0% found this document useful (0 votes)
712 views

Cyber Law and Ethics Syllabus

This document outlines the course objectives, outcomes, and units for a cyber law and ethics course. The course aims to familiarize students with various cyber laws, IT acts, cyber security regulations, and risk management. It will also cover cyber forensics, legal and ethical issues in information security, cybercrimes, and challenges facing organizations from security risks and social computing issues. The five units will address these topics in more depth.

Uploaded by

Shaik Rehmath
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
712 views

Cyber Law and Ethics Syllabus

This document outlines the course objectives, outcomes, and units for a cyber law and ethics course. The course aims to familiarize students with various cyber laws, IT acts, cyber security regulations, and risk management. It will also cover cyber forensics, legal and ethical issues in information security, cybercrimes, and challenges facing organizations from security risks and social computing issues. The five units will address these topics in more depth.

Uploaded by

Shaik Rehmath
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

CYBER LAW AND ETHICS

Faculty:
MOHAMMED RAHMAT ALI,
Asst. Professor, Dept of CSE.
COURSE OBJECTIVE
• To familiarize various cyber laws and IT Acts
• To give cyber security regulation and forensics
• To Study the risk management and the code of
ethics
COURSE OUTCOMES
• Understand various cyber laws and IT Acts
• Learn the cyber security regulation and
forensics
• Analyze the risk management and the code of
ethics
UNIT-I
• Cyber laws and rights in today's digital age; IT Act,
Intellectual Property Issues connected with use and
management of Digital Data The similar Acts of other
countries

• Information Warfare: Nature of information warfare,


including computer crime and information terrorism;
Threats to information resources, including military and
economic espionage, communications eavesdropping,
computer break-ins, denial-of-service, destruction and
modification of data, distortion and fabrication of
information, forgery, control and disruption of information
How, electronic bombs, and sops and perception
management.
UNIT-II
• Cyberspace and the law & cyber forensics:
introduction, cyber security regulation, roles of
international law, the INDIAN cyber space,
national cyber security policy, introduction,
historical background of cyber forensics, digital
forensics science, the need for computer
forensics, cyber forensics and digital evidence,
forensics analysis of email, digital forensics
lifecycle, forensics investigation, challenges in
computer forensics, special techniques for
forensic auditing.
UNIT -III
• Legal, Ethical and Professional Issues on
information Security ethical component in
Information system, codes of ethics,
certification security analysis: Risk
management, Identifying and assessing risk,
and controlling risk.
UNIT- IV
• Cyber Security:
• Organizational Implication: Introduction
cost of cyber crimes and IPR Issues, web
threats for organizations, security and privacy
implication, social media marketing.
UNIT – V
• Security Risk ad perils for organization, social
computing and the associated challenges for
organization.
• Cybercrime and cyber terrorism: Introduction,
Intelligence property in the cyberspace, the
ethical dimension of Cybercrimes the
psychology, mindset and skill of the hackers
and the other cyber criminal.
SUGGESTED READINGS
• Nina Godbole and Sunit Belpure, Cyber
Security Understanding Cyber Crime,
Computer forensics and legal perspective,
Wiley 2017
• B.B Gupta, D.P Agrawal, Haoxing wang,
Computer and Cyber Security: Principles,
Algorithm, Applications, and the perspective,
CRC Press, 2018

You might also like