{"id":14745,"date":"2020-08-27T07:25:38","date_gmt":"2020-08-27T07:25:38","guid":{"rendered":"https:\/\/www.inspirenignite.com\/mh\/ilo7016-cyber-security-and-laws-syllabus-for-ec-7th-sem-2019-pattern-mumbai-university-institute-level-optional-course-1\/"},"modified":"2020-08-27T07:25:38","modified_gmt":"2020-08-27T07:25:38","slug":"ilo7016-cyber-security-and-laws-syllabus-for-ec-7th-sem-2019-pattern-mumbai-university-institute-level-optional-course-1","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/mh\/ilo7016-cyber-security-and-laws-syllabus-for-ec-7th-sem-2019-pattern-mumbai-university-institute-level-optional-course-1\/","title":{"rendered":"ILO7016: Cyber Security and Laws Syllabus for EC 7th Sem 2019 Pattern Mumbai University (Institute Level Optional Course-1)"},"content":{"rendered":"<p align=\"justify\">Cyber Security and Laws detailed syllabus scheme for Electronics &amp; Telecommunication Engineering (EC), 2019 regulation has been taken from the <a href=\"https:\/\/mu.ac.in\/syllabus\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">MU<\/a> official website and presented for the Bachelor of Engineering students. For Course Code, Course Title, Test 1, Test 2, Avg, End Sem Exam, Team Work, Practical, Oral, Total, and other information, do visit full semester subjects post given below. <\/p>\n<p align=\"justify\">For 7th Sem Scheme of Electronics &amp; Telecommunication Engineering (EC), 2019 Pattern, do visit <a href=\"mumbai-university-electronics-telecommunication-engineering-7th-sem-syllabus-2019-pattern\">EC 7th Sem Scheme, 2019 Pattern<\/a>. For the Institute Level Optional Course-1 scheme of 7th Sem 2019 regulation, refer to <a href=\"institute-level-optional-course-1-syllabus-scheme-for-ec-7th-sem-2019-pattern-mumbai-university\">EC 7th Sem Institute Level Optional Course-1 Scheme 2019 Pattern<\/a>. The detail syllabus for cyber security and laws is as follows.<\/p>\n<h2 align=\"center\">Cyber Security and Laws Syllabus for Electronics &amp; Telecommunication Engineering BE 7th Sem 2019 Pattern Mumbai University<\/h2>\n<h4>Course Objectives:<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete Syllabus, results, class timetable, and many other features kindly download the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.  <\/p>\n<h4>Course Outcomes:<\/h4>\n<p align=\"justify\">\nAfter successful completion of the course student will be able to<\/p>\n<ul>\n<li>Understand the concept of cybercrime and its effect on outside world<\/li>\n<li>Interpret and apply IT law in various legal issues<\/li>\n<li>Distinguish different aspects of cyber law<\/li>\n<li>Apply Information Security Standards compliance during software design and development<\/li>\n<\/ul>\n<h4>Module 1<\/h4>\n<p align=\"justify\">\nIntroduction to Cybercrime 04<\/p>\n<ol>\n<li>Cybercrime definition and origins of the world, Cybercrime and information security, Classifications of cybercrime, Cybercrime and the<\/li>\n<\/ol>\n<h4>Module 2<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete Syllabus, results, class timetable, and many other features kindly download the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.  <\/p>\n<h4>Module 3<\/h4>\n<p align=\"justify\">\nTools and Methods Used in Cyberline 06<\/p>\n<ol>\n<li>Phishing, Password Cracking, Key loggers and Spywares, Virus and Worms, Steganography, DoS and DDoS Attacks, SQL Injection, Buffer Over Flow, Attacks on Wireless Networks, Phishing, Identity Theft (ID Theft.<\/li>\n<\/ol>\n<h4>Module 4<\/h4>\n<p align=\"justify\">\nThe Concept of Cyberspace 08<\/p>\n<ol>\n<li>E-Commerce , The Contract Aspects in Cyber Law ,The Security Aspect of Cyber Law ,The Intellectual Property Aspect in Cyber Law , The Evidence Aspect in Cyber Law , The Criminal Aspect in Cyber Law, Global Trends in Cyber Law , Legal Framework for Electronic Data Interchange Law Relating to Electronic Banking , The Need for an Indian Cyber Law<\/li>\n<\/ol>\n<h4>Module 5<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete Syllabus, results, class timetable, and many other features kindly download the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.  <\/p>\n<h4>Module 6<\/h4>\n<p align=\"justify\">\nInformation Security Standard compliances 06<\/p>\n<ol>\n<li>SOX, GLBA, HIPAA, ISO, FISMA, NERC, PCI.<\/li>\n<\/ol>\n<h4>Reference Books:<\/h4>\n<p align=\"justify\">\n<ol>\n<li>Nina Godbole, Sunit Belapure, Cyber Security, Wiley India, New Delhi<\/li>\n<li>The Indian Cyber Law by Suresh T. Vishwanathan; Bharat Law House New Delhi<\/li>\n<li>The Information technology Act, 2000; Bare Act- Professional Book Publishers, New Delhi.<\/li>\n<li>Cyber Law &amp; Cyber Crimes By Advocate Prashant Mali; Snow White Publications, Mumbai<\/li>\n<li>Nina Godbole, Information Systems Security, Wiley India, New Delhi<\/li>\n<li>Kennetch J. Knapp, Cyber Security &amp;Global Information Assurance Information Science Publishing.<\/li>\n<li>William Stallings, Cryptography and Network Security, Pearson Publication<\/li>\n<li>Websites for more information is available on : The Information Technology ACT, 2008-TIFR : https:\/\/www.tifrh.res.in<\/li>\n<li>Website for more information , A Compliance Primer for IT professional https:\/\/www.sans.org\/reading-room\/whitepapers\/compliance\/compliance-primer-professionals-33538<\/li>\n<\/ol>\n<h4>Internal Assessment:<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete Syllabus, results, class timetable, and many other features kindly download the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.  <\/p>\n<h4>End Semester Examination:<\/h4>\n<p align=\"justify\">\n<ol>\n<li>Question paper will comprise of 6 questions, each carrying 20 marks.<\/li>\n<li>The students need to solve total 4 questions.<\/li>\n<li>Question No.1 will be compulsory and based on entire syllabus.<\/li>\n<li>Remaining question (Q.2 to Q.6) will be selected from all the modules.<\/li>\n<\/ol>\n<p align=\"justify\">For detail Syllabus of all subjects of Electronics &amp; Telecommunication Engineering (EC) 7th Sem 2019 regulation, visit <a href=\"..\/category\/ete+7th-sem\">EC 7th Sem Subjects <\/a>of 2019 Pattern.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Security and Laws detailed syllabus scheme for Electronics &amp; Telecommunication Engineering (EC), 2019 regulation has been taken from the MU official website and presented for the Bachelor of Engineering [&hellip;]<\/p>\n","protected":false},"author":2351,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[81],"tags":[],"class_list":["post-14745","post","type-post","status-publish","format-standard","hentry","category-ete"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/posts\/14745","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/users\/2351"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/comments?post=14745"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/posts\/14745\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/media?parent=14745"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/categories?post=14745"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/tags?post=14745"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}