Warning: session_start(): open(/var/cpanel/php/sessions/ea-php56/sess_493d59346f372f19b2a11199ac9df37a, O_RDWR) failed: No such file or directory (2) in /home/snscourseware/public_html/ct.snscourseware.org/syllabus.php on line 2

Warning: session_start(): Failed to read session data: files (path: /var/cpanel/php/sessions/ea-php56) in /home/snscourseware/public_html/ct.snscourseware.org/syllabus.php on line 2
Connected successfully
Warning: Undefined variable $hostname in /home/snscourseware/public_html/ct.snscourseware.org/syllabus.php on line 18
Syllabus || SNS Courseware
Subject Details
Dept     : CSE
Sem      : 5
Regul    : 2019
Faculty : Jacquelin Anushya
phone  : NIL
E-mail  : janushya.p.cse@snsct.org
272
Page views
31
Files
1
Videos
3
R.Links

Icon
Syllabus

UNIT
1
CYBER SECURITY FUNDAMENTALS

Network and Security concepts – Information Assurance – Cryptography – Domain Name System (DNS) – Firewall – Virtualization – Radio-Frequency Identification. Attacker technique and motivation – proxy – tunnelling Technique – fraud techniques – Threat Infrastructure.

UNIT
2
CYBER FORESENICS

Introduction, Historical background of Cyber forensics, Digital Forensics Science, The Need for Computer Forensics, Cyber Forensics and Digital evidence, Forensics Analysis of Email, Digital Forensics Lifecycle, Forensics Investigation, Challenges in Computer Forensics.

UNIT
3
CYBERCRIME: MOBILE AND WIRELESS DEVICES

Introduction, Proliferation of Mobile and Wireless Devices, Trends in Mobility, Credit card Frauds in Mobile and Wireless Computing Era, Security Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices, Authentication service Security, Attacks on Mobile/Cell Phones, Organizational security Policies and Measures in Mobile Computing Era, Laptops.

UNIT
4
DEFENSE AND ANALYSIS TECHNIQUES

Memory Forensics – Honeypots – Malicious Code Naming – Automated Malicious Code Analysis System – passive and active analysis – Intrusion Detection System.

UNIT
5
CYBER SECURITY: ORGANIZATIONAL IMPLICATIONS

Introduction, cost of cybercrimes and IPR issues, web threats for organizations, security and privacy implications, social media marketing: security risks and perils for organizations, social computing and the associated challenges for organizations Case Study: Ransomware Attack( WannaCry, Petya, Sodinokibi, Ryuk)

Reference Book:

1 RaefMeeuwisse, Cyber Security for Beginners, Cyber Simplicity Ltd., 2017. 2 William Stallings, "Cryptography and Network Security: Principles and Practice.” Fifth Edition Prentice Hall 2011. 3 William R. Cheswick and Steven M. Bellovin, "Firewalls and Internet Security: Repelling the Wily Hacker", Second Edition, Addison-Wesley, 2003. 4 Charles P. Pfleeger, "Security in Computing", Fifth Edition, Pearson Education 2015.

Text Book:

1.James Graham, Richard Howard and Ryan Otson,” Cyber Security Essentials”, First Edition, CRC Press, 2011. 2.Nina Godbole and SunitBelpure, “Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives”, Wiley 2011.