Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYD

13MBA49

CYBER SECURITY
(SYSTEMS ELECTIVE)

Unit-I
Cyber crime: Mobile and Wireless devices-Trend mobility-authentication service
security-Attacks on mobile phones-mobile phone security Implications for
organizations-Organizational measurement for Handling mobile-Security policies
and measures in mobile computing era.
Cases.
Unit-II
Tools and methods used in cyber crime-Proxy servers and Anonymizers- PhishingPassword cracking-Key loggers and Spy wares-Virus and worms-Trojan Horse and
Backdoors-Steganography-SQL Injection-Buffer overflow-Attacks on wireless
network.
Cases.
Unit-III
Understanding computer forensic-Historical background of cyber forensicForensic analysis of e-mail-Digital forensic life cycle-Network forensic-Setting up
a computer forensic Laboratory-Relevance of the OSI 7 Layer model to computer
Forensic-Computer forensic from compliance perspectives.
Cases.
Unit-IV
Forensic of Hand Held Devices-Understanding cell phone working
characteristics-Hand-Held devices and digital forensic- Toolkits for Hand-Held
device-Forensic of i-pod and digital music devices-Techno legal Challenges with
evidence from hand-held Devices.
Cases.

Unit-V
Cyber Security Organizational implications-cost of cybercrimes and IPR issuesWeb threats for organizations: the evils and Perils-Social media marketingSecurity and privacy Implications-Protecting people privacy in the organizationsForensic best practices for organizations.
Cases.
Text book:
Nina Godbole & Sunit Belapure Cyber Security, Wiley India, 2012.
Reference:
Harish Chander, cyber laws & IT protection, PHI learning pvt.ltd, 2012.
Dhiren R Patel, Information security theory & practice,PHI learning pvt
ltd,2010.
MS.M.K.Geetha & Ms.Swapne RamanCyber Crimes and Fraud Management,
MACMILLAN,2012.
Pankaj Agarwal : Information Security & Cyber Laws (Acme Learning), Excel,
2013.
Vivek Sood, Cyber Law Simplified, TMH, 2012.

You might also like