Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

in this file cybersecurity's are handwritten notes, Lecture notes of Cybercrime, Cybersecurity and Data Privacy

ybersecurity refers to the practice of protecting computer systems, networks, and data from digital attacks, theft, and damage. It involves implementing various technologies, practices, and policies to safeguard information and systems from cyber threats such as malware, phishing, ransomware, and data breaches1.

Typology: Lecture notes

2021/2022

Available from 11/13/2024

abhay-tiwari-4
abhay-tiwari-4 🇮🇳

5 documents

1 / 14

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe

Partial preview of the text

Download in this file cybersecurity's are handwritten notes and more Lecture notes Cybercrime, Cybersecurity and Data Privacy in PDF only on Docsity!

INTRODUCTION TO CYBER CRIME : Cybercrime- Definition and Origins of the word Cybercrime and Information Security, Who are Cybercriminals? Classifications of Cybercrimes, A Global Perspective on Cybercrimes, Cybercrime Era: Survival Mantra for the Netizens. Cyber offenses: How Criminals Plan the Attacks, Social Engineering, Cyber stalking, Cybercafe and Cybercrimes, Botnets: The Fuel for Cybercrime, Attack Vector. CYBER CRIME : Mobile and Wireless Devices-Introduction, Proliferation of Mobile and Wireless Devices, Trends in Mobility, Credit Card Frauds in Mobile and Wireless Computing Era, Security Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices, Authentication Service Security, Attacks on Mobile/Cell Phones, Mobile Devices: Security Implications for organizations, Organizational Measures for Handling Mobile, Organizational Security Policies and Measures in Mobile Computing Era. TOOLS AND METHODS USED IN CYBERCRIME : Introduction, Proxy Servers and Anonymizers, Phishing, Password Cracking, Keyloggers and Spywares, Virus and Worms, Trojan-horses and Backdoors, Steganography, DoS and DDoS At-tacks, SQL Injection, Buffer Overflow, Attacks on Wireless Networks. Phishing and Identity Theft: Introduction to Phishing, Identity Theft (ID Theft). UNDERSTANDING COMPUTER FORENSICS: Introduction, Digital Forensics Science, The Need for Computer Forensics, Cyber forensics and Digital Evidence, Forensics Analysis of E-Mail, Digital Forensics Life Cycle, Chain of Custody Concept, Network Forensics, Approaching a Computer Forensics Investigation. Forensics and Social Networking Sites: The Security/Privacy Threats, Challenges in Computer Forensics. INTRODUCTION TO SECURITY POLICIES AND CYBER LAWS : Need for An Information Security Policy, Introduction to Indian Cyber Law, Objective and Scope of the Digital Personal Data Protection Act 2023, Intellectual Property Issues, Overview of Intellectual Property Related Legislation in India, Patent, Copyright, Trademarks.