Cyber Laws and Ethics detailed syllabus for Master of Computer Applications (MCA), R22 regulation has been taken from the JNTUH official website and presented for the students affiliated to JNTUH course structure. For Course Code, Subject Names, Theory Lectures, Tutorial, Practical/Drawing, Credits, and other information do visit full semester subjects post given below. The syllabus PDF files can also be downloaded from the universities official website.
For all the other MCA 2nd Year 2nd Sem syllabus for R22 regulation JNTUH, visit Master of Computer Applications 2nd Year 2nd Sem R22 Scheme.
For all the (Open Elective-1) subjects refer to Open Elective-1 Scheme. The detail syllabus for cyber laws and ethics is as follows.
Course Objectives:
For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier..
Course Outcomes:
- Understand the importance of professional practice, Law and Ethics in their personal lives and professional careers.
- Learn the rights and responsibilities as an employee, team member and a global citizen
- Understand the information processing and secure program administration
- Understand the fundamentals of Organizational and Human security standards
Unit -I
Introduction to Computer Security: Definition, Threats to security, Government requirements, Information Protection and Access Controls, Computer security efforts, Standards, Computer Security mandates and legislation, Privacy considerations, International security activity.
Unit -II
For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier..
Unit -III
Information security policies and procedures: Corporate policies- Tier 1, Tier 2 and Tier3 policies – process management-planning and preparation-developing policies-asset classification policy- developing standards.
Unit -IV
Information security: fundamentals-Employee responsibilities- information classification- Information handling- Tools of information security- Information processing-secure program administration.
Unit -V
For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier..
Text Books:
- Debby Russell and Sr. G. T Gangemi, “Computer Security Basics (Paperback)’, 2nd Edition, O’ Reilly Media, 2006.
- Thomas R. Peltier, ‘Information Security policies and procedures: A Practitioner’s Reference’, 2nd Edition Prentice Hall, 2004.
Reference Books:
- Kenneth J. Knapp, ‘Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions’, IGI Global, 2009.
- Thomas R Peltier, Justin Peltier and John blackley,’ Information Security Fundamentals’, 2nd Edition, Prentice Hall, 1996
- Jonathan Rosenoer, ‘Cyber law: the Law of the Internet’, Springer-verlag, 1997 James Graham, ‘Cyber Security Essentials’ Averbach Publication T and F Group.
For detail syllabus of all other subjects of 2nd Year 2nd Sem Master of Computer Applications, visit MCA 2nd Year 2nd Sem syllabus subjects.
For all MCA results, visit JNTUH MCA all years, and semester results from direct links.