Page 161 - Microsoft Word - B.Tech. Course Structure (R20) WITH 163 CREDITS
P. 161
JNTUA College Of Engineering (Autonomous),Ananthapuramu
Department of Computer Science & Engineering
Cyber Security
(Open Elective Course– III)
Course Code: Semester VII(R20) L T P C : 3 0 0 3
Course Objectives:
• To introduce the concepts of Java.
• To Practice object-oriented programs and build java applications.
• To implement java programs for establishing interfaces.
• To implement sample programs for developing reusable software components.
• To establish database connectivity in java and implement GUI applications.
Course Outcomes:
CO1: Recognize the Java programming environment.
CO2: Select appropriate programming constructs to solve a problem.
CO3: Develop efficient programs using multithreading.
CO4: Design reliable programs using Java exception handling features.
CO5: Extend the programming functionality supported by Java.
UNIT-I: Cybercrime
Cybercrime and information security, Cybercriminals, Classifications of cybercrimes, Need for Cyberlaws
in Indian context, Legal perspectives of cybercrime, Indian perspective of cybercrimes, Cybercrime and the
Indian ITA 2000, Positive aspects and weak areas of ITA 2000, Amendments made in Indian ITA 2000 for
admissibility of e- records, Amendments to the Indian IT Act, Global perspective on cybercrimes,
Intellectual property in cyberspace, Ethical dimension of cybercrimes.
UNIT-II: Cyber Offenses
Cybercrime and information security, Cybercriminals, Classifications of cybercrimes, Need for Cyberlaws
in Indian context, Legal perspectives of cybercrime, Indian perspective of cybercrimes, Cybercrime and the
Indian ITA 2000, Positive aspects and weak areas of ITA 2000, Amendments made in Indian ITA 2000 for
admissibility of e- records, Amendments to the Indian IT Act, Global perspective on cybercrimes,
Intellectual property in cyberspace, Ethical dimension of cybercrimes.
UNIT-III: Cybercrime in Mobile and Wireless Devices
Proliferation of mobile and wireless devices, Trends in mobility, Credit card frauds in mobile and wireless
computing era, Security challenges posed by mobile devices, Registry settings for mobile devices,
Authentication service security, Attacks on mobile/cell phones, Security implications of mobile devices for
organizations, Organizational measures for handling mobile devices related security issues.
UNIT-VI: Tools and Methods Used in Cybercrime
Proxy servers and anonymizers, Password cracking, Keyloggers and spywares, Virus and worms, Trojan
horses and backdoors, Steganography, DoS and DDoS attacks, SQL Injection, Buffer Overflow, Attacks on
wireless networks
Mdv
Mdv