Cyber Security & IOT (EC-8004) - B.E RGPV CBCS & CBGS Scheme Notes -->
Cyber Security & IOT (EC-8004)
Cyber Security & IOT (EC-8004) RGPV notes CBGS Bachelor of engineering

rgpv bhopal, diploma, rgpv syllabus, rgpv time table, how to get transcript from rgpv, rgpvonline,rgpv question paper, rgpv online question paper, rgpv admit card, rgpv papers, rgpv scheme

RGPV notes CBGS Bachelor of engineering

Syllabus

UNIT 1:
Introduction, Classifications of Cybercrimes: E-Mail Spoofing, Spamming, Cyber defamation, Industrial Spying/Industrial Espionage, Hacking, Software Piracy, Password Sniffing, Credit Card Frauds, Cyberstalking, Botnets, Phishing, Pharming, Man-in-theMiddle attack, Password Cracking, Keyloggers and Spywares, Virus and Worms, Trojan Horses and Backdoors, DoS and DDoS Attacks, SQL Injection, Buffer Overflow, Malware, Ransomware, Types of Identity Theft, Techniques of ID Theft, Cyber terrorism, Browser Attacks, Reverse Engineering, Cross site scripting

UNIT 2:
Introduction to Cyber Security, Cyber Security Goals, Cyber Security policy, Domain of Cyber Security Policy, Elements, Cyber Security Evolution, Implementing Hardware Based Security, Software Based Firewalls, Security Standards, Assessing Threat Levels, Forming an Incident Response Team, Reporting Cybercrime, Difference between cyber forensics and cyber security.

UNIT 3:
The Internet of Things: An Overview, The “Internet” of “Things”, The Technology of the Internet of Things, Importance of Internet of Things, Understanding Smart Devices, Design Principles for Connected Device, Network Connections, Traditional Network, Transferring Data Over a Network, Understanding IP Address, Wireless Technologies, Wi-Fi, Bluetooth, Cellular Networks, Mesh Networks.

UNIT 4:
Internet Principles, Internet Communications, IP, TCP, The IP Protocol Suite (TCP/IP), UDP, IP addresses, DNS, Static IP address Assignment, Dynamic IP Address Assignment, IPv6, MAC Address, TCP and UDP Ports, HTTP Ports other Common Ports, Application Layer Protocols.

UNIT 5:
Prototyping: Sketching, Familiarity, Cost versus Ease of Prototyping, Prototypes and Production, Embedded Platform, Physical Prototypes and Mass Personalization, Introduction to Cloud, Climbing into the Cloud, Open Source, Closed Source, Mixing Open and Closed Source.


NOTES by Ayush Sinha (Student)


Books Recommended

1. Nina Godbole and Sunit Belpure , Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives, Wiley
2. Jennifer L. Bayuk, J. Healey, P. Rohmeyer, Marcus Sachs, Jeffrey Schmidt, Joseph Weiss Cyber Security Policy Guidebook, John Wiley & Sons 2012.
3. McEwen Adrian and Cassimally Hakim, “Designing the Internet of Things” Wiley India Pvt. Ltd., 2016.
4. Miller Michael, “The Internet of Things”, Pearson India Education Services Pvt. Ltd., 2015.


You May Also Like

Follow Author Here:

Services

COMPLETELY FREE !!!

Yup, everything is free....

NO REGISTRATION REQUIRED

User doesn't have to register for accessing the files, all the files are free & universally accessible without any condition or restriction.

RESPONSIVE DESIGN & USER-FRIENDLY

Our webpages are responsive & user-friendly, which means it will automatically adjust according to your device screen size and you will find stuff without ant hustle.

DIRECT DOWNLOAD LINKS WITH HIGN SPEED

All the files are uploaded on our super-fast servers so that they can be easily downloaded with high speed.

NEW PROJECTS

For providing a better experience to our users we are developing our Android application, the application will have a lot of awesome features so stay tuned ;).

AWESOME SUPPORT TEAM

Our AI-powered Chatbots are always here to help you so, feel free to ask any question or report if you face any problem. Our team also monitors all chatbots traffic & they will contact you if chatbot fails to help.

Contact Us