Cyber Security

₹155.00

Tax excluded

Quantity

ISBN- 978-93-5480-068-9

AUTHORS- Nutan Prakash Joshi, Ms. Manishaben Jaiswal, Prof. Dhananjay Murlidhar Wagh

                                                                                                                                                            Syllabus

                                          CYBER SECURITY

 

(Course Code: CA-501)

 

Unit

Topic

No of lectures

1

Chapter 1:- Introduction to Cyber Crime and Cyber Security

1.1 Introduction

1.2 Cybercrime: Definition and Origin of the Word

1.3 Cybercrime and Information Security

1.4 Who are Cybercriminals?

1.5 Classifications of Cybercrimes:

E-Mail Spoofing, Spamming, Cyber defamation, Internet Time Theft, Salami Attack/Salami Technique, Data Diddling,Forgery, Web Jacking, Newsgroup, Spam/Crimes Emanating from Usenet Newsgroup, Industrial Spying/Industrial Espionage, Hacking,OnlineFrauds,Computer Sabotage, Email Bombing/Mail Bombs, Computer Network Intrusions, Password Sniffing, Credit Card Frauds, Identity Theft

1.6 Definition of Cyber Security

1.7 Vulnerability, Threats and Harmful acts

1.8 CIA Triad

1.9 Cyber Security Policy and Domains of Cyber Security Policy

(07)

2

Chapter 2:- Cyber offenses and Cyberstalking

2.1 Criminals Plan: Categories of Cybercrime Cyber Attacks: Reconnaissance, Passive Attack, Active Attacks, Scanning/Scrutinizing gathered Information, Attack (Gaining and Maintaining the System Access), Social Engineering, and Classification of Social Engineering.

2.2 Cyberstalking: Types of Stalkers, Cases Reported on Cyberstalking,        Working of Stalking

2.3 Real-Life Incident of Cyber stalking

2.4 Cybercafe and Cybercrimes

2.5 Botnets: The Fuel for Cybercrime, Botnet, Attack Vector

2.6 Cybercrime: Mobile and Wireless Devices – Proliferation - Trends in        Mobility

2.7 Credit Card Frauds in Mobile and Wireless Computing Era

2.8 Security Challenges Posed by Mobile Devices

2.9 Authentication Service Security

2.10 Attacks on Mobile/Cell Phones

(10)

3

Chapter 3:- Tools and Methods Used in Cybercrime

3.1 Introduction

3.2 Proxy Servers and Anonymizers

3.3 Phishing

3.4 Password Cracking

3.5 Keyloggers and Spywares

3.6 Virus and Worms

3.7 Trojan Horses and Backdoors

3.8 Steganography

3.9 DoS and DDoS Attacks

3.10 SQL Injection

(05)

4

Chapter 4:- Cybercrimes and Cyber security: The Legal Perspectives

4.1 Introduction

4.2 Cybercrime and the Legal Landscape around the World

4.3 Why Do We Need Cyberlaws: The Indian Context

4.4 The Indian IT Act

4.5 Challenges to Indian Law and Cybercrime Scenario in India

4.6 Consequences of not Addressing the Weakness in Information Technology Act

4.7 Digital Signatures and the Indian IT Act

4.8 Amendments to the Indian IT Act

4.9 Cybercrime and Punishment

4.10 Cyberlaw, Technology and Students: Indian Scenario

(07)

5

Chapter 5:- Cyber Forensics

5.1 Introduction

5.2 Historical background of Cyber forensics

5.3 Digital Forensics Science

5.4 The Need for Computer Forensics

5.5 Cyber Forensics and Digital evidence

5.6 Forensics Analysis of Email

5.7 Digital Forensics Lifecycle

5.8 Challenges in Computer Forensics

(06)

6

Chapter 6:- Cybersecurity: Organizational Implications

6.1 Organizational Implications: Cost of cybercrimes and IPR issues

6.2 Web threats for organizations

6.3 Security and Privacy Implications from Cloud Computing

6.4 Social media marketing

6.5 Social computing and the associated challenges for organizations, Protecting people’s privacy in the organization

6.6 Organizational guidelines for Internet usage and safe computing guidelines and computer usage policy

6.7 Incident handling

6.8 Intellectual property in the cyberspace of cyber security.

(07)

7

Chapter 7:- Cybercrime: Illustrations, Examples and Mini-Cases

7.1Real-Life Examples

7.2 Mini-Cases

7.3 Illustrations of Financial Frauds in Cyber Domain

7.4 Digital Signature-Related Crime Scenarios

7.5 Digital Forensics Case Illustrations

7.6 Online Scams

(06)

SPPU2021/ BBA(CA)/5/01
42 Items
New product

3 other products in the same category: