Cyber Security [PDF]

Cloud Computing, Over view of Social media : use, security risks and peril for organization. 7. References Books: 1. Cyb

28 downloads 22 Views 94KB Size

Recommend Stories


Cyber Security
If you want to become full, let yourself be empty. Lao Tzu

Cyber Security
Nothing in nature is unbeautiful. Alfred, Lord Tennyson

Cyber Security & Homeland Security
In the end only three things matter: how much you loved, how gently you lived, and how gracefully you

Cyber Security
Almost everything will work again if you unplug it for a few minutes, including you. Anne Lamott

Cyber Security
Ask yourself: Does it really matter what others think about me? Next

Cyber security
Your task is not to seek for love, but merely to seek and find all the barriers within yourself that

Cyber Security
No matter how you feel: Get Up, Dress Up, Show Up, and Never Give Up! Anonymous

Cyber Security
Never wish them pain. That's not who you are. If they caused you pain, they must have pain inside. Wish

Cyber Security
Be grateful for whoever comes, because each has been sent as a guide from beyond. Rumi

Cyber Security
Nothing in nature is unbeautiful. Alfred, Lord Tennyson

Idea Transcript


GUJARAT TECHNOLOGICAL UNIVERSITY B.Pharm SEMESTER: VII Subject Name: Cyber Security Subject Code: 2270006

Theory 3

Teaching Scheme Tutorial Practical 0

No 1

2

0

Total 3

Evaluation Scheme Theory Practical External Internal External Internal 80 20 0 0

Course Content

Hrs

7 Introduction to Cybercrime Definition and Origins of the Word, Cybercrime and Information Security, Who are Cybercriminals? Classifications of Cybercrimes: E-Mail Spoofing, Spamming, Cyber defamation, Internet Time Theft, Salami Attack/Salami Technique, Data Diddling, Forgery, Web Jacking, Newsgroup Spam/Crimes Emanating from Usenet Newsgroup, Industrial Spying/Industrial Espionage, Hacking, Online Frauds, Pornographic Offenses , Software Piracy, Computer Sabotage, E-Mail Bombing/Mail Bombs, Usenet Newsgroup as the Source of Cybercrimes , Computer Network Intrusions, Password Sniffing, Credit Card Frauds, Identity Theft 11 Cyberoffenses and Law Introduction, Categories of Cybercrime, How Criminals Plan the Attacks: Reconnaissance, Passive Attack, Active Attacks, Scanning/Scrutinizing gathered Information, Attack (Gaining and Maintaining the System Access), Social EngineeringClassification of Social Engineering, Cyber stalking: Types of Stalkers, Cases Reported on Cyber stalking, How Stalking Works? Cyber cafe and Cybercrimes, Botnets: The Fuel for Cybercrime, Attack Vector, Cloud Computing: Why Cloud Computing? Types of Services, Cybercrime and Cloud Computing. Attacks on mobile devices. Recognizing and Defining Computer Crime, Contemporary Crimes, Computers as Targets, Contaminants and Destruction of Data, Security Policies, WWW policies,

Email Security policies, Information Security Standards-ISO, Copyright Act, Patent Law, IPR. Cyber Laws in India; IT Act 2000 Provisions, Intellectual Property Law: Copy Right Law, Software License, Semiconductor Law and Patent Law 3

5 Network Defense tools Firewalls and Packet Filters: Firewall Basics, How a Firewall Protects a Network, basic of Virtual Private Networks, Linux Firewall, Windows Firewall, Snort: intrusion

detection system 4

Cybercrime: Mobile and Wireless Devices Introduction, Proliferation of Mobile and Wireless Devices, Trends in Mobility, Credit Card Frauds in Mobile and Wireless Computing Era: Types and Techniques of Credit Card Frauds, Security Challenges Posed by Mobile Devices Attacks on Mobile/Cell Phones: Mobile Phone Theft, Mobile Viruses, Mishing, Vishing, Smishing, Hacking Bluetooth, Mobile Devices: Security Implications for

10

5

6

Organizations: Managing Diversity and Proliferation of Hand-Held Devices, Unconventional/Stealth Storage Devices Threats through Lost and Stolen Devices, Protecting Data on Lost Devices, Educating the Laptop Users Organizational Measures for Handling Mobile Devices-Related Security Issues: Encrypting Organizational Databases, Including Mobile Devices in Security Strategy, Organizational Security Policies and Measures in Mobile Computing Era: Importance of Security Policies relating to Mobile Computing Devices, Operating Guidelines for Implementing Mobile Device Security Policies, Organizational Policies for the Use of Mobile Hand-Held Devices, Laptops: Physical Security Countermeasures 5 Introduction to Cyber Crime Investigation assword Cracking, Keyloggers and Spyware, Virus and Warms, Trojan and backdoors, Steganography, DoS and DDoS attack, SQL injection, Buffer Overflow, Attack on wireless Networks. Organizational and Cybersecurity: 7 Introduction to implications of insider, outsider attacks, Cost of cybercrimes and IPR issues, overview of webthreats to organizations, security and privacy implications from Cloud Computing, Over view of Social media : use, security risks and peril for organization

References Books: 1. Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives by Nina Godbole and Sunit Belpure, Publication Wiley. 2. Anti-Hacker Tool Kit (Indian Edition) by Mike Shema, Publication Mc Graw Hill.

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.