation copy. Buy full version now.