0% found this document useful (0 votes)
20 views1 page

CS Syllabus

The document outlines the course MC602ES - Cyber Security for B.Tech VI Semester students, detailing its objectives, outcomes, and five units covering topics such as cyber-attacks, cyber laws, mobile security, organizational implications of cybercrime, and data privacy issues. It aims to equip students with knowledge about various cyber threats and defensive techniques to protect themselves and the broader internet community. Additionally, it includes examples of notable cybercrimes to illustrate the concepts discussed.

Uploaded by

rasmita mohanty
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views1 page

CS Syllabus

The document outlines the course MC602ES - Cyber Security for B.Tech VI Semester students, detailing its objectives, outcomes, and five units covering topics such as cyber-attacks, cyber laws, mobile security, organizational implications of cybercrime, and data privacy issues. It aims to equip students with knowledge about various cyber threats and defensive techniques to protect themselves and the broader internet community. Additionally, it includes examples of notable cybercrimes to illustrate the concepts discussed.

Uploaded by

rasmita mohanty
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

MR-22 [Link].

CSE (AI&ML) MGIT (Autonomous), Hyderabad


L T P C
3 0 0 0
[Link] VI Semester

MC602ES – CYBER SECURITY

(Common to all branches except CSE, IT, CSBS)


Course objectives:
 To familiarize various types of cyber-attacks and cyber-crimes
 To give an overview of the cyber laws
 To study the defensive techniques against these attacks

Course Outcomes:

 The students will be able to understand cyber-attacks, types of cybercrimes, cyber laws and how to
protect them self and ultimately the entire Internet community from such attacks.

UNIT - I
Introduction to Cyber Security: Basic Cyber Security Concepts, layers of security, Vulnerability, threat,
Harmful acts, Internet Governance – Challenges and Constraints, Computer Criminals, CIA Triad, Assets and
Threat, motive of attackers, active attacks, passive attacks, Software attacks, hardware attacks, Spectrum of
attacks, Taxonomy of various attacks, IP spoofing, Methods of defence, Security Models, risk management,
Cyber Threats-Cyber Warfare, Cyber Crime, Cyber terrorism, Cyber Espionage, etc., Comprehensive Cyber
Security Policy.

UNIT - II
Cyberspace and the Law & Cyber Forensics: Introduction, Cyber Security Regulations, Roles of International
Law. The INDIAN Cyberspace, National Cyber Security Policy. Introduction, Historical background of Cyber
forensics, Digital Forensics Science, The Need for Computer Forensics, Cyber Forensics and Digital evidence,
Forensics Analysis of Email, Digital Forensics Lifecycle, Forensics Investigation, Challenges in Computer
Forensics, Special Techniques for Forensics Auditing.

UNIT - III
Cybercrime: Mobile and Wireless Devices: Introduction, Proliferation of Mobile and Wireless Devices, Trends
in Mobility, Credit card Frauds in Mobile and Wireless Computing Era, Security Challenges Posed by Mobile
Devices, Registry Settings for Mobile Devices, Authentication service Security, Attacks on Mobile/Cell Phones,
Mobile Devices: Security Implications for Organizations, Organizational Measures for Handling Mobile,
Organizational Security Policies and Measures in Mobile Computing Era, Laptops.

UNIT- IV
Cyber Security: Organizational Implications: Introduction cost of cybercrimes and IPR issues, web Threats for
organizations, security and privacy implications, social media marketing: security risks and perils for
organizations, social computing, and the associated challenges for organizations.
Cybercrime and Cyber terrorism: Introduction, intellectual property in cyberspace, the ethical dimension of
cybercrimes the psychology, mindset and skills of hackers and other cyber criminals.

UNIT - V
Privacy Issues: Basic Data Privacy Concepts: Fundamental Concepts, Data Privacy Attacks, Data linking and
profiling, privacy policies and their specifications, privacy policy languages, privacy in different domains-
medical, financial, etc.
Cybercrime: Examples and Mini-Cases Examples: Official Website of Maharashtra Government Hacked, Indian
Banks Lose Millions of Rupees, Parliament Attack, Pune City Police Bust Nigerian Racket, e-mail spoofing

You might also like