Posts

Showing posts from August, 2022

Progress Report Diary

 Progress Report Diary for Major Project Sem VII and Sem VIII Progress Report Diary

Cyber Security and Laws: Important Questions

 Important Questions: Cyber Security & Laws Ch 1 Introduction to Cybercrime Classify the cybercrimes and explain any one briefly. Write brief note on: Cyber-terrorism. Give a classification of cybercrime and cybercriminals. Explain in detail Cyber defamation and various types of criminals. Ch 2 Cyber offenses & Cybercrime Discuss basic security precautions to be taken to safeguard Laptops and wireless devices. Compare Vishing, Phishing and Smishing in cyber security. How criminals plan the attack? Discuss various steps involved. Compare active attacks vs Passive attacks. Describe in detail about how criminals plan attacks? What are botnets? How it is exploit by attacker to cause cyber-attack. What do you understand by Social Engineering? Give its classification. Explain various challenges posed by mobile devices and their counter measures. Explain cloud computing with cyber-attacks. What do you mean by cyber stal...

Module 03 Tools and Methods Used in Cyber line Presentation

Module 03  Tools and Methods Used in Cyber line Tools and Methods Used in Cyber line Phishing, Password Cracking, Key loggers and Spywares, Virus and Worms, Steganography, DoS and DDoS Attacks, SQL Injection, Buffer Over Flow, Attacks on Wireless Networks, Phishing, Identity Theft (ID Theft) Module 03  Tools and Methods Used in Cyber line Module 03  Phishing and Identity Theft

University Question Papers

 University Question Papers Dec 2019

Log Book

 Log Book for ROSP Log Book

Assignment 3 : Quizz

  Assignment 3 : Quizz Click the below link to start online quizz. Assignment 3 Quizz

Assignment 2 : Quizz

 Assignment 2 : Quizz Click the below link to start online quizz. Assignment 2 Quizz

IT Act 2000 and its Amendments

  IT Act 2000 and its Amendments Click below link for IT Act from Drive Information Technology Act 2000 and 2008 Click below link for IT Act from Govt of India Website Ministry of Electronics & Information Technology, Government of India

Module 02 Cyber offenses & Cybercrime Presentation

 Module 02  Cyber offenses & Cybercrime  Cyber offenses & Cybercrime: How criminal plan the attacks, Social Engg, Cyber stalking, Cyber café and Cybercrimes, Bot nets, Attack vector, Cloud computing, Proliferation of Mobile and Wireless Devices, Trends in Mobility, Credit Card Frauds in Mobile and Wireless Computing Era, Security Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices, Authentication Service Security, Attacks on Mobile/Cell Phones, Mobile Devices: Security Implications for Organizations, Organizational Measures for Handling Mobile, Devices-Related Security Issues, Organizational Security Policies and Measures in Mobile Computing Era, Laptops Module 02 Cyber offenses & Cybercrime Presentation

Module 1 Introduction to Cybercrime Presentations

 Module 1 Introduction to Cybercrime Presentations Module 01 Introduction to Cybercrime: Cybercrime definition and origins of the world, Cybercrime and information security, Classifications of cybercrime, Cybercrime and the Indian ITA 2000, A global Perspective on cybercrimes. Module 1 Introduction to Cybercrime Presentations

Assignment 1: Cyber Security and Laws

Image
 Assignment 1: Cyber Security and Laws

Books: Cyber Security and Laws

 Books: Cyber Security and Laws Reference Books:  1. Nina Godbole, Sunit Belapure, Cyber Security, Wiley India, New Delhi 2. The Indian Cyber Law by Suresh T. Vishwanathan; Bharat Law House New Delhi 3. The Information technology Act, 2000; Bare Act- Professional Book Publishers, New Delhi. 4. Cyber Law & Cyber Crimes By Advocate Prashant Mali; Snow White Publications, Mumbai 5. Nina Godbole, Information Systems Security, Wiley India, New Delhi 6. Kennetch J. Knapp, Cyber Security &Global Information Assurance Information Science Publishing. 7. William Stallings, Cryptography and Network Security, Pearson Publication 8. Websites for more information is available on : The Information Technology ACT, 2008-TIFR : https://www.tifrh.res.in 9. Website for more information , A Compliance Primer for IT professional : https://www.sans.org/reading-room/whitepapers/compliance/compliance-primer-professionals- 33538

Syllabus: Cyber Security and Laws

Course Code: ILO7016   Course Name: Cyber Security and Laws  Credits: 03 Objectives: 1. To understand and identify different types cybercrime and cyber law 2. To recognized Indian IT Act 2008 and its latest amendments 3. To learn various types of security standards compliances Outcomes:  Learner will be able to… 1. Understand the concept of cybercrime and its effect on outside world 2. Interpret and apply IT law in various legal issues 3. Distinguish different aspects of cyber law 4. Apply Information Security Standards compliance during software design and development Module 01 Introduction to Cybercrime: Cybercrime definition and origins of the world, Cybercrime and information security, Classifications of cybercrime, Cybercrime and the Indian ITA 2000, A global Perspective on cybercrimes. Module 02 Cyber offenses & Cybercrime: How criminal plan the attacks, Social Engg, Cyber stalking, Cyber café and Cybercrimes, Bot nets, Attack vector, Cloud computing, Proli...