JNTUK R16 3-2 Cyber Security Material/Notes PDF Download

JNTUK R16 3-2 Cyber Security Material/Notes PDF Download

Students those who are studying JNTUK R16 CSE Branch, Can Download Unit wise R16 3-2 Cyber Security (CS) Material/Notes PDFs below.

jntuk-materials

JNTUK R16 3-2 Cyber Security Material/Notes PDF Download

OBJECTIVES:

  • The Cyber security Course will provide the students with foundational Cyber Security principles, Security architecture, risk management, attacks, incidents, and emerging IT and IS technologies.
  • Students will gain insight into the importance of Cyber Security and the integral role of Cyber Security professionals.

UNIT-1

Introduction to Cybercrime: Introduction, Cybercrime: Definition and Origins of the Word, Cybercrime and Information Security ,Who are Cybercriminals? , Classifications of Cybercrimes, Cybercrime: The Legal Perspectives, Cybercrimes: An Indian Perspective, Cybercrime and the Indian ITA 2000, A Global Perspective on Cybercrimes, Cybercrime Era: Survival Mantra for the Netizens

Download UNIT-1 Material PDF | Reference-2

UNIT-2

Cyber offenses: How Criminals Plan Them –Introduction, How Criminals Plan the Attacks, Social Engineering, Cyber stalking, Cyber cafe and Cybercrimes, Botnets: The Fuel for Cybercrime, Attack Vector Cloud Computing.

Download UNIT-2 Material PDF | Reference-2

UNIT-3

Cybercrime Mobile and Wireless Devices: Introduction, Proliferation of Mobile and Wireless Devices, Trends in Mobility, Credit Card Frauds in Mobile and Wireless Computing Era, Security Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices, Authentication Service Security, Attacks on Mobile/Cell Phones, Mobile Devices: Security Implications for Organizations, Organizational Measures for Handling Mobile, Organizational Security Policies and Measures in Mobile Computing Era, Laptops.

Download UNIT-3 Material PDF | Reference-2

UNIT-4:

Tools and Methods Used in Cybercrime: Introduction, Proxy Servers and Anonymizers, Phishing, Password Cracking, Key loggers and Spywares, Virus and Worms, Trojan Horses and Backdoors, Steganography, DoS and DDoS Attacks, SQL Injection, Buffer Overflow, Attacks on Wireless Networks, Phishing and Identity Theft: Introduction, Phishing, Identity Theft (ID Theft)

Download UNIT-4 Material PDF | Reference-2

UNIT-5:

Cybercrimes and Cyber security: Why Do We Need Cyber laws: The Indian Context, The Indian IT Act, Challenges to Indian Law and Cybercrime Scenario in India, Consequences of Not Addressing the Weakness in Information Technology Act, Digital Signatures and the Indian IT Act, Information Security Planning and Governance, Information Security Policy Standards, Practices, The information Security Blueprint, Security education, Training and awareness program, Continuing Strategies.

Download UNIT-5 Material PDF | Reference-2

UNIT-6:

Understanding Computer Forensics: Introduction, Historical Background of Cyber forensics, Digital Forensics Science, The Need for Computer Forensics, Cyber forensics and Digital Evidence, Forensics Analysis of E-Mail, Digital Forensics Life Cycle, Chain of Custody Concept, Network Forensics, Approaching a Computer Forensics Investigation, Computer Forensics and Steganography, Relevance of the OSI 7 Layer Model to Computer Forensics, Forensics and Social Networking Sites: The Security/Privacy Threats, Computer Forensics from Compliance Perspective, Challenges in Computer Forensics, Special Tools and Techniques, Forensics Auditing, Antiforensics

Download UNIT-6 Material PDF | Reference-2


TEXT BOOKS:

  1. Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives, Nina Godbole, SunitBelapure, Wiley.
  2. Principles of Information Security, MichealE.Whitman and Herbert J.Mattord, Cengage Learning

REFERENCE BOOKS:

  1. Information Security, Mark Rhodes, Ousley, MGH.

OUTCOMES:

  • Cyber Security architecture principles
  • Identifying System and application security threats and vulnerabilities
  • Identifying different classes of attacks
  • Cyber Security incidents to apply appropriate response
  • Describing risk management processes and practices
  • Evaluation of decision making outcomes of Cyber Security scenarios

Leave a Comment