VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING AND TECHNOLOGY
B. Tech. VII Semester L T/P/D C
3 0 3
5
(18OE1IT01) ESSENTIALS OF CYBER SECURITY
COURSE PRE-REQUISITES: Fundamentals of Computer Networks, Cryptography and Network
Security
10 COURSE OBJECTIVES:
• • Identify the key components of cyber security in network
• • Describe various security levels and categories, operating system security
• • Define authentication issues and network security
• • Describe memory management and protection measures
15
COURSE OUTCOMES: After completion of the course, the student should be able to
CO-1: Categorize cyber-crime and an understand social, political, ethical and psychological dimensions
cyber security
CO-2: Demonstrate security levels and models with objects and access control
20 CO-3: Analyse tools and methods used in cybercrime
CO-4: Understand Organizational Implications and security risks
UNIT – I:
Introduction to Cybercrime: Introduction, Cybercrime, and Information Security, Who are
25 Cybercriminals, Classifications of Cybercrimes, And Cybercrime: The legal Perspectives and Indian
Perspective, Cybercrime and the Indian ITA 2000, A Global Perspective on Cybercrimes.
UNIT – II:
Cyber Offenses: How Criminals Plan Them: Introduction, How Criminals plan the Attacks, Social
Engineering, Cyber stalking, Cyber cafe and Cybercrimes, Botnets: The Fuel for Cybercrime, Attack Vector,
30 Cloud Computing.
UNIT – III:
Cybercrime: Mobile and Wireless Devices: Introduction, Proliferation of Mobile and Wireless Devices,
Trends in Mobility, Credit card Frauds in Mobile and Wireless Computing Era, Security Challenges Posed
by Mobile Devices, Registry Settings for Mobile Devices, Authentication service Security, Attacks on
35 Mobile/Cell Phones, Mobile Devices: Security Implications for Organizations, Organizational Measures for
Handling Mobile, Organizational Security Policies an Measures in Mobile Computing Era, Laptops.
UNIT – IV:
Tools and Methods Used in Cybercrime: Introduction, Proxy Servers and Anonymizers, Phishing,
Password Cracking, Keyloggers and Spywares, Virus and Worms, Trojan Horse and Backdoors,
40 Steganography, DoS and DDoS attacks, SQL Injection, Buffer Overflow.
UNIT – V:
Cyber Security: Organizational Implications Introduction, Cost of Cybercrimes and IPR issues, Web
threats for Organizations, Security and Privacy Implications.
UNIT – VI:
45 Social Media Marketing: Security Risks and Perils for Organizations, Social Computing and the
associated challenges for Organizations.
TEXT BOOKS:
1. Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives, Nina
Godbole and Sunil Belapure, Wiley India
50
REFERENCES:
1. Cyber Security Essentials, James Graham, Richard Howard and Ryan Otson, CRC Press
2. Introduction to Cyber Security, Chwan-Hwa (John) Wu, J. David Irwin, CRC Press T&F Group