AKTU CYBER SECURITY BCC-301 (3rd Sem)
Unit :-1 BCC-401 (4th Sem)
INTRODUCTION TO CYBER CRIME
The word “Cybercrime” was first coined in 1982 by
William Gibson but it gained popularity in 1984 through
his novel 'Neuromancer'.
Akash Arora (1999) was one of the earliest examples
of cybercrime in India. (Yahoo Case)
According to the 2020 Cost of Cybercrime Study by
Accenture, the average number of security breaches
experienced by organizations increased by 11%
between 2018 and 2019. Cybercrime is also becoming
more sophisticated, with the emergence of new
threats such as ransomware and advanced
persistent threats (APTs)
Cybercrime Era: Survival Mantra for the Netizens
CYBER SECURITY
AKTU Unit:-2 BCC-301 (3rd Sem)
BCC-401 (4th Sem)
CYBER CRIME
Mobile and Wireless Devices :-
SmartPhones combine the best
aspects of mobile and wireless
technologies and blend them into
a useful business tool.
Cyber Security
Unit :- 3
TOOLS AND METHODS USED IN CYBERCRIME
Cyber Security
Unit :- 4
Understanding Computer Forensics
Cyber Security
Unit :- 5
INTRODUCTION TO SECURITY POLICIES AND CYBER LAWS
Cyber Security
AKTU Important Topics
Unit :- 1
> Long Questions :
1. Cyber Crime - Definition + Origin + Types
2. Social Engineering - Example + Classification
3. How Criminals Plan the Attacks
4. Cyber Stalking - Types + Working
5. Botnets and Attack Vector + Diagram
> Two Marks Questions :
1. Information Security (CIA Triad)
2. Cyber Criminals
3. A Global Perspective on Cyber Crime
4. Survival Mantra for Netizens
5. Cyber Cafe and its Safety Tips
Unit :- 2
1. Proliferation of Mobile and Wireless Devices
2. Credit Card Frauds in Mobile and Wireless Devices
3. Attacks on Mobile / Security Challenges
4. Mobile Devices : Security Implications for Organizations
5. Organizational Measures for Mobile
> Two Marks Questions :
1. Mobile and Wireless Devices
2. Trends in Mobility
3. Mobile Viruses
Unit :- 3
1. Proxy Server and Anonymizers
2. Phising and Identity Theft
3. Virus and Worms / DoS and DDoS Attacks
4. SQL Injection and Buffer Overflow
> Two Marks Questions :
1. Introduction - Stages of Attack
2. Steganography
3. Password Cracking / Keyloggers / Spywares
4. Trojan Horses and Backdoors
Unit :- 4
1. Computer Forensics - Definition + Function + Needs
2. Forensic Analysis of E-Mail and Tools
3. Digital Forensic Life Cycle / Chain of Custody
4. Challenges in Computer Foresics
> Two Marks Questions :
1. Digital Forensics
2. Digital Evidence
3. Network Forensics
4. Forensics and Social Networking Sites
Unit :- 5
1. Information Security Policy and its Needs
2. Cyber Law - Importance
3. The Digital Personal Data Protection Bill 2023
4. Intellectual Property and its Legislation and Issues
> Two Marks Questions :
1. Indian Cyber Law
2. Patents and Copyrights
3. Trademark