MCA

Cyber Laws and Ethics syllabus for MCA 2nd Year 2nd Sem R22 regulation JNTUH (Open Elective-1)

Cyber Laws and Ethics detailed syllabus for Master of Computer Applications (MCA), R22 regulation has been taken from the JNTUH official website and presented for the students affiliated to JNTUH course structure. For Course Code, Subject Names, Theory Lectures, Tutorial, Practical/Drawing, Credits, and other information do visit full semester subjects post given below. The syllabus PDF files can also be downloaded from the universities official website.

For all the other MCA 2nd Year 2nd Sem syllabus for R22 regulation JNTUH, visit Master of Computer Applications 2nd Year 2nd Sem R22 Scheme.

For all the (Open Elective-1) subjects refer to Open Elective-1 Scheme. The detail syllabus for cyber laws and ethics is as follows.

Course Objectives:

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Course Outcomes:

  • Understand the importance of professional practice, Law and Ethics in their personal lives and professional careers.
  • Learn the rights and responsibilities as an employee, team member and a global citizen
  • Understand the information processing and secure program administration
  • Understand the fundamentals of Organizational and Human security standards

Unit -I

Introduction to Computer Security: Definition, Threats to security, Government requirements, Information Protection and Access Controls, Computer security efforts, Standards, Computer Security mandates and legislation, Privacy considerations, International security activity.

Unit -II

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Unit -III

Information security policies and procedures: Corporate policies- Tier 1, Tier 2 and Tier3 policies – process management-planning and preparation-developing policies-asset classification policy- developing standards.

Unit -IV

Information security: fundamentals-Employee responsibilities- information classification- Information handling- Tools of information security- Information processing-secure program administration.

Unit -V

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Text Books:

  1. Debby Russell and Sr. G. T Gangemi, “Computer Security Basics (Paperback)’, 2nd Edition, O’ Reilly Media, 2006.
  2. Thomas R. Peltier, ‘Information Security policies and procedures: A Practitioner’s Reference’, 2nd Edition Prentice Hall, 2004.

Reference Books:

  1. Kenneth J. Knapp, ‘Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions’, IGI Global, 2009.
  2. Thomas R Peltier, Justin Peltier and John blackley,’ Information Security Fundamentals’, 2nd Edition, Prentice Hall, 1996
  3. Jonathan Rosenoer, ‘Cyber law: the Law of the Internet’, Springer-verlag, 1997 James Graham, ‘Cyber Security Essentials’ Averbach Publication T and F Group.

For detail syllabus of all other subjects of 2nd Year 2nd Sem Master of Computer Applications, visit MCA 2nd Year 2nd Sem syllabus subjects.

For all MCA results, visit JNTUH MCA all years, and semester results from direct links.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.