MCA

Cyber Security syllabus for MCA 2nd Year 1st Sem R22 regulation JNTUH (Professional Elective-2)

Cyber Security detailed syllabus for Master of Computer Applications (MCA), R22 regulation has been taken from the JNTUH official website and presented for the students affiliated to JNTUH course structure. For Course Code, Subject Names, Theory Lectures, Tutorial, Practical/Drawing, Credits, and other information do visit full semester subjects post given below. The syllabus PDF files can also be downloaded from the universities official website.

For all the other MCA 2nd Year 1st Sem syllabus for R22 regulation JNTUH, visit Master of Computer Applications 2nd Year 1st Sem R22 Scheme.

For all the (Professional Elective-2) subjects refer to Professional Elective-2 Scheme. The detail syllabus for cyber security is as follows.

Course Objectives:

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Course Outcomes:

  • Analyze and evaluate the cyber security needs of an organization.
  • Understand Cyber Security Regulations and Roles of International Law
  • Design and develop a security architecture for an organization.
  • Understand fundamental concepts of data privacy attacks

Unit -I

Introduction to Cyber Security: Basic Cyber Security Concepts, layers of security, Vulnerability, threat, Harmful acts, Internet Governance – Challenges and Constraints, Computer Criminals, CIA Triad, Assets and Threat, motive of attackers, active attacks, passive attacks, Software attacks, hardware attacks, Cyber Threats-Cyber Warfare, Cyber Crime, Cyber terrorism, Cyber Espionage, etc., Comprehensive Cyber Security Policy.

Unit -II

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Unit -III

Cybercrime: Mobile and Wireless Devices: Introduction, Proliferation of Mobile and Wireless Devices, Trends in Mobility, Credit card Frauds in Mobile and Wireless Computing Era, Security Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices, Authentication service Security, Attacks on Mobile/Cell Phones, Organizational security Policies and Measures in Mobile Computing Era, Laptops.

Unit -IV

Cyber Security: Organizational Implications: Introduction, cost of cybercrimes and IPR issues, web threats for organizations, security and privacy implications, social media marketing: security risks and perils for organizations, social computing and the associated challenges for organizations

Unit -V

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Text Books:

  1. Nina Godbole and Sunit Belpure, Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives, Wiley
  2. B.B. Gupta, D.P. Agrawal, Haoxiang Wang, Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives, CRC Press, ISBN 9780815371335,2018.

Reference Books:

  1. Cyber Security Essentials, James Graham, Richard Howard and Ryan Otson, CRC Press.
  2. Introduction to Cyber Security, Chwan-Hwa(john) Wu,J. David Irwin, CRC Press T and F Group.

For detail syllabus of all other subjects of 2nd Year 1st Sem Master of Computer Applications, visit MCA 2nd Year 1st Sem syllabus subjects.

For all MCA results, visit JNTUH MCA all years, and semester results from direct links.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.