MTech Cyber Security And Cyber Law syllabus for 2 Sem 2020 scheme 20SCE244

Module-1 Introduction to Cybercrime: Cybercrime 0 hours

Introduction to Cybercrime:

Cybercrime: Definition and Origins of the Word, Cybercrime and Information Security, Who are Cybercriminals?, Classifications of Cybercrimes, Cybercrime: The Legal Perspectives, Cybercrimes: An Indian Perspective, Cybercrime and the Indian ITA 2000, A Global Perspective on Cybercrimes, Cybercrime Era: Survival Mantra for the Netizens. Cyberoffenses: How Criminals Plan Them: How Criminals Plan the Attacks, Social Engineering, Cyberstalking, Cybercafe and Cybercrimes, Botnets: The Fuel for Cybercrime, Attack Vector, Cloud Computing.

Module-2 Cybercrime 0 hours

Cybercrime:

Mobile and Wireless Devices: Introduction, Proliferation of Mobile and Wireless Devices, Trends in Mobility, Credit Card Frauds in Mobile and Wireless Computing Era, Security Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices, Authentication Service Security, Attacks on Mobile/Cell Phones, Mobile Devices: Security Implications for organizations, Organizational Measures for Handling Mobile, Organizational Security Policies and Measures in Mobile Computing Era, Laptops

A d v e r t i s e m e n t
Module-3 Tools and Methods Used in Cybercrime 0 hours

Tools and Methods Used in Cybercrime:

Introduction, Proxy Servers and Anonymizers, Phishing, Password Cracking, Keyloggers and Spywares, Virus and Worms, Trojan Horses and Backdoors, Steganography, DoS and DDoS Attacks, SQL Injection, Buffer Overflow, Attacks on Wireless Networks. Phishing and Identity Theft: Introduction, Phishing, Identity Theft (ID Theft).

Module-4 Understanding Computer Forensics 0 hours

Understanding Computer Forensics:

Introduction, Historical Background of Cyberforensics, Digital Forensics Science, The Need for Computer Forensics, Cyberforensics and Digital Evidence, Forensics Analysis of E-Mail, Digital Forensics Life Cycle, Chain of Custody Concept, Network Forensics, Approaching a Computer Forensics Investigation, Setting up a Computer Forensics Laboratory: Understanding the Requirements, Computer Forensics and Steganography, Relevance of the OSI 7 Layer Model to Computer Forensics, Forensics and Social Networking Sites: The Security/Privacy Threats, Computer Forensics from Compliance Perspective, Challenges in Computer Forensics, Special Tools and Techniques, Forensics Auditing, Antiforensics.

Module-5 Introduction to Security Policies and Cyber Laws 0 hours

Introduction to Security Policies and Cyber Laws:

Need for An Information Security Policy, Information Security Standards – Iso, Introducing Various Security Policies and Their Review Process, Introduction to Indian Cyber Law, Objective and Scope of the it Act, 2000, Intellectual Property Issues, Overview of Intellectual - Property - Related Legislation in India, Patent, Copyright, Law Related to Semiconductor Layout and Design, Software License.

 

Course outcomes:

At the end of the course the student will be able to:

  • Define cyber security, cyber law and their roles
  • Demonstrate cyber security cybercrime and forensics.
  • Infer legal issues in cybercrime,
  • Demonstrate tools and methods used in cybercrime and security.
  • Illustrate evidence collection and legal challenges

 

Question paper pattern:

The SEE question paper will be set for 100 marks and the marks scored will be proportionately reduced to 60.

  • The question paper will have ten full questions carrying equal marks.
  • Each full question is for 20 marks.
  • There will be two full questions (with a maximum of four sub questions) from each module.
  • Each full question will have sub question covering all the topics under a module.
  • The students will have to answer five full questions, selecting one full question from each module.

 

Textbook/ Textbooks

1 Cyber Security: Understanding Cyber Crimes, Computer Forensics And Legal Perspectives SunitBelapure and Nina Godbole Wiley India Pvt Ltd 2013

2 Introduction to information security and cyber laws Surya PrakashTripathi, RitendraGoyal, Praveen Kumar Shukla Dreamtech Press 2015

 

Reference Books

1 Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions Thomas J. Mowbray John Wiley & Sons,

2 Cyber Security Essentials James Graham, Ryan Olson, Rick Howard CRC Press 2010