Connected successfully
Introduction to Cybercrime, Classifications of Cyber Crimes, Local and Global perspectives on Cybercrime, Cyber offences, Cyber stalking, Cybercrime and cloud computing, cybercrimes through hand held devices.
Cyber Security Vulnerabilities: Overview, vulnerabilities in software, System administration, Complex Network Architectures, Open Access to Organizational Data, Weak Authentication, Unprotected Broadband communications, Poor Cyber Security Awareness. Cyber Security Safeguards- Overview, Access control, Audit, Authentication, Biometrics, Cryptography, Deception, Denial of Service Filters, Ethical Hacking, Firewalls, Intrusion Detection Systems, Response, Scanning, Security policy, Threat Management .
Securing Web Application, Services and Servers Introduction, Basic security for HTTP Applications and Services, Basic Security for SOAP Services, Identity Management and Web Services, Authorization Patterns, Security Considerations, Challenges.
Intrusion Detection and Prevention Intrusion, Physical Theft, Abuse of Privileges, Unauthorized Access by Outsider, Malware infection, Intrusion detection and Prevention Techniques, Anti-Malware software, Network based Intrusion detection Systems, Network based Intrusion Prevention Systems, Host based Intrusion prevention Systems, Security Information Management, Network Session Analysis, System Integrity Validation
Cyberspace and the Law Introduction: Cyber Security Regulations, Roles of International Law, the state and Private Sector in Cyberspace, Cyber Security Standards. The INDIAN Cyberspace, National Cyber Security Policy.
Reference Book:
1 K.P. Soman, ShyamDiwakar and V. Ajay, “Insight into Data mining Theory and Practiceâ€, Easter Economy Edition, Prentice Hall of India, 2006. (Unit II & III) 2 G. K. Gupta, “Introduction to Data Mining with Case Studiesâ€, Easter Economy Edition, Prentice Hall of India, 2006. (Unit II & IV) 3 Berson, Alex & Smith, Stephen J, Data Warehousing, Data Mining, and OLAP, TMH Pub. Co. Ltd, New Delhi, 2012 (Unit I & III)
Text Book:
Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives by Nina Godbole and SunitBelpure, Publication WileyIndian Print 2014 Anti-Hacker Tool Kit (Indian Edition) by Mike Shema, Publication McGraw Hill