{"id":13989,"date":"2020-08-27T06:42:49","date_gmt":"2020-08-27T06:42:49","guid":{"rendered":"https:\/\/www.inspirenignite.com\/mh\/ilo7016-cyber-security-and-laws-syllabus-for-ee-7th-sem-2019-pattern-mumbai-university-institute-level-optional-course-1\/"},"modified":"2020-08-27T06:42:49","modified_gmt":"2020-08-27T06:42:49","slug":"ilo7016-cyber-security-and-laws-syllabus-for-ee-7th-sem-2019-pattern-mumbai-university-institute-level-optional-course-1","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/mh\/ilo7016-cyber-security-and-laws-syllabus-for-ee-7th-sem-2019-pattern-mumbai-university-institute-level-optional-course-1\/","title":{"rendered":"ILO7016: Cyber Security and Laws Syllabus for EE 7th Sem 2019 Pattern Mumbai University (Institute Level Optional Course-1)"},"content":{"rendered":"<p align=\"justify\">Cyber Security and Laws detailed syllabus scheme for Electrical Engineering (EE), 2019 regulation has been taken from the <a href=\"https:\/\/mu.ac.in\/syllabus\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">MU<\/a> official website and presented for the Bachelor of Engineering students. For Course Code, Course Title, Test 1, Test 2, Avg, End Sem Exam, Team Work, Practical, Oral, Total, and other information, do visit full semester subjects post given below. <\/p>\n<p align=\"justify\">For 7th Sem Scheme of Electrical Engineering (EE), 2019 Pattern, do visit <a href=\"mumbai-university-electrical-engineering-7th-sem-syllabus-2019-pattern\">EE 7th Sem Scheme, 2019 Pattern<\/a>. For the Institute Level Optional Course-1 scheme of 7th Sem 2019 regulation, refer to <a href=\"institute-level-optional-course-1-syllabus-scheme-for-ee-7th-sem-2019-pattern-mumbai-university\">EE 7th Sem Institute Level Optional Course-1 Scheme 2019 Pattern<\/a>. The detail syllabus for cyber security and laws is as follows.<\/p>\n<h2 align=\"center\">Cyber Security and Laws Syllabus for Electrical Engineering BE 7th Sem 2019 Pattern Mumbai University<\/h2>\n<h4>Course Objectives:<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete Syllabus, results, class timetable, and many other features kindly download the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.  <\/p>\n<h4>Course Outcomes:<\/h4>\n<p align=\"justify\">\nStudent will be able to..<\/p>\n<ul>\n<li>Understand the concept of cyber crime and its effect on outside world<\/li>\n<li>Interpret and apply IT law in various legal issues<\/li>\n<li>Distinguish different aspects of cyber law<\/li>\n<li>Apply Information Security Standards compliance during software design and development<\/li>\n<\/ul>\n<h4>Module 1<\/h4>\n<p align=\"justify\">\nIntroduction to Cybercrime: Cybercrime definition and origins of the world, Cybercrime and information security, Classifications of cybercrime, Cybercrime and the Indian ITA 2000, A global Perspective on cybercrimes. 4<\/p>\n<h4>Module 2<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete Syllabus, results, class timetable, and many other features kindly download the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.  <\/p>\n<h4>Module 3<\/h4>\n<p align=\"justify\">\nTools and Methods Used in Cyberline: Phishing, Password Cracking, Keyloggers and Spywares, Virus and Worms, Steganography, DoS and DDoS Attacks, SQL Injection, Buffer Over Flow, Attacks on Wireless Networks, Phishing, Identity Theft (ID Theft. 6<\/p>\n<h4>Module 4<\/h4>\n<p align=\"justify\">\nThe Concept of Cyberspace: E-Commerce , The Contract Aspects in Cyber Law ,The Security Aspect of Cyber Law ,The Intellectual Property Aspect in Cyber Law, The Evidence Aspect in Cyber Law , The Criminal Aspect in Cyber Law, Global Trends in Cyber Law , Legal Framework for Electronic Data Interchange Law Relating to Electronic Banking , The Need for an Indian Cyber Law<\/p>\n<h4>Module 5<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete Syllabus, results, class timetable, and many other features kindly download the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.  <\/p>\n<h4>Module 6<\/h4>\n<p align=\"justify\">\nInformation Security Standard compliances SOX, GLBA, HIPAA, ISO, FISMA, NERC, PCI. 6<\/p>\n<h4>Reference Books:<\/h4>\n<p align=\"justify\">\n<ol>\n<li>Nina Godbole, Sunit Belapure, Cyber Security, Wiley India, New Delhi<\/li>\n<li>The Indian Cyber Law by Suresh T. Vishwanathan; Bharat Law House New Delhi<\/li>\n<li>The Information technology Act, 2000; Bare Act- Professional Book Publishers, New Delhi.<\/li>\n<li>Cyber Law &amp; Cyber Crimes By Advocate Prashant Mali; Snow White Publications, Mumbai<\/li>\n<li>Nina Godbole, Information Systems Security, Wiley India, New Delhi<\/li>\n<li>Kennetch J. Knapp, Cyber Security &amp;Global Information Assurance Information Science Publishing.<\/li>\n<li>William Stallings, Cryptography and Network Security, Pearson Publication<\/li>\n<li>Websites for more information is available on : The Information Technology ACT, 2008- TIFR : https:\/\/www.tifrh.res.in<\/li>\n<li>Website for more information , A Compliance Primer for IT professional : https:\/\/www.sans.org\/reading-room\/whitepapers\/compliance\/compliance-primer-professionals-33538<\/li>\n<\/ol>\n<h4>Assessment<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete Syllabus, results, class timetable, and many other features kindly download the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.  <\/p>\n<h4>Theory Examination:<\/h4>\n<p align=\"justify\">\n<ol>\n<li>Question paper will comprise of 6 questions, each carrying 20 marks.<\/li>\n<li>Total four questions need to be solved.<\/li>\n<li>Q.1 will be compulsory, based on entire syllabus wherein sub questions of 2 to 5 marks will be asked.<\/li>\n<li>Remaining question will be randomly selected from all the modules.<\/li>\n<\/ol>\n<p align=\"justify\">For detail Syllabus of all subjects of Electrical Engineering (EE) 7th Sem 2019 regulation, visit <a href=\"..\/category\/electrical-engg+7th-sem\">EE 7th Sem Subjects <\/a>of 2019 Pattern.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Security and Laws detailed syllabus scheme for Electrical Engineering (EE), 2019 regulation has been taken from the MU official website and presented for the Bachelor of Engineering students. For [&hellip;]<\/p>\n","protected":false},"author":2351,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[78],"tags":[],"class_list":["post-13989","post","type-post","status-publish","format-standard","hentry","category-electrical-engg"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/posts\/13989","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/users\/2351"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/comments?post=13989"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/posts\/13989\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/media?parent=13989"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/categories?post=13989"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/tags?post=13989"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}