Cyber Security (BT-409) - B Tech RGPV AICTE Flexible Curricula Notes

Thursday, March 26, 2020

Cyber Security (BT-409)
 B.Tech RGPV notes AICTE flexible curricula Bachelor of technology

rgpv bhopal, diploma, rgpv syllabus, rgpv time table, how to get transcript from rgpv, rgpvonline,rgpv question paper, rgpv online question paper, rgpv admit card, rgpv papers, rgpv scheme

B.Tech RGPV notes AICTE flexible curricula Bachelor of technology

Syllabus

UNIT 1:
Introduction- Introduction of Cyber Crime, Categorizing Cybercrime, Cybercrime Theory, Criminology perception of cyber criminals: hackers, computer intrusions and Attacks, Privacy, surveillance and protection, hiding crimes in cyberspace, cryptography, hacking vs cracking, privacy and security at risk in the global information society.

UNIT 2:
Application Security- Data Security, Security Technology-Firewall and VPNs, Intrusion Detection, Access Control. Security Threats -Viruses, Worms, Trojan Horse, Bombs, Trapdoors, Spoofs, E-mail Viruses, Macro Viruses, Malicious Software, Network and Denial of Services Attack, Security Threats to E-Commerce- Electronic Payment System, e- Cash, Credit/Debit Cards.

UNIT 3:
Cryptrography concepts and Techniques Plain text , cipher text, types – substitution ,transposition ,encryption, decryption , symmetric and asymmetric key cryptography algorithms, steganography .

UNIT 4:
Security Policies- Development of Policies, WWW Policies, Email Security Policies, Policy Review Process-Corporate Policies-Sample Security Policies, Publishing and Notification Requirement of the Policies.

UNIT 5:
Information Security Standards-ISO, IT Act, Copyright Act, Patent Law, IPR. Cyber Laws in India; IT Act 2000 Provisions, Intellectual Property Law: Copy Right Law, Software License, Semiconductor Law and Patent Law. Case Study – Corporate Security , Cyber cases


NOTES


Books Recommended

 Nina Godbole “ Cyber Security: Wiley.
 Michael E.Whitman and Herbert J Mattord "Principle of Information Security" Cengage
 William stallings “Cryptography and Network Security” PEARSON
 Charles P. Pfleeger, Shari Lawerance Pfleeger, “Analysing Computer Security”, Pearson Education India.
 Vinod V. Sople, “Managing Intellectual Property” PHI Learning Private Limited
 IT Act 2000 Details www.mit.gov.in
 Atul Khate, “Cryptrography and Network Security” ,TMH
 V.K.Pachghare, “Cryptography and information Security”, PHI Learning Private Limited, Delhi India.
 CHANDER, HARISH,” Cyber Laws And It Protection ” , PHI Learning Private Limited ,Delhi


You May Also Like

Follow Author Here:

Services

COMPLETELY FREE !!!

Yup, everything is free....

NO REGISTRATION REQUIRED

User doesn't have to register for accessing the files, all the files are free & universally accessible without any condition or restriction.

RESPONSIVE DESIGN & USER-FRIENDLY

Our webpages are responsive & user-friendly, which means it will automatically adjust according to your device screen size and you will find stuff without ant hustle.

DIRECT DOWNLOAD LINKS WITH HIGN SPEED

All the files are uploaded on our super-fast servers so that they can be easily downloaded with high speed.

NEW PROJECTS

For providing a better experience to our users we are developing our Android application, the application will have a lot of awesome features so stay tuned ;).

AWESOME SUPPORT TEAM

Our AI-powered Chatbots are always here to help you so, feel free to ask any question or report if you face any problem. Our team also monitors all chatbots traffic & they will contact you if chatbot fails to help.

Contact Us