Professional Documents
Culture Documents
3SP1126
Teaching Scheme:
1 lecture per week * no sessional
Component
3SP1126 Cyber-Security
Continuous
Evaluation
Weighta Component-distribution
ge
1
Assignmen
t
0.5
Syllabus:
Need for Information and Cyber Security: Role of Cyber Security Professionals, Role of novices in Cyber Security
Basics of Internet: How TCP/IP and the World Wide Web works?
Hackers Community: Invading PCs, Script Kiddies, Personal Hacker Protection
Impact of Spyware, Worms and Viruses: Spyware, Morphing Spyware, Home Page and Search Page Hijackers,
Introduction to Dialers, Keyloggers and Rootkits, Protection against Spyware
Zombies: Zombies and Bots, Trojan Horses, Protection against Zombies and Trojans
Websites and Privacy: Cookies, Web Bugs, Activity Tracking
Internet Search: Working of Google and Knowledge of Google
Phishing Attacks: Working of Phishing, Protection against Phishing Attacks
Security in browsers: Exploiting Browsers, Protection against Browser Based Attacks
Wi-Fi Protection: Working, Invading Wi-Fi Networks, Role of Hotspots, Evil Twin Attacks, War Drivers, Working of Wireless
Network Protection
Spam: Dangers of Spam, hiding spam identity, Anti-Spam Software
Denial of Service Attacks and Protection: Working of DoS Attacks, Protection against Denial-of-Service Attacks
Hacking Cell Phones: Dangers of Cell Phone Hacking, Bluesnarfing
Case Study: Financial Implications of Zombies, Spyware, Phishing, Nigerian 419 Spam, Money Trails of Internet Access
References
How Personal and Internet Security Work by Preston Galla, Que Publications
Computer Security Concepts, Issues and Implementation by Alfred Basta and Wolf Halton, Cengage Learning
Related online resources
Objective:
This subject is focused on giving an insight into various types of Security hazards posed by
the Internet Access. Many websites fascinate the individuals (Novices and Professionals) to
view several pages and gather information which might be very tempting. This intentionally
or unintentionally invites unnecessary problems in their personal computers or the
computers of companies to which they belong to. The individuals are also affected by the
same since their information is being placed in the public domain. Hence the subject is very
important since here we introduce some basic methodology using which every person can
protect himself / herself during internet access.
Learning Outcome:
By the end of this course, student will be able to:
Realize the need for Cyber Security
Understand the need for Security in day to day communications
Understand the vulnerabilities in the Network and Computer System
Protect themselves from the attacks
Cyber Security
Action against cyber crime
TCP/IP
Addressing Schemes
Protocol
LayerComments
Application Protocols
Transmission Control
Protocol Layer
Hardware Layer