0 оценок0% нашли этот документ полезным (0 голосов)
25 просмотров1 страница
This document outlines the modules and topics covered in a cyber law and security policy course. The modules include an introduction to cybercrime types like forgery and hacking; categories of cybercrime such as passive and active attacks; cybercrime using mobile and wireless devices including security challenges and attacks; tools and methods used in cybercrime like proxy servers and SQL injection; phishing, identity theft, and online identity theft; and cybercrime and cybersecurity laws in India. The course uses the textbook "Cyber security" by Nina Gobole and Sunit Belapune published by Wiley India.
This document outlines the modules and topics covered in a cyber law and security policy course. The modules include an introduction to cybercrime types like forgery and hacking; categories of cybercrime such as passive and active attacks; cybercrime using mobile and wireless devices including security challenges and attacks; tools and methods used in cybercrime like proxy servers and SQL injection; phishing, identity theft, and online identity theft; and cybercrime and cybersecurity laws in India. The course uses the textbook "Cyber security" by Nina Gobole and Sunit Belapune published by Wiley India.
This document outlines the modules and topics covered in a cyber law and security policy course. The modules include an introduction to cybercrime types like forgery and hacking; categories of cybercrime such as passive and active attacks; cybercrime using mobile and wireless devices including security challenges and attacks; tools and methods used in cybercrime like proxy servers and SQL injection; phishing, identity theft, and online identity theft; and cybercrime and cybersecurity laws in India. The course uses the textbook "Cyber security" by Nina Gobole and Sunit Belapune published by Wiley India.
CS802B Contracts: 3L Credits- 3 Module 1A: Introduction of Cybercrime: [4] What is cybercrime?, Forgery, Hacking, Software Piracy, Computer Network intrusion Module 1B: Category of Cybercrime: [4] how criminals plan attacks, passive attack, Active attacks, cyberstalking. Module 2: Cybercrime Mobile & Wireless devices: [8] Security challenges posted by mobile devices, cryptographic security for mobile devices, Attacks on mobile/ cellphones, Theft, Virus, Hacking. Bluetooth; Different viruses on laptop. Module -3: Tools and Methods used in Cyber crime: [8] Proxy servers, panword checking, Random checking, Trojan Horses and Backdoors; DOS & DDOS attacks; SQL injection: buffer over flow. Module 4A: Phishing & Identity Theft: [4] Phising methods, ID Theft; Online identity method. Module 4B: Cybercrime & Cybersecurity: [4] Legal aspects, indian laws, IT act, Public key certificate Text: Cyber security by Nina Gobole & Sunit Belapune; Pub: Wiley India.