0% found this document useful (0 votes)
17 views

Syllabus Copy-CSP-2025

The Cyber Security and Privacy course aims to educate students on various cyber-attacks, cyber laws, and defensive techniques against these threats. It covers topics such as cybercrime related to mobile devices, organizational implications of cyber security, and privacy issues. The course includes case studies and references key textbooks for further learning.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

Syllabus Copy-CSP-2025

The Cyber Security and Privacy course aims to educate students on various cyber-attacks, cyber laws, and defensive techniques against these threats. It covers topics such as cybercrime related to mobile devices, organizational implications of cyber security, and privacy issues. The course includes case studies and references key textbooks for further learning.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

R20A L T P Cr.

CYBER SECURITY AND PRIVACY


Course Code: 20PEC4115B
B.Tech (VIII Sem.) 3 0 0 3
(Common to CSE, IT, CSE-AIML)
IV-II

COURSE OBJECTIVES:
This course will enable the students:
1. To familiarize various types of cyber-attacks and cyber-crimes
2. To give an overview of the cyber laws
3. To study the defensive techniques against these attacks
4. To studycyber securitychallenges and implications.
5. To know about Cyber Security.

UNIT - I
Introduction to Cyber Security: Basic Cyber Security Concepts, layers of security,
Vulnerability, threat, Harmful acts, Internet Governance – Challenges and Constraints,
Computer Criminals, CIATriad, Assets and Threat, motive of attackers, active attacks, passive
attacks, Software attacks, hardware attacks, Spectrum of attacks, Taxonomy of various attacks,
IP spoofing, Methods of defense, Security Models, risk management, Cyber Threats- Cyber
Warfare, Cyber Crime, Cyber terrorism, Cyber Espionage, etc., Comprehensive Cyber Security
Policy.
UNIT - II
Cyberspace and the Law & Cyber Forensics: Introduction, Cyber Security Regulations,
Roles of International Law. The INDIAN Cyberspace, National Cyber Security Policy.
Introduction, Historical background of Cyber forensics, Digital Forensics Science, The Need for
Computer Forensics, Cyber Forensics and Digital evidence, Forensics Analysis of Email,
Digital Forensics Lifecycle, Forensics Investigation, Challenges in Computer Forensics, Special
Techniques for Forensics Auditing.

UNIT - III
Cybercrime: Mobile and Wireless Devices: Introduction, Proliferation of Mobile and
Wireless Devices, Trends in Mobility, Credit card Frauds in Mobile and Wireless Computing
Era, Security Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices,
Authentication service Security, Attacks on Mobile/Cell Phones, Mobile Devices: Security
Implications for Organizations, Organizational Measures for Handling Mobile, Organizational
Security Policies and Measures in Mobile Computing Era, Laptops.

UNIT - IV
Cyber Security: Organizational Implications: Introduction, cost of cybercrimes and IPR
issues, web threats for organizations, security and privacy implications, social media marketing:
security risks and perils for organizations, social computing and the associated challenges for
organizations.
Cybercrime and Cyber terrorism: Introduction, intellectual property in the cyberspace, the
ethical dimension of cybercrimes the psychology, mindset and skills of hackers and other
cybercriminals.

UNIT - V
Privacy Issues: Basic Data Privacy Concepts: Fundamental Concepts, Data Privacy Attacks,
Data linking and profiling, privacy policies and their specifications, privacy policy languages,
privacy indifferent domains- medical, financial ,,etc.
Cybercrime: Examples and Mini-Cases
Examples: Official Website of Maharashtra Government Hacked, Indian Banks Lose Millions
of Rupees, Parliament Attack, Pune City Police Bust Nigerian Racket, e-mail spoofing
instances. Mini-Cases: The Indian Case of online Gambling, An Indian Case of Intellectual
Property Crime, Financial Frauds in Cyber Domain.

TEXT BOOKS:
1. Nina Godbole and Sunit Belpure, Cyber Security Understanding Cyber Crimes,
Computer Forensics and Legal Perspectives, Wiley
2. B. B. Gupta, D. P. Agrawal, Haoxiang Wang, Computer and Cyber Security:
Principles, Algorithm, Applications, and Perspectives, CRC Press, ISBN
9780815371335, 2018.

REFERENCE BOOKS:
1. Cyber Security Essentials, James Graham, Richard Howard and Ryan Otson, CRC Press.
2. Introduction to Cyber Security , Chwan-Hwa(john) Wu,J.David Irwin.CRC
PressT&FGroup

You might also like