CYBER SECURITY MCA 2nd Year 3rd Semester E-Book
E-Book PDF Download File Syllabus
Contents
UNIT– I PoliciesandSecurityEvolution: Introduction : Regulations. Cyber Security, Cyber Security policy, Domain of Cyber SecurityPolicy, Laws and CyberSecurityEvolution: Enterprise Policy,TechnologyOperations,TechnologyConfiguration, Strategy Versus, Policy, Cyber Security Evolution, Productivity, Internet, E-Commerce, Counter Measures,Challenges.
UNIT– II CyberSecurityObjectivesandGuidance: Security Objectives: Cyber Security Metrics, Security Management Goals, Counting Vulnerabilities, Security Frameworks, E-Commerce Systems, Industrial Control Systems, Personal Mobile Devices, Security Policy Objectives, Guidance for Decision Makers, Tone at the Top,PolicyasaProject. Catalog Approach: Cyber Security Management, Arriving at Goals, Cyber Security Documentation,theCatalogApproach,CatalogFormat,CyberSecurityPolicyTaxonomy.
UNIT– III PolicyCatalogandIssues : Cyber Security Policy Catalog : Cyber GovernanceIssues, Net Neutrality, Internet Names and Numbers,CopyrightandTrademarks,EmailandMessaging,CyberUserIssues,Malvertising, Impersonation. Cyber user and Conflict Issues : Appropriate Use, Cyber Crime, Geo location, Privacy, Cyber Conflict Issues,IntellectualpropertyTheft,CyberEspionage,CyberSabotage,CyberWelfare.
UNIT– IV CyberManagementandInfrastructuresIssues : Cyber Management Issues: Fiduciary Responsibility– Risk Management– Professional Certification–SupplyChain–Security Cyber Infrastructure Issues: Principles– Research and Development– Cyber Infrastructure Issue–Bankingandfinance–Healthcare–IndustrialControlsystems.
UNIT– V CaseStudy : Government’sApproachtoCyberSecurityPolicy: policydevelopmentintheU.SFederalGovernment. Espionage: Cybersecuritystrategy-Briefhistory-Public The rise of cyber crime- Espionage and Nation-state Actions-Policy response to growingEspionagethreats-CongressionalAction.