Cyber Security (BT-409)

rgpv bhopal, diploma, rgpv syllabus, rgpv time table, how to get transcript from rgpv, rgpvonline,rgpv question paper, rgpv online question paper, rgpv admit card, rgpv papers, rgpv scheme
B.Tech RGPV notes AICTE flexible curricula Bachelor of technology
Syllabus
UNIT 1:
Introduction- Introduction of Cyber Crime, Categorizing Cybercrime, Cybercrime Theory,
Criminology perception of cyber criminals: hackers, computer intrusions and Attacks, Privacy,
surveillance and protection, hiding crimes in cyberspace, cryptography, hacking vs cracking,
privacy and security at risk in the global information society.
UNIT 2:
Application Security- Data Security, Security Technology-Firewall and VPNs, Intrusion
Detection, Access Control. Security Threats -Viruses, Worms, Trojan Horse, Bombs, Trapdoors,
Spoofs, E-mail Viruses, Macro Viruses, Malicious Software, Network and Denial of Services
Attack, Security Threats to E-Commerce- Electronic Payment System, e- Cash, Credit/Debit
Cards.
UNIT 3:
Cryptrography concepts and Techniques
Plain text , cipher text, types – substitution ,transposition ,encryption, decryption , symmetric and
asymmetric key cryptography algorithms, steganography .
UNIT 4:
Security Policies- Development of Policies, WWW Policies, Email Security Policies, Policy
Review Process-Corporate Policies-Sample Security Policies, Publishing and Notification
Requirement of the Policies.
UNIT 5:
Information Security Standards-ISO, IT Act, Copyright Act, Patent Law, IPR. Cyber Laws in
India; IT Act 2000 Provisions, Intellectual Property Law: Copy Right Law, Software License,
Semiconductor Law and Patent Law.
Case Study – Corporate Security , Cyber cases
NOTES
- Unit 1
- Unit 2
- Unit 3
- Unit 4
- Unit 5
Books Recommended
Nina Godbole “ Cyber Security: Wiley.
Michael E.Whitman and Herbert J Mattord "Principle of Information Security" Cengage
William stallings “Cryptography and Network Security” PEARSON
Charles P. Pfleeger, Shari Lawerance Pfleeger, “Analysing Computer Security”, Pearson
Education India.
Vinod V. Sople, “Managing Intellectual Property” PHI Learning Private Limited
IT Act 2000 Details www.mit.gov.in
Atul Khate, “Cryptrography and Network Security” ,TMH
V.K.Pachghare, “Cryptography and information Security”, PHI Learning Private Limited, Delhi
India.
CHANDER, HARISH,” Cyber Laws And It Protection ” , PHI Learning Private Limited ,Delhi
You May Also Like
- BT-401 - Mathematics- III
- IT-402 - Computer Architecture
- IT-403 - Analysis and Design of Algorithm
- IT-404 - Analog & Digital Communication
- IT-405 - Data base Management System
- IT-406 - Introduction to MATLAB, Scilab/Web Design
- IT-407 - Dot Net
- BT-408 - 90 hrs Internship based on using various software’s –Internship -II