Introduction to Cybercrime and Laws
Introduction, Cybercrime: Definition and Origins of the word, Cybercrime and information Security, Who are Cybercriminals? Classifications of Cybercrimes. How Criminals Plan Them – Introduction, How Criminals Plan the Attacks, Cybercafé and Cybercrimes, Botnets, Attack Vector, The Indian IT ACT 2000 and amendments.
Tools and Methods used in Cybercrime
Introduction, Proxy Server and Anonymizers, Password Cracking, Key loggers and Spyware, Virus and Warms, Trojan and backdoors, Steganography, DOS and DDOS attack, SQLinjection, Buffer Overflow.
Phishing and Identity Theft
Introduction, Phishing – Methods of Phishing, Phishing Techniques, Phishing Toolkits andSpy Phishing. Identity Theft – PII, Types of Identity Theft, Techniques of ID Theft. Digital Forensics Science, Need for Computer Cyber forensics and Digital Evidence, Digital Forensics Life Cycle.
Cybercrime: Mobile and Wireless devices,
Introduction, proliferation of mobile and wireless devices, Trends in Mobility, credit card frauds in Mobile and wireless computing, Attacks on Mobile/cell phones.
Network Defense tools and block chain technology
Firewalls and Packet Filters: Firewall Basics, Packet Filter Vs Firewall, How a Firewall Protects a Network, Packet Characteristic to Filter, Stateless Vs Stateful Firewalls, Network Address Translation (NAT) and Port Forwarding, the basic of Virtual Private Networks, Linux Firewall, Windows Firewall, Snort: Intrusion Detection System, introduction to block chain technology (definition, tools used for implementation ) and its applications.
Question Paper Pattern:
• The Question paper will have TEN questions
• Each full question will be for 20 marks
• There will be 02 full questions (with maximum of four sub questions) from each module.
• Each full question will have sub questions covering all the topics under a module.
• The students will have to answer FIVE full questions, selecting one full question from each module.
Text Books:
1. Anti-Hacker Tool Kit (Indian Edition) by Mike Shema, Publication McGraw Hill. (Chapters: 2, 7, 8, 11)
2. Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives by Nina Godbole and SunitBelpure, Publication Wiley. (Chapters: 1.1, 1.2, 1.3, 1.4, 1.5, 2.1, 2.2, 2.5, 2.6, 2.7, 6.4, 5.2.1, 5.2.2, 5.2.5, 5.3.1, 5.3.2, 5.3.3, 4.2, 4.4, 4.5, 4.6, 4.7, 4.8, 4.9, 4.10, 4.11)
References
1. Marjie T. Britz - Computer Forensics and Cyber Crime: An Introduction - Pearson
2. Chwan-Hwa (John) Wu,J. David Irwin - Introduction to Computer Networks and Cyber securityCRCPress
3. Bill Nelson, Amelia Phillips, Christopher Steuart - Guide to Computer Forensics and InvestigationsCengage Learning
Course Outcomes:
At the end of the course students will be able to
CO1: Apply IT ACT (Cyber law) to the given case/problem and infer from the given case and analyze the gap if exists.
CO2: Analyze the working of cyber security principles in designing the system.
CO3: Analyze the given problem (cybercrime, vulnerability, threat), develop a strategy (physical, logical or administrative controls) to mitigate the problem and articulate consequences on Society and National Economy.
CO4: Examine relevant network defence / web application tool to solve given cyber security problem and evaluate its suitability.
CO5: Evaluate provisions available in Indian cyber law to handle infringement of intellectual property rights that happens on the cyber platform.