Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Class notes

Basics of cybersecurity

Rating
-
Sold
-
Pages
75
Uploaded on
13-04-2024
Written in
2023/2024

This is used to learn the basics of cybersecurity.

Institution
Course

Content preview

DEPARTMENT OF COMPUTER SCIENCE AND
ENGINEERING

DIGITAL NOTES
ON
CYBER SECURITY
(R20A6202)

B.TECH III YEAR–II SEM
(R20) REGULATION
(2023-24)




Prepared by S J Shruthi Rani Yadav

MALLAREDDY COLLEGE OF ENGINEERING &TECHNOLOGY
(AutonomousInstitution–UGC,Govt.ofIndia)
Recognizedunder2(f)and12(B) ofUGC ACT1956
(AffiliatedtoJNTUH,Hyderabad,ApprovedbyAICTE-AccreditedbyNBA&NAAC–‘A’Grade-
ISO9001:2015Certified)

Maisammaguda,Dhulapally(PostVia.Hakimpet),Secunderabad–500100,TelanganaState,India

, MALLA REDDY COLLEGE OF ENGINEERING AND TECHNOLOGY
III Year B.Tech. CSE- II Sem L/T/P/C

PROFESSIONALELCTIVE – IV
(R20A6202)

CYBER SECURITY
COURSE OBJECTIVES:
This course will enable the students:
1. To familiarize various types of cyber-attacks and cyber-crimes
2. To give an overview of the cyber laws
3. To study the defensive techniques against these attacks
4. To study cyber security challenges and implications.
5. To know about Cyber Security.

UNIT - I
Introduction to Cyber Security: Basic Cyber Security Concepts, layers of security,
Vulnerability, threat, Harmful acts, Internet Governance – Challenges and Constraints,
Computer Criminals, CIATriad, Assets and Threat, motive of attackers, active attacks, passive
attacks, Software attacks, hardware attacks, Spectrum of attacks, Taxonomy of various attacks,
IP spoofing, Methods of defense, Security Models, risk management, Cyber Threats- Cyber
Warfare, Cyber Crime, Cyber terrorism, Cyber Espionage, etc., Comprehensive Cyber Security
Policy.


UNIT - II
Cyberspace and the Law & Cyber Forensics: Introduction, Cyber Security Regulations,
Roles of International Law. The INDIAN Cyberspace, National Cyber Security Policy.
Introduction, Historical background of Cyber forensics, Digital Forensics Science, The Need for
Computer Forensics, Cyber Forensics and Digital evidence, Forensics Analysis of Email,
Digital Forensics Lifecycle, Forensics Investigation, Challenges in Computer Forensics, Special
Techniques for Forensics Auditing.

UNIT - III
Cybercrime: Mobile and Wireless Devices: Introduction, Proliferation of Mobile and
Wireless Devices, Trends in Mobility, Credit card Frauds in Mobile and Wireless Computing
Era, Security Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices,
Authentication service Security, Attacks on Mobile/Cell Phones, Mobile Devices: Security

,Implications for Organizations,Organizational Measures for Handling Mobile, Organizational
Security Policies and Measures in Mobile Computing Era, Laptops.

UNIT - IV
Cyber Security: Organizational Implications: Introduction, cost of cybercrimes and IPR
issues,web threats for organizations, security and privacy implications, social media marketing:
securityrisks and perils for organizations, social computing and the associated challenges for
organizations.Cybercrime and Cyber terrorism: Introduction, intellectual property in the
cyberspace, the ethical dimension of cybercrimes the psychology, mindset and skills of hackers
and other cybercriminals.

UNIT - V
Privacy Issues: Basic Data Privacy Concepts: Fundamental Concepts, Data Privacy Attacks,
Data linking and profiling, privacy policies and their specifications, privacy policy languages,
privacy indifferent domains- medical, financial ,,etc.
Cybercrime: Examples and Mini-Cases
Examples: Official Website of Maharashtra Government Hacked, Indian Banks Lose Millions
of Rupees, Parliament Attack, Pune City Police Bust Nigerian Racket, e-mail spoofing
instances. Mini-Cases: The Indian Case of online Gambling, An Indian Case of Intellectual
Property Crime, Financial Frauds in Cyber Domain.

TEXT BOOKS:
1. Nina Godbole and Sunit Belpure, Cyber Security Understanding
Cyber Crimes, Computer Forensics and Legal Perspectives, Wiley
2. B. B. Gupta, D. P. Agrawal, Haoxiang Wang, Computer and Cyber
Security: Principles, Algorithm, Applications, and Perspectives, CRC Press,
ISBN 9780815371335, 2018.

REFERENCE BOOKS:
1. Cyber Security Essentials, James Graham, Richard Howard and Ryan Otson, CRC Press.
2. Introduction to Cyber Security , Chwan-Hwa(john) Wu,J.David Irwin.CRC
PressT&FGroup

COURSE OUTCOMES:
Student will be able to
1. Understand basic concepts of Cyber Crimes.
2. Ability to identify the attacks in Cyber Crimes
3. Able to specify the suitable methods used in CyberCrime
4. Abilityto face cyber security challenges
5. Understand Cyber laws

, INDEX
S.NO UNIT TOPIC PAGE NO

1 I Introduction to Cyber Security 1-23


2 II Cyberspace and the Law & Cyber 24-37
Forensics

3 III Cybercrime: Mobile and Wireless
38-47
Devices

4 IV Cyber Security: Organizational 48-68
Implications
5 V Privacy Issues,Cybercrime: Examples and 69-74
Mini-Cases

Written for

Institution
Course

Document information

Uploaded on
April 13, 2024
Number of pages
75
Written in
2023/2024
Type
Class notes
Professor(s)
Hari
Contains
All classes

Subjects

$8.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
rajeswari1

Get to know the seller

Seller avatar
rajeswari1 Rathinam college
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
2 year
Number of followers
0
Documents
1
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions