Topic outline

  • General

    TEXT BOOKS :

    1. Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Prespectives, Nina Godbole and Sunil Belapure, First edition, 2011, Wiley INDIA.

    REFERENCE BOOKS:

    1. James Graham, Richard Howard and Ryan Otson, Cyber Security Essentials, First edition, 2011, CRC Press.

    2. Chwan-Hwa(John) Wu,J.David Irwin, Introduction to Cyber Security, First edition, 2013, CRC Press T&F Group.

  • UNIT-1

    Introduction to Cybercrime: Introduction, Cybercrime, and Information Security, Who are Cybercriminals, Classifications of Cybercrimes

  • UNIT-2

    Cyber Offenses: How Criminals Plan Them: Introduction, How Criminals plan the Attacks, Social Engineering, Cyber stalking, Cyber cafe and Cybercrimes, Botnets: The Fuel for Cybercrime, Attack Vector, and Cloud Computing. OWASP Web Goat.

  • UNIT-3

    Cybercrime: Mobile and Wireless Devices: Introduction, Proliferation of Mobile and Wireless Devices, Trends in Mobility, Credit card Frauds in Mobile and Wireless Computing Era, Security Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices, Authentication service Security, Attacks on Mobile/Cell Phones, Organizational Measures for Handling Mobile, Organizational Security Policies an Measures in Mobile Computing Era, Laptops.

  • UNIT-4

    Tools and Methods Used in Cybercrime: Introduction, Proxy Servers and Anonymizers, Phishing, Password Cracking, Keyloggers and Spywares, Virus and Worms, Trojan Horse and Backdoors, Steganography, DoS and DDoS attacks, SQL Injection, Buffer Overflow.

  • UNIT-5

    Cyber Security: Organizational Implications Introduction, Cost of Cybercrimes and IPR issues, Web threats for Organizations, Security and Privacy Implications, Social media marketing: Security Risks and Perils for Organizations, Social Computing and the associated challenges for Organizations.