Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

PRE-REQUISITES:Nil

CY20902 CYBER CRIME AND CYBER LAWS 3 0 0 3


COURSE OBJECTIVES
To enable the students to
 identify the different types of cybercrimes and cybercriminals.
 know about various cyber offenses.
 learn about different tools and methods used in cyber line.
 discuss on security aspects of cyber law.
 gain insights of IT act.

UNIT I INTRODUCTION TO CYBERCRIME 9


Cybercrime definition and origins, Cybercrime and information security, Classifications of cybercrime,
Types of Cybercriminals, A global Perspective on cybercrimes.

UNIT II CYBER OFFENSES 9


How criminal plan the attacks, Cyber stalking, Cyber café and Cybercrimes, Bot nets, Proliferation of
Mobile and Wireless Devices, Credit Card Frauds , Security Challenges Posed by Mobile Devices,
Registry Settings for Mobile Devices, Authentication Service Security, Attacks on Mobile/Cell Phones.

UNIT III TOOLS AND METHODS USED IN CYBER LINE 9


Phishing, Password Cracking, Key loggers and Spywares, Virus and Worms, Steganography, DoS and
DDoS Attacks, SQL Injection, Buffer Over Flow,Attacks on Wireless Networks, Phishing, Identity Theft
(ID Theft)

UNIT IV CYBER LAWS 9


The Security Aspect of Cyber Law ,The Intellectual Property Aspect in Cyber Law, The Evidence Aspect
in Cyber Law , The Criminal Aspect in Cyber Law,Global Trends in Cyber Law , Legal Framework for
Electronic Data, Interchange Law Relating to Electronic Banking , The Need for an Indian Cyber Law

UNIT V THE INDIAN IT ACT 9

Cyber Crime and Criminal Justice: Penalties, Adjudication and Appeals Under the IT Act, 2000, IT and its
Amendments, Consequences of not addressing the weaknesses in IT Act.

TOTAL PERIODS 45
COURSE OUTCOMES
At the end of this course, the students will be able to

● explain the different types of cybercrimes and cybercriminals.


● describe the various cyber offenses.
● elucidate about different tools and methods used in cyber line.
● summarize on security aspects of cyber law.
● know the importance of IT act.
TEXTBOOKS
1. Nina Godbole, Sunit Belapure, Cyber Security, Wiley India, New Delhi.
2. The Indian Cyber Law by Suresh T. Vishwanathan; Bharat Law House New Delhi.

REFERENCES

1. The Information technology Act, 2000; Bare Act- Professional Book Publishers, New Delhi.
2. Cyber Law & Cyber Crimes By Advocate Prashant Mali; Snow White Publications, Mumbai.
3. Nina Godbole, Information Systems Security, Wiley India, New Delhi.
4. Kennetch J. Knapp, Cyber Security &Global Information Assurance Information Science
Publishing.

CO/PO MAPPING

(1,2,3 indicates the strength of correlation) 3 – Strong, 2 – Medium, 1 – Less

PO PSO

CO PSO PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
1 2

CO1 3 2 1 3 2 1 - - - 1 1 2 3 2

CO2 2 2 1 3 2 2 - - - 2 1 1 3 2

CO3 3 2 3 3 2 2 2 - 1 2 - 1 3 1

CO4 2 2 3 2 2 2 2 - 1 2 - 1 3 3

CO5 3 2 2 1 2 1 1 - 1 2 - 2 1 1

You might also like