Connected successfully Announcements || SNS Courseware
Menu
Subject Details
Dept     : CSE
Sem      : 5
Regul    : 2019
Faculty : Jacquelin Anushya
phone  : NIL
E-mail  : janushya.p.cse@snsct.org
271
Page views
31
Files
1
Videos
3
R.Links

Icon
Announcements

  • Assignment

    Assignment topic is Introduction, Historical background of Cyber forensics, Digital Forensics Science, The Need for Computer Forensics and due date is 01-09-2024.

  • Assignment

    Assignment topic is CYBER SECURITY and due date is .

  • Lecture Notes

    Dear Students the Lecture Notes has been uploaded for the following topics:</br>CYBERCRIME: MOBILE AND WIRELESS DEVICES, </br>Proliferation of Mobile and Wireless Devices, </br>Trends in Mobility, </br>Credit card Frauds in Mobile and Wireless Computing Era, </br>Security Challenges Posed by Mobile Devices, </br>Registry Settings for Mobile Devices, </br>Authentication service Security, </br>Attacks on Mobile/Cell Phones, </br>Organizational security Policies and Measures in Mobile Computing Era,, </br>Laptops.

  • Question Bank

    Dear Students the Question Bank has been uploaded for the following topics:</br>Cyber forensics, </br>Cyber forensics, </br>CYBERCRIME: MOBILE AND WIRELESS DEVICES

  • Youtube Video

    Dear Students the Youtube Video has been uploaded for the following topics:</br>Crptography

  • Resource Link

    Dear Students the Resource Link has been uploaded for the following topics:</br>Cyber security fundamentals</br>cyber security</br>Ransomeware

  • Lecture Notes

    Dear Students the Lecture Notes has been uploaded for the following topics:</br>Network and Security concepts, </br>Cryptography, </br>Domain Name System (DNS) - Firewall, </br>Virtualization – Radio-Frequency Identification, </br>Attacker technique and motivation - proxy, </br>Tunnelling Technique, </br>Fraud techniques, </br>Threat Infrastructure., </br>Cyber forensics, </br>Historical background of Cyber forensics, </br>Digital Forensics Science, </br>The Need for Computer Forensics, </br>Cyber Forensics and Digital evidence, </br>Forensics Analysis of Email, </br>Digital Forensics Lifecycle, </br>Forensics Investigation, </br>Challenges in Computer Forensics

  • Puzzles

    Dear Students the Puzzles has been uploaded for the following topics:</br>CROSSWORD