0% found this document useful (0 votes)
8 views1 page

CS 503 C Cyber Security Departmental Elective

The document outlines a syllabus for a Cyber Security course at Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal, covering various aspects of cyber crime including its introduction, classifications, and legal frameworks. It discusses the challenges posed by cyber crimes, tools used by cyber criminals, and the relevant laws such as the IT Act, 2000 and the Indian Evidence Act of 1872. Suggested readings include key texts on cyber crime principles, computer forensics, and cyber law.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views1 page

CS 503 C Cyber Security Departmental Elective

The document outlines a syllabus for a Cyber Security course at Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal, covering various aspects of cyber crime including its introduction, classifications, and legal frameworks. It discusses the challenges posed by cyber crimes, tools used by cyber criminals, and the relevant laws such as the IT Act, 2000 and the Indian Evidence Act of 1872. Suggested readings include key texts on cyber crime principles, computer forensics, and cyber law.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL

New Scheme Based On AICTE Flexible Curricula

Computer Science and Engineering, V-Semester

Departmental Elective CS- 503 (C) Cyber Security


UNIT 1
Introduction of Cyber Crime, Challenges of cyber crime, Classifications of Cybercrimes: E-
Mail Spoofing, Spamming, Internet Time Theft, Salami attack/Salami Technique,

UNIT 2
Web jacking, Online Frauds, Software Piracy, Computer Network Intrusions, Password
Sniffing, Identity Theft, cyber terrorism, Virtual Crime, Perception of cyber criminals:
hackers, insurgents and extremist group etc. Web servers were hacking, session hijacking.

UNIT 3
Cyber Crime and Criminal justice: Concept of Cyber Crime and the IT Act, 2000, Hacking,
Teenage Web Vandals, Cyber Fraud and Cheating, Defamation, Harassment and E-mail
Abuse, Other IT Act Offences, Monetary Penalties, jurisdiction and Cyber Crimes, Nature of
Criminality, Strategies to tackle Cyber Crime and Trends.

UNIT 4
The Indian Evidence Act of 1872 v. Information Technology Act, 2000: Status of Electronic
Records as Evidence, Proof and Management of Electronic Records; Relevancy,
Admissibility and Probative Value of E-Evidence, Proving Digital Signatures, Proof of
Electronic Agreements, Proving Electronic Messages.

UNIT 5
Tools and Methods in Cybercrime: Proxy Servers and Anonymizers, Password Cracking,
Key loggers and Spyware, virus and worms, Trojan Horses, Backdoors, DoS and DDoS
Attacks , Buffer and Overflow, Attack on Wireless Networks, Phishing : Method of Phishing,
Phishing Techniques.

Suggested Books:
1. Principles of Cyber crime, Jonathan Clough Cambridge University Press
2. John R. Vacca, Computer Forensics:Computer Crime Scene Investigation, 2nd Edition,
Charles River Media, 2005
3. Cyber Law Simplified, VivekSood, Pub: TMH.
4. Cyber Security by Nina Godbole, SunitBelapure Pub: Wiley-India
5. Information Warfare: Corporate attack and defense in digital world, William Hutchinson,
Mathew Warren, Elsevier.
6. Cyber Laws and IT Protection, Harish Chander, Pub:PHI.

You might also like