Cyber Security (CST-005/CST-006) UTU
- All Levels
- 5
- September 10, 2024
- Certificate of completion
About Course
Course Objectives: The objectives of this course are to:
- Familiarize with network security, network security threats, security services, and countermeasures.
- Be aware of computer security and Internet security.
- Study the defensive techniques against these attacks.
- To familiarize with cyber forensics, cybercrimes, and Cyberspace laws.
- Understand ethical laws of computers for different countries, Offences under cyberspace, and the Internet in India.
Course Outcomes: On successful completion of the course, the student will be able to:
- Understand cyber-attacks and types of cybercrimes, and familiarity with cyber forensics
- Realize the importance of cyber security and various forms of cyber-attacks and countermeasures.
- Get familiar with obscenity and pornography in cyberspace and understand the violation of the Right to privacy on the Internet.
- Appraise cyber laws and how to protect themselves and, ultimately, the entire Internet community from such attacks.
- Elucidate the various chapters of the IT Act 2008 power of the Central and State Governments to make rules under IT Act 2008.
UNIT – I: Introduction to Cyber Security:
Basic Cyber Security Concepts, layers of security, Vulnerability, threat, Harmful acts, the motive of attackers, active attacks, passive attacks, Software attacks, hardware attacks, Spectrum of attacks, Taxonomy of various attacks, IP spoofing, Methods of defense, Security Models, risk management, Cyber Threats-Cyber Warfare, Cyber Crime, Cyber terrorism, Cyber Espionage, etc., CIA Triad.
UNIT – II: Cyber Forensics:
Introduction to cyber forensics, Historical background of Cyber forensics, Digital Forensics Science, The Need for Computer Forensics, Cyber Forensics and Digital evidence, Forensics Analysis of Email, Digital Forensics Lifecycle, Forensics Investigation, Challenges in Computer Forensics, Special Techniques for Forensics Auditing.
UNIT – III: Cybercrime (Mobile and Wireless Devices):
Introduction, Proliferation of Mobile and Wireless Devices, Trends in Mobility, Credit card Frauds in the Mobile and Wireless Computing Era, Security Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices, Authentication service Security, Attacks on Mobile/Cell Phones, Mobile Devices: Security Implications for Organizations, Organizational Measures for Handling Mobile, Organizational Security Policies and Measures in Mobile Computing Era, Laptops and desktop.
UNIT – IV: Cyber Security (Organizational Implications):
Introduction cost of cybercrimes and IPR issues, web threats for organizations, security, and privacy implications, social media marketing: security risks and perils for organizations, social computing, and the associated challenges for organizations.
Cybercrime and Cyber terrorism:
Introduction, intellectual property in cyberspace, the ethical dimension of cybercrimes, the psychology, mindset and skills of hackers and other cybercriminals.
UNIT – V: Cyberspace and the Law &Miscellaneous provisions of IT Act.:
Introduction to Cyber Security Regulations, International Law. The INDIAN Cyberspace, National Cyber Security Policy. Internet Governance – Challenges and Constraints, Computer Criminals, Assets and Threats. Other offences under the Information Technology Act in India, The role of Electronic Evidence and the IT Act 2008 miscellaneous provisions.
Course Content
UNIT-I: Introduction to Cyber Security
-
Introduction to Cyber Security
-
Basic concepts of Cyber security
-
Layers of security
-
Vulnerability and Threats
-
Harmful acts & The motive of attackers
-
Active & Passive Attacks in Cyber Security
-
Software attacks in Cyber Security
-
Hardware Attacks in Cyber Security
-
Spectrum of attacks
-
Taxonomy of various attacks
-
IP spoofing
-
Methods of defense
-
Security Models in Cyber Security
-
Risk management in Cyber Security
-
Cyber Threats
-
Cyber Warfare
-
Cyber Crime
-
Cyber terrorism
-
Cyber Espionage
-
CIA Triad




UTU