CYBER SECURITY
Unit :-1
INTRODUCTION TO CYBER CRIME
AKTU BCC-301
BCC-401
(3rd Sem)
(4th Sem)
The word “Cybercrime” was first coined in 1982 by
William Gibson but it gained popularity in 1984 through
his novel 'Neuromancer'.
Akash Arora (1999) was one of the earliest examples
of cybercrime in India. (Yahoo Case)
According to the 2020 Cost of Cybercrime Study by
Accenture, the average number of security breaches
experienced by organizations increased by 11%
between 2018 and 2019. Cybercrime is also becoming
more sophisticated, with the emergence of new
threats such as ransomware and advanced
persistent threats (APTs)
Cybercrime Era: Survival Mantra for the Netizens
CYBER SECURITY
BCC-301
BCC-401
(3rd Sem)
(4th Sem)
AKTU Unit:-2
CYBER CRIME
Mobile and Wireless Devices :-
SmartPhones combine the best
aspects of mobile and wireless
technologies and blend them into
a useful business tool.
Cyber Security
Unit :- 3
TOOLS AND METHODS USED IN CYBERCRIME
Cyber Security
Unit :- 4
Understanding Computer Forensics
Cyber Security
Unit :- 5
INTRODUCTION TO SECURITY POLICIES AND CYBER LAWS
Important Topics
Unit :- 1
AKTU
1. Cyber Crime - Definition + Origin + Types
2. Social Engineering - Example + Classification
3. How Criminals Plan the Attacks
4. Cyber Stalking - Types + Working
5. Botnets and Attack Vector + Diagram
> Long Questions :
Cyber Security
> Two Marks Questions :
1. Information Security (CIA Triad)
2. Cyber Criminals
3. A Global Perspective on Cyber Crime
4. Survival Mantra for Netizens
5. Cyber Cafe and its Safety Tips
Unit :- 2
1. Proliferation of Mobile and Wireless Devices
2. Credit Card Frauds in Mobile and Wireless Devices
3. Attacks on Mobile / Security Challenges
4. Mobile Devices : Security Implications for Organizations
5. Organizational Measures for Mobile
1. Mobile and Wireless Devices
2. Trends in Mobility
3. Mobile Viruses
> Two Marks Questions :
Unit :- 3
1. Proxy Server and Anonymizers
2. Phising and Identity Theft
3. Virus and Worms / DoS and DDoS Attacks
4. SQL Injection and Buffer Overflow
1. Introduction - Stages of Attack
2. Steganography
3. Password Cracking / Keyloggers / Spywares
4. Trojan Horses and Backdoors
> Two Marks Questions :
Unit :- 4
1. Computer Forensics - Definition + Function + Needs
2. Forensic Analysis of E-Mail and Tools
3. Digital Forensic Life Cycle / Chain of Custody
4. Challenges in Computer Foresics
1. Digital Forensics
2. Digital Evidence
3. Network Forensics
4. Forensics and Social Networking Sites
> Two Marks Questions :
1. Information Security Policy and its Needs
2. Cyber Law - Importance
3. The Digital Personal Data Protection Bill 2023
4. Intellectual Property and its Legislation and Issues
1. Indian Cyber Law
2. Patents and Copyrights
3. Trademark
> Two Marks Questions :
Unit :- 5
THANK YOU!!
I-TECH WORLD (AKTU)
JOIN TELEGRAM GROUP FOR HAND
WRITTEN NOTES , QUANTUMS AND
OTHER STUDY MATERIAL.
LINK GIVEN IN DESCRIPTION BOX

Cyber Security All 5 Unit Notes.pptx.pdf

  • 1.
    CYBER SECURITY Unit :-1 INTRODUCTIONTO CYBER CRIME AKTU BCC-301 BCC-401 (3rd Sem) (4th Sem)
  • 6.
    The word “Cybercrime”was first coined in 1982 by William Gibson but it gained popularity in 1984 through his novel 'Neuromancer'. Akash Arora (1999) was one of the earliest examples of cybercrime in India. (Yahoo Case)
  • 15.
    According to the2020 Cost of Cybercrime Study by Accenture, the average number of security breaches experienced by organizations increased by 11% between 2018 and 2019. Cybercrime is also becoming more sophisticated, with the emergence of new threats such as ransomware and advanced persistent threats (APTs)
  • 19.
    Cybercrime Era: SurvivalMantra for the Netizens
  • 41.
    CYBER SECURITY BCC-301 BCC-401 (3rd Sem) (4thSem) AKTU Unit:-2 CYBER CRIME Mobile and Wireless Devices :- SmartPhones combine the best aspects of mobile and wireless technologies and blend them into a useful business tool.
  • 75.
    Cyber Security Unit :-3 TOOLS AND METHODS USED IN CYBERCRIME
  • 108.
    Cyber Security Unit :-4 Understanding Computer Forensics
  • 134.
    Cyber Security Unit :-5 INTRODUCTION TO SECURITY POLICIES AND CYBER LAWS
  • 158.
    Important Topics Unit :-1 AKTU 1. Cyber Crime - Definition + Origin + Types 2. Social Engineering - Example + Classification 3. How Criminals Plan the Attacks 4. Cyber Stalking - Types + Working 5. Botnets and Attack Vector + Diagram > Long Questions : Cyber Security
  • 159.
    > Two MarksQuestions : 1. Information Security (CIA Triad) 2. Cyber Criminals 3. A Global Perspective on Cyber Crime 4. Survival Mantra for Netizens 5. Cyber Cafe and its Safety Tips
  • 160.
    Unit :- 2 1.Proliferation of Mobile and Wireless Devices 2. Credit Card Frauds in Mobile and Wireless Devices 3. Attacks on Mobile / Security Challenges 4. Mobile Devices : Security Implications for Organizations 5. Organizational Measures for Mobile 1. Mobile and Wireless Devices 2. Trends in Mobility 3. Mobile Viruses > Two Marks Questions :
  • 162.
    Unit :- 3 1.Proxy Server and Anonymizers 2. Phising and Identity Theft 3. Virus and Worms / DoS and DDoS Attacks 4. SQL Injection and Buffer Overflow 1. Introduction - Stages of Attack 2. Steganography 3. Password Cracking / Keyloggers / Spywares 4. Trojan Horses and Backdoors > Two Marks Questions :
  • 163.
    Unit :- 4 1.Computer Forensics - Definition + Function + Needs 2. Forensic Analysis of E-Mail and Tools 3. Digital Forensic Life Cycle / Chain of Custody 4. Challenges in Computer Foresics 1. Digital Forensics 2. Digital Evidence 3. Network Forensics 4. Forensics and Social Networking Sites > Two Marks Questions :
  • 164.
    1. Information SecurityPolicy and its Needs 2. Cyber Law - Importance 3. The Digital Personal Data Protection Bill 2023 4. Intellectual Property and its Legislation and Issues 1. Indian Cyber Law 2. Patents and Copyrights 3. Trademark > Two Marks Questions : Unit :- 5
  • 165.
    THANK YOU!! I-TECH WORLD(AKTU) JOIN TELEGRAM GROUP FOR HAND WRITTEN NOTES , QUANTUMS AND OTHER STUDY MATERIAL. LINK GIVEN IN DESCRIPTION BOX