Course Objectives:

  1. To understand cyber crime and its laws.
  2. To work with tools and methods used in cyber crime.
  3. To understand the life cycle of digital forensics.
  4. To learn and understand web threats, challenges and protection policies.

Unit I

Introduction To Cybercrime:- Cybercrime and Information Security, Classificationsof Cybercrimes, The need for Cyber laws, The Indian IT Act Challenges to Indian Law and Cybercrime Scenario in India, Weakness in Information Technology Act and it consequences, Digital Signatures and the Indian IT Act, Cybercrime and Punishment; Technology, Students and Cyber law; Survival tactics for the Netizens, Cyber-offenses: Cybers talking, Cyber cafe and Cyber crimes, Botnets, Attack Vector, Cloud Computing;

Click on any topic to read about the topic.

Unit II

Tools And Methods Used In Cybercrime:- Proxy Servers and Anonymizers, Phishingand identity theft, Password Cracking, Keyloggers and Spywares, Virus and Worms, Trojan Horses and Backdoors, Stenography, DoS and DDoS Attacks, SQL Injection, Buffer Overflow; Cybercrime: Mobile and Wireless Devices: Trends in Mobility, Attacks on Wireless Networks, Credit Card Frauds in Mobile and Wireless Computing Era, Security Challenges, Registry Settings for Mobile Devices, Authentication Service   Security Attacks on Mobile/Cell Phones

Click on any topic to read about the topic.

Unit III

Understanding Computer Forensics:- The Need for Computer Forensics, Cyberforensics and Digital Evidence, Forensics Analysis of E-Mail, Digital Forensics Life Cycle, Chain of Custody Concept, Network Forensics, Computer Forensics and Stenography, Relevance of the OSI 7 Layer Model to Computer Forensics, Forensics and Social Networking Sites: The Security/Privacy Threats, Challenges in Computer Forensics, Forensics Auditing, Anti forensics.

Click on any topic to read about the topic.

Unit IV

Cyber security Organizational Implications:- Cost of Cybercrimes and IPR Issues,Web Threats for Organizations, Security and Privacy Implications from Cloud Computing, Social Media Marketing, Social Computing and the Associated Challenges for Organizations, Protecting People’s Privacy in the Organization, Organizational Guidelines for Internet Usage, Safe Computing Guidelines and Computer Usage Policy, Incident Handling, Forensics Best Practices, Media and Asset Protection, Importance of Endpoint Security in Organizations.

Click on any topic to read about the topic.


  1. “Cyber             Security  Understanding   Cyber  Crimes,   Computer  Forensics   and                    Legal Perspectives”, Nina Godbole, Sunit Belapur, Wiley India Publications, April, 2011.

Course Outcomes:  After successful completion of the course, students will be able to:-

  1. Demonstrate cyber crime its laws and related terms.
  2. Work with SQL injection, DOS attacks etc.
  3. Explain computer forensic, Network forensic cyber forensic.
  4. Understand safe computing guidelines, usage policies and incident handling.
error: You can only copy the programs code and output from this website. You are not allowed to copy anything else.