0% found this document useful (0 votes)
4K views

Cyber Security

This document outlines the units of study for a Cyber Security course. The five units cover topics such as cyber crimes using mobile and wireless devices, tools used in cyber crimes like phishing and password cracking, computer forensics and investigating digital evidence from emails, forensic analysis of hand-held devices like cell phones and music players, and the organizational implications of cyber security including the costs of cybercrimes and protecting privacy. Case studies are included within each unit of study. The document also lists recommended textbooks and references on cyber law, information security, and cyber crimes for the course.

Uploaded by

Kh Aasim Bashir
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4K views

Cyber Security

This document outlines the units of study for a Cyber Security course. The five units cover topics such as cyber crimes using mobile and wireless devices, tools used in cyber crimes like phishing and password cracking, computer forensics and investigating digital evidence from emails, forensic analysis of hand-held devices like cell phones and music players, and the organizational implications of cyber security including the costs of cybercrimes and protecting privacy. Case studies are included within each unit of study. The document also lists recommended textbooks and references on cyber law, information security, and cyber crimes for the course.

Uploaded by

Kh Aasim Bashir
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYD

13MBA49

CYBER SECURITY
(SYSTEMS ELECTIVE)

Unit-I
Cyber crime: Mobile and Wireless devices-Trend mobility-authentication service
security-Attacks on mobile phones-mobile phone security Implications for
organizations-Organizational measurement for Handling mobile-Security policies
and measures in mobile computing era.
Cases.
Unit-II
Tools and methods used in cyber crime-Proxy servers and Anonymizers- PhishingPassword cracking-Key loggers and Spy wares-Virus and worms-Trojan Horse and
Backdoors-Steganography-SQL Injection-Buffer overflow-Attacks on wireless
network.
Cases.
Unit-III
Understanding computer forensic-Historical background of cyber forensicForensic analysis of e-mail-Digital forensic life cycle-Network forensic-Setting up
a computer forensic Laboratory-Relevance of the OSI 7 Layer model to computer
Forensic-Computer forensic from compliance perspectives.
Cases.
Unit-IV
Forensic of Hand Held Devices-Understanding cell phone working
characteristics-Hand-Held devices and digital forensic- Toolkits for Hand-Held
device-Forensic of i-pod and digital music devices-Techno legal Challenges with
evidence from hand-held Devices.
Cases.

Unit-V
Cyber Security Organizational implications-cost of cybercrimes and IPR issuesWeb threats for organizations: the evils and Perils-Social media marketingSecurity and privacy Implications-Protecting people privacy in the organizationsForensic best practices for organizations.
Cases.
Text book:
Nina Godbole & Sunit Belapure Cyber Security, Wiley India, 2012.
Reference:
Harish Chander, cyber laws & IT protection, PHI learning pvt.ltd, 2012.
Dhiren R Patel, Information security theory & practice,PHI learning pvt
ltd,2010.
MS.M.K.Geetha & Ms.Swapne RamanCyber Crimes and Fraud Management,
MACMILLAN,2012.
Pankaj Agarwal : Information Security & Cyber Laws (Acme Learning), Excel,
2013.
Vivek Sood, Cyber Law Simplified, TMH, 2012.

You might also like