Documente Academic
Documente Profesional
Documente Cultură
Tech)
Class: VIII Sem. B.Tech.
Branch: Computer Engg.
Schedule per Week
Practical Hrs: 2
Examination Time = Four (2) Hours
Maximum Marks = 50
[Sessional/Mid-term (30) & End-term (20)]
-------------------------------------------------------------------------------------------------------------------------Course Objectives:
1. Study the acts dealing with the cyber-crimes in different countries viz., India, USA, European
Union.
2. Study the Intellectual Property Rights and the acts dealing with these rights.
3. Study the Copyright acts with reference to publishing the material on the web.
Students are expected to prepare a seminar report of 15-20 pages and required to deliver a seminar
of 8-10 minutes on following topics:
39.
40.
41.
42.
43.
44.
45.
46.
47.
48.
49.
50.
51.
52.
53.
54.
55.
56.
57.
58.
59.
60.
61.
62.
63.
64.
65.
66.
67.
68.
Terrorism
Cyber warfare practice and theory
Information security practice
Cyber conflict - Neural linguistic
techniques in cyber warfare
Case studies of cyber-attacks in modern
conflicts
Human Factors
Physical security
SMEs - Small-to-medium Size
Enterprises Security model
Security implications of virtualized
machines and services
The Resilience and Susceptibility of
"Service Oriented Architectures"
(SOAs)
Hacking
Information Assurance
Malware
Cyber-fraud
Risk Management
Collaborative decision making
Security policy
Firewalls
Phishing and spam
Current Anti-Virus Technologies
Mobile Virus
RFID Virus
SQL Infections
Data Loss
Data Integration
ISO 27001
The politics of cyber warfare, including
conceptual cyber arms agreements
Information security management
Patriotic hackers as an extension of state
power
Theoretical cyber conflict scenarios
69. Cyber-terrorism
70. Counter-terrorism security policies,
procedures and legislation
71. Critical national infrastructure
protection
72. e-Health systems as part of a national
critical infrastructure
73. Information security governance and
management
74. Biometrics
75. Attribution of threat actors
76. Cryptography
77. Wireless Threats
78. Threat Agents Insider threats
79. Particle swarm data mining
80. Virtual Intrusion Detection
81. National security policy
82. Acute situational awareness
83. Aircraft Environment
84. Digital forensics
85. Network anomaly detection models
86. Corporate defense mechanisms
87. Security for small to medium enterprises
88. Information, computer and network
security
89. Security of the virtual worlds
90. Unidirectional linguistic steganography
91. IT auditing and compliance
92. Information Security Architecture
93. Artificial immune recognition system
security infrastructure
94. Public Key Infrastructure
95. Cyber-exploitation execution and
detection
96. Dual-use technologies
97. Potential military uses of cyber attacks
98. Cyber conflict frameworks
99. Principles of i-Warfare