Sunteți pe pagina 1din 2

8CS7 Seminar on Information Technology Acts (Common to Comp. Engg. & Info.

Tech)
Class: VIII Sem. B.Tech.
Branch: Computer Engg.
Schedule per Week
Practical Hrs: 2
Examination Time = Four (2) Hours
Maximum Marks = 50
[Sessional/Mid-term (30) & End-term (20)]
-------------------------------------------------------------------------------------------------------------------------Course Objectives:
1. Study the acts dealing with the cyber-crimes in different countries viz., India, USA, European
Union.
2. Study the Intellectual Property Rights and the acts dealing with these rights.
3. Study the Copyright acts with reference to publishing the material on the web.
Students are expected to prepare a seminar report of 15-20 pages and required to deliver a seminar
of 8-10 minutes on following topics:

1. Cyber-crimes in different countries


2. Intellectual Property Rights
3. Copyright acts with reference to
publishing the material on the web
4. Electronic documents, evidences, the
approved algorithms etc.
5. Investigation methods
6. Cyber security and laws of India and
other countries.
7. Data protection.
8. Privacy concerns on cyber space.
9. Crimes on social media.
10. Protection of children and women on
cyber space.
11. Investigation of cybercrimes issues and
concerns
12. Cyber forensic technical cum legal
perspective
13. Evidentiary issues in the area of cyber
security
14. Judiciary on cyber security
15. Laws and concerns in relation to any Selected/ Specific forms of cyber-crimes
[such as hacking, cyber pornography,
identity theft, spoofing, cyber stalking,
software piracy, etc]

16. E-security in banking system.


17. E- Commerce and cyber security
concerns
18. E-Governance and cyber security
concerns.
19. Providing / developing an alternative
law / policy framework to secure cyber
space Etc.
20. Cyber Terrorism
21. Cyber Warfare
22. Electronic civil disobedience
23. Ethical, political, legal, and social issues
relating to security
24. Governance and security
25. Hacking
26. Hacktivism
27. Homeland security
28. Impact of new security technologies
29. Information Management
30. Information Security
31. Internet and controls
32. Law Enforcement
33. National identification schemes
34. National security
35. Privacy
36. Protecting society
37. Rights of the individual
38. Social engineering

39.
40.
41.
42.
43.
44.
45.
46.
47.
48.

49.
50.
51.
52.
53.
54.
55.
56.
57.
58.
59.
60.
61.
62.
63.
64.
65.
66.
67.
68.

Terrorism
Cyber warfare practice and theory
Information security practice
Cyber conflict - Neural linguistic
techniques in cyber warfare
Case studies of cyber-attacks in modern
conflicts
Human Factors
Physical security
SMEs - Small-to-medium Size
Enterprises Security model
Security implications of virtualized
machines and services
The Resilience and Susceptibility of
"Service Oriented Architectures"
(SOAs)
Hacking
Information Assurance
Malware
Cyber-fraud
Risk Management
Collaborative decision making
Security policy
Firewalls
Phishing and spam
Current Anti-Virus Technologies
Mobile Virus
RFID Virus
SQL Infections
Data Loss
Data Integration
ISO 27001
The politics of cyber warfare, including
conceptual cyber arms agreements
Information security management
Patriotic hackers as an extension of state
power
Theoretical cyber conflict scenarios

69. Cyber-terrorism
70. Counter-terrorism security policies,
procedures and legislation
71. Critical national infrastructure
protection
72. e-Health systems as part of a national
critical infrastructure
73. Information security governance and
management
74. Biometrics
75. Attribution of threat actors
76. Cryptography
77. Wireless Threats
78. Threat Agents Insider threats
79. Particle swarm data mining
80. Virtual Intrusion Detection
81. National security policy
82. Acute situational awareness
83. Aircraft Environment
84. Digital forensics
85. Network anomaly detection models
86. Corporate defense mechanisms
87. Security for small to medium enterprises
88. Information, computer and network
security
89. Security of the virtual worlds
90. Unidirectional linguistic steganography
91. IT auditing and compliance
92. Information Security Architecture
93. Artificial immune recognition system
security infrastructure
94. Public Key Infrastructure
95. Cyber-exploitation execution and
detection
96. Dual-use technologies
97. Potential military uses of cyber attacks
98. Cyber conflict frameworks
99. Principles of i-Warfare

S-ar putea să vă placă și