Introduction, Classifications of Cybercrimes: E-Mail Spoofing, Spamming, Cyber defamation, Industrial Spying/Industrial Espionage, Hacking, Software Piracy, Password Sniffing, Credit Card Frauds, Cyberstalking, Botnets, Phishing, Pharming, Man-in-theMiddle attack, Password Cracking, Keyloggers and Spywares, Virus and Worms, Trojan Horses and Backdoors, DoS and DDoS Attacks, SQL Injection, Buffer Overflow, Malware, Ransomware, Types of Identity Theft, Techniques of ID Theft, Cyber terrorism, Browser Attacks, Reverse Engineering, Cross site scriptin
Introduction to Cyber Security, Cyber Security Goals, Cyber Security policy, Domain of Cyber Security Policy, Elements, Cyber Security Evolution, Implementing Hardware Based Security, Software Based Firewalls, Security Standards, Assessing Threat Levels, Forming an Incident Response Team, Reporting Cybercrime, Difference between cyber forensics and cyber security.
The Internet of Things: An Overview, The “Internet” of “Things”, The Technology of the Internet of Things, Importance of Internet of Things, Understanding Smart Devices, Design Principles for Connected Device, Network Connections, Traditional Network, Transferring Data Over a Network, Understanding IP Address, Wireless Technologies, Wi-Fi, Bluetooth, Cellular Networks, Mesh Networks.
Internet Principles, Internet Communications, IP, TCP, The IP Protocol Suite (TCP/IP), UDP, IP addresses, DNS, Static IP address Assignment, Dynamic IP Address Assignment, IPv6, MAC Address, TCP and UDP Ports, HTTP Ports other Common Ports, Application Layer Protocols.
Prototyping: Sketching, Familiarity, Cost versus Ease of Prototyping, Prototypes and Production, Embedded Platform, Physical Prototypes and Mass Personalization, Introduction to Cloud, Climbing into the Cloud, Open Source, Closed Source, Mixing Open and Closed Source.
- Unit 1
- Unit 2
- Unit 3
- Unit 4
- Unit 5
1. Nina Godbole and Sunit Belpure , Cyber Security Understanding Cyber Crimes,
Computer Forensics and Legal Perspectives, Wiley
2. Jennifer L. Bayuk, J. Healey, P. Rohmeyer, Marcus Sachs, Jeffrey Schmidt, Joseph Weiss Cyber Security Policy Guidebook, John Wiley & Sons 2012.
3. McEwen Adrian and Cassimally Hakim, “Designing the Internet of Things” Wiley India Pvt. Ltd., 2016.
4. Miller Michael, “The Internet of Things”, Pearson India Education Services Pvt. Ltd., 2015.