0% found this document useful (0 votes)
334 views2 pages

Cyber Security Essentials Overview

This course will enable the student to:  Understand the various types of cybercrimes.  Formulate the security problems in wireless devices and networks.  Identify the different types of cybercrimes and its associated cyber laws.  Gain knowledge about computer forensics and challenges in computer forensics.  Discuss the social impacts of cybercrime and privacy protection in an organization.

Uploaded by

gprakas_74
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
334 views2 pages

Cyber Security Essentials Overview

This course will enable the student to:  Understand the various types of cybercrimes.  Formulate the security problems in wireless devices and networks.  Identify the different types of cybercrimes and its associated cyber laws.  Gain knowledge about computer forensics and challenges in computer forensics.  Discuss the social impacts of cybercrime and privacy protection in an organization.

Uploaded by

gprakas_74
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

P20MCA302 - CYBER SECURITY ESSENTIALS

L T P C M
2 0 0 2 100
COURSE OBJECTIVES:
This course will enable the student to:
 Understand the various types of cybercrimes.
 Formulate the security problems in wireless devices and networks.
 Identify the different types of cybercrimes and its associated cyber laws.
 Gain knowledge about computer forensics and challenges in computer forensics.
 Discuss the social impacts of cybercrime and privacy protection in an organization.
UNIT I - INTRODUCTION TO CYBERCRIME 9

Introduction: Cybercrime - Cybercrime and Information Security - Cyber Criminals-


Classification of Cybercrimes-Cyber Offenses: Attacks-Social Engineering- Cyberstalking-
Cyber Cafe and Cybercrimes-Botnets.
UNIT II – CYBERCRIME : MOBILE AND WIRELESS DEVICES 9

Cybercrime : Mobile and Wireless Devices: Proliferation of Mobile and Wireless Devices-
Credit Card Frauds in Mobile and Wireless Computing Era -Security Challenges Posed by
Mobile Devices -Registry Settings for Mobile Devices -Authentication Service Security :
Cryptographic Security for Mobile Devices - LDAP Security for Hand- Held Mobile
Computing Devices -Attacks On Mobile Phones - Tools and Methods used in Cybercrime:
Proxy Servers and Anonymizers – Phishing - Password Cracking - Key Loggers and
Spywares - Buffer Overflow -Attacks on Wireless Networks.
UNIT III – CYBER SECURITY : LEAGAL PERSPECTIVE 9

Introduction – Cyber Security Evolution – Cyber Security Objectives - Cyberlaws: The


Indian Context - Indian IT Act - Digital Signature and the Indian IT Act - Amendments to
the Indian IT Act - Cybercrime and the Punishment –Cyberlaw - Technology and Students:
Indian Scenario.
UNIT IV – COMPUTER FORENSICS 9

Introduction - Historical Background of Cyber Forensics - Digital Forensics Science - Need


for Computer Forensics -Cyber Forensics and Digital Evidence - Forensics Analysis of E-
Mail - Digital Forensics Life Cycle -Chain of Custody Concept - Network Forensics -
Computer Forensic Investigation - Computer Forensic and Steganography -Challenges in
Computer Forensics - Forensics Auditing – Anti-forensics.
UNIT V –SOCIAL IMPLICATIONS 9

Introduction - Cost of Cybercrime and IPR Issues -Web Threats for Organizations - Security
and Privacy Implications from Cloud Computing - Social Media Marketing -Social
Department of MCA Regulation - 2020 SEMESTER – III

6
Computing and Associated Challenges -Protecting People’s Privacy in the Organization -
Organizational Guide Lines for Internet Usage -Safe Computing Guidelines and Computer
Usage Policy - Incident Handling -Forensics Best Practices for Organizations - Media and
Asset Protection -Importance of endpoint Security in Organizations.
TOTAL = 30 Hours
COURSE OUTCOMES:
At the end of the course the student should be able to:
 Acquire the knowledge about cybercrime and attacks in cybercrime.
 Explore the tools and methods used to protect wireless devices and networks from
various attacks.
 Analyse various Indian acts imposed in cybercrime.
 Apply and know the importance of computer forensics in the digital world.
 Exhibit the media and asset protection of an organization.

TEXT BOOKS
1. Nina Godbole, Sunit Belapure, “Cyber Security Understanding Cyber Crimes,
Computer Forensics and Legal Perspectives”, 2019, Wiley Publications ( Unit I – V).
REFERENCE BOOKS
2. Jennifer L. Bayuk,Jason Healey, Paul Rohmeyer, Marcus H. Sachs, Jeffrey Schmidt,
Joseph Weiss, “Cyber Security Policy Guidebook”, 2017, Wiley Pulications. (Unit -1)
3. Mayank Bhushan, Rajkumar Singh Rathore, Aatif jamshed “Fundamental of Cyber
Security Principles, Theory and Practices”, BPB Publications.
4. Thomas J. Mowbray, “Cyber Security Managing Systems, Conducting Testing and
Investigating Intrusions”, 2019, Wiley Publications.
5. Khadsare S, “ Cyber Security HandBook “, 2017, Mrs. Deepthy Chaudry
publications.

Department of MCA Regulation - 2020 SEMESTER – III

Common questions

Powered by AI

Computer forensics practices ensure the preservation of digital evidence through a structured digital forensics lifecycle and the chain of custody concept . These practices involve carefully documenting and securing all evidence collected during an investigation to maintain its integrity and admissibility in court. Techniques such as forensic imaging, data hashing, and strict handling protocols are employed to prevent tampering or loss of evidence . Challenges like anti-forensics must also be managed to safeguard evidence integrity .

Cybercrimes involving mobile devices differ significantly from those targeting traditional computer systems. Mobile devices, with their increasing adoption and connectivity, present unique vulnerabilities such as unsecured Wi-Fi networks and downloadable applications susceptible to malware . Cybercrimes like credit card frauds and phishing are prominent in mobile platforms due to users often overlooking security settings . Traditional systems, on the other hand, often face direct hacking attempts and system vulnerabilities exploited through complex malware and spyware attacks .

Computer forensics plays a crucial role in identifying and analyzing cybercrimes by providing methods for collecting, preserving, and analyzing digital evidence . The process includes email forensics, network forensics, and the investigation of computer systems to uncover digital crimes. However, challenges such as maintaining the chain of custody, ensuring the integrity of evidence, and countering anti-forensic measures complicate the process . These challenges can impact the reliability of the forensic analysis and legal proceedings.

Organizations can protect their privacy and assets by establishing comprehensive guidelines for internet and safe computing usage, implementing robust endpoint security measures, and ensuring media and asset protection . Policies should address safe practices for social media marketing and the implications of using cloud computing technologies, emphasizing the prevention of data breaches and unauthorized access . Regular training and awareness programs are also essential to cultivate a culture of security within organizations.

Cybercrimes are classified into various types based on their nature and targets, including attacks like cyberstalking, social engineering, and botnet operations . Other classifications include offenses against individuals, such as identity theft, and against organizations, like network intrusion and denial of service attacks. This classification helps in understanding and addressing specific cyber threats effectively .

In the Indian context, cyber laws play an educational role by setting regulations that protect students from cybercrimes and guide them in responsible online behavior . They assist in creating awareness among students about the implications of cyber activities and the legal repercussions of cyber offenses. This is crucial in an era where students are increasingly using digital platforms for learning and communication, requiring legal literacy to navigate the online environment safely .

Endpoint security is crucial for organizations as it protects network endpoints, such as computers and mobile devices, from cyber threats and breaches . To enhance its effectiveness, organizations should implement practices like regular software updates, deploying anti-malware solutions, and enabling firewalls. Additionally, employee training in recognizing phishing attempts and adhering to safe computing guidelines further strengthens endpoint security .

The Indian IT Act provides a legal framework for addressing cybercrimes in India, specifying various offenses and associated penalties . It has evolved through amendments to cover a broader range of cyber offenses and enhance the enforcement capabilities of law enforcement agencies. However, the effectiveness of the Act depends on its implementation and updates in response to emerging cyber threats. The Act's impact is significant in creating a deterrent for cybercriminals, although challenges such as inadequate infrastructure and limited awareness may still limit its deterrence potential .

Securing mobile and wireless devices involves addressing several key challenges such as credit card frauds, security vulnerabilities in mobile device registry settings, and diverse types of attacks including those on wireless networks and phishing attacks . These challenges can be addressed by implementing robust cryptographic security measures, utilizing LDAP security for handheld devices, and applying strong authentication services. It is also critical to secure registry settings and employ security tools like proxy servers and anonymizers to prevent attacks .

Proxy servers and anonymizers are used in cybercrime to obscure the true IP addresses of cybercriminals, thereby enhancing their anonymity and evading detection . These tools facilitate cybercrimes such as launching attacks on networks, conducting illegal downloads, and distributing malware by masking the source of the criminal activity. They essentially serve as intermediaries that can complicate traceability, posing challenges to law enforcement in identifying and prosecuting perpetrators .

You might also like