{"id":13874,"date":"2020-08-27T06:41:31","date_gmt":"2020-08-27T06:41:31","guid":{"rendered":"https:\/\/www.inspirenignite.com\/mh\/ilo7016-cyber-security-and-laws-syllabus-for-it-7th-sem-2019-pattern-mumbai-university-institute-level-optional-course-1\/"},"modified":"2020-08-27T06:41:31","modified_gmt":"2020-08-27T06:41:31","slug":"ilo7016-cyber-security-and-laws-syllabus-for-it-7th-sem-2019-pattern-mumbai-university-institute-level-optional-course-1","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/mh\/ilo7016-cyber-security-and-laws-syllabus-for-it-7th-sem-2019-pattern-mumbai-university-institute-level-optional-course-1\/","title":{"rendered":"ILO7016: Cyber Security and Laws Syllabus for IT 7th Sem 2019 Pattern Mumbai University (Institute Level Optional Course-1)"},"content":{"rendered":"<p align=\"justify\">Cyber Security and Laws detailed syllabus scheme for Information Technology (IT), 2019 regulation has been taken from the <a href=\"https:\/\/mu.ac.in\/syllabus\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">MU<\/a> official website and presented for the Bachelor of Engineering students. For Course Code, Course Title, Test 1, Test 2, Avg, End Sem Exam, Team Work, Practical, Oral, Total, and other information, do visit full semester subjects post given below. <\/p>\n<p align=\"justify\">For 7th Sem Scheme of Information Technology (IT), 2019 Pattern, do visit <a href=\"mumbai-university-information-technology-7th-sem-syllabus-2019-pattern\">IT 7th Sem Scheme, 2019 Pattern<\/a>. For the Institute Level Optional Course-1 scheme of 7th Sem 2019 regulation, refer to <a href=\"institute-level-optional-course-1-syllabus-scheme-for-it-7th-sem-2019-pattern-mumbai-university\">IT 7th Sem Institute Level Optional Course-1 Scheme 2019 Pattern<\/a>. The detail syllabus for cyber security and laws is as follows.<\/p>\n<h2 align=\"center\">Cyber Security and Laws Syllabus for Information Technology BE 7th Sem 2019 Pattern Mumbai University<\/h2>\n<h4>Course Objectives:<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete Syllabus, results, class timetable, and many other features kindly download the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.  <\/p>\n<h4>Course Outcomes:<\/h4>\n<p align=\"justify\">\nLearner will be able to:<\/p>\n<ol>\n<li>Understand the concept of cybercrime and its effect on outside world<\/li>\n<li>Interpret and apply IT law in various legal issues<\/li>\n<li>Distinguish different aspects of cyber law<\/li>\n<li>Apply Information Security Standards compliance during software design and development<\/li>\n<\/ol>\n<h4>Module 1<\/h4>\n<p align=\"justify\">\nIntroduction to Cybercrime: Cybercrime definition and origins of the world, Cybercrime and information security, Classifications of cybercrime, Cybercrime and the Indian ITA 2000, A global Perspective on cybercrimes. 4<\/p>\n<h4>Module 2<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete Syllabus, results, class timetable, and many other features kindly download the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.  <\/p>\n<h4>Module 3<\/h4>\n<p align=\"justify\">\nTools and Methods Used in Cyber line Phishing, Password Cracking, Key loggers and Spywares, Virus and Worms, Steganography, DoS and DDoS Attacks, SQL Injection, Buffer Over Flow, Attacks on Wireless Networks, Phishing, Identity Theft (ID Theft. 6<\/p>\n<h4>Module 4<\/h4>\n<p align=\"justify\">\nThe Concept of Cyberspace E-Commerce , The Contract Aspects in Cyber Law ,The Security Aspect of Cyber Law ,The Intellectual Property Aspect in Cyber Law , The Evidence Aspect in Cyber Law , The Criminal Aspect in Cyber Law, Global Trends in Cyber Law , Legal Framework for Electronic Data Interchange Law Relating to Electronic Banking , The Need for an Indian Cyber Law 8<\/p>\n<h4>Module 5<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete Syllabus, results, class timetable, and many other features kindly download the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.  <\/p>\n<h4>Module 6<\/h4>\n<p align=\"justify\">\nInformation Security Standard compliances SOX, GLBA, HIPAA, ISO, FISMA, NERC, PCI. 6<\/p>\n<h4>Assessment:<\/h4>\n<p align=\"justify\">\nInternal: Assessment consists of two tests out of which; one should be compulsory class test and the other is either a class test or assignment on live problems or course project. <b>End Semester Theory Examination:<\/b> Some guidelines for setting up the question paper. Minimum 80% syllabus should be covered in question papers of end semester examination. In question paper weightage of each module will be proportional to number of respective lecture hours as mention in the syllabus.<\/p>\n<ol>\n<li>Question paper will comprise of total six question<\/li>\n<li>All question carry equal marks<\/li>\n<li>Questions will be mixed in nature (for example supposed Q.2 has part\n<ol type=\"i\">\n<li>from module 3 then part<\/li>\n<li>will be from any module other than module 3)<\/li>\n<\/ol>\n<\/li>\n<li>Only Four question need to be solved.<\/li>\n<\/ol>\n<h4>Reference Books:<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete Syllabus, results, class timetable, and many other features kindly download the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.<\/p>\n<p align=\"justify\">For detail Syllabus of all subjects of Information Technology (IT) 7th Sem 2019 regulation, visit <a href=\"..\/category\/it+7th-sem\">IT 7th Sem Subjects <\/a>of 2019 Pattern.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Security and Laws detailed syllabus scheme for Information Technology (IT), 2019 regulation has been taken from the MU official website and presented for the Bachelor of Engineering students. For [&hellip;]<\/p>\n","protected":false},"author":2351,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[84],"tags":[],"class_list":["post-13874","post","type-post","status-publish","format-standard","hentry","category-it"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/posts\/13874","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/users\/2351"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/comments?post=13874"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/posts\/13874\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/media?parent=13874"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/categories?post=13874"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/tags?post=13874"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}