MCA

Cyber Laws and Ethics Syllabus for MCA 2nd Year 2nd Sem R19 Regulation JNTUH (Open Elective-I)

Cyber Laws and Ethics detailed Syllabus for Master of Computer Applications (MCA), R19 regulation has been taken from the JNTUH official website and presented for the students affiliated to JNTUH course structure. For Course Code, Subject Names, Theory Lectures, Tutorial, Practical/Drawing, Credits, and other information do visit full semester subjects post given below. The Syllabus PDF files can also be downloaded from the universities official website.

For all the other MCA 2nd Year 2nd Sem Syllabus for R19 Regulation JNTUH, visit Master of Computer Applications 2nd Year 2nd Sem R19 Scheme.

For all the (Open Elective-I) subjects refer to Open Elective-I Scheme. The detail syllabus for cyber laws and ethics is as follows.

Course Objectives:

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Course Outcomes:

  1. The students will understand the importance of professional practice, Law and Ethics in their personal lives and professional careers.
  2. The students will learn the rights and responsibilities as an employee, team member and a global citizen

Unit I

Introduction to Computer Security: Definition, Threats to security, Government requirements, Information Protection and Access Controls, Computer security efforts, Standards, Computer Security mandates and legislation, Privacy considerations, International security activity.

Unit II

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Unit III

Information security policies and procedures: Corporate policies- Tier 1, Tier 2 and Tier3 policies -process management-planning and preparation-developing policies-asset classification policydeveloping standards.

Unit IV

Information security: fundamentals-Employee responsibilities- information classificationInformation handling- Tools of information security- Information processing-secure program administration.

Unit V

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Reference Books:

  1. Debby Russell and Sr. G.T Gangemi, “Computer Security Basics (Paperback), 2ndEdition,O Reilly Media, 2006.
  2. Thomas R. Peltier, Information Security policies and procedures: A Practitioners Reference, 2nd Edition Prentice Hall, 2004.
  3. Kenneth J. Knapp, Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions, IGI Global, 2009.
  4. Thomas R Peltier, Justin Peltier and John blackley, Information Security Fundamentals, 2nd Edition, Prentice Hall, 1996
  5. Jonathan Rosenoer, Cyber law: the Law of the Internet, Springer-verlag, 1997
  6. James Graham, Cyber Security Essentials Averbach Publication T and F Group.

For detail Syllabus of all other subjects of 2nd Year 2nd Sem Master of Computer Applications, visit MCA 2nd Year 2nd Sem Syllabus Subjects.

For all MCA results, visit JNTUH MCA all years, and semester results from direct links.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.