Page 161 - Microsoft Word - B.Tech. Course Structure (R20) WITH 163 CREDITS
P. 161

JNTUA College Of Engineering (Autonomous),Ananthapuramu
                                 Department of Computer Science & Engineering
                                                         Cyber Security
                                                   (Open Elective Course– III)
                Course Code:                            Semester VII(R20)                    L T P C : 3 0 0 3

            Course Objectives:
               •  To introduce the concepts of Java.
               •  To Practice object-oriented programs and build java applications.
               •  To implement java programs for establishing interfaces.
               •  To implement sample programs for developing reusable software components.
               •  To establish database connectivity in java and implement GUI applications.

            Course Outcomes:
                CO1:  Recognize the Java programming environment.
                CO2:  Select appropriate programming constructs to solve a problem.
                CO3:  Develop efficient programs using multithreading.
                CO4:  Design reliable programs using Java exception handling features.
                CO5: Extend the programming functionality supported by Java.


           UNIT-I: Cybercrime

           Cybercrime and information security, Cybercriminals, Classifications of cybercrimes, Need for Cyberlaws
           in Indian context, Legal perspectives of cybercrime, Indian perspective of cybercrimes, Cybercrime and the
           Indian ITA 2000, Positive aspects and weak areas of ITA 2000, Amendments made in Indian ITA 2000 for
           admissibility  of  e-  records,  Amendments  to  the  Indian  IT  Act,  Global  perspective  on  cybercrimes,
           Intellectual property in cyberspace, Ethical dimension of cybercrimes.

           UNIT-II: Cyber Offenses
           Cybercrime and information security, Cybercriminals, Classifications of cybercrimes, Need for Cyberlaws
           in Indian context, Legal perspectives of cybercrime, Indian perspective of cybercrimes, Cybercrime and the
           Indian ITA 2000, Positive aspects and weak areas of ITA 2000, Amendments made in Indian ITA 2000 for
           admissibility  of  e-  records,  Amendments  to  the  Indian  IT  Act,  Global  perspective  on  cybercrimes,
           Intellectual property in cyberspace, Ethical dimension of cybercrimes.

           UNIT-III: Cybercrime in Mobile and Wireless Devices

           Proliferation of mobile and wireless devices, Trends in mobility, Credit card frauds in mobile and wireless
           computing  era,  Security  challenges  posed  by  mobile  devices,  Registry  settings  for  mobile  devices,
           Authentication service security, Attacks on mobile/cell phones, Security implications of mobile devices for
           organizations, Organizational measures for handling mobile devices related security issues.

           UNIT-VI: Tools and Methods Used in Cybercrime

           Proxy servers and anonymizers, Password cracking, Keyloggers and spywares, Virus and worms, Trojan
           horses and backdoors, Steganography, DoS and DDoS attacks, SQL Injection, Buffer Overflow, Attacks on
           wireless networks






                                                         Mdv
                                                          Mdv
   156   157   158   159   160   161   162   163   164   165   166