Look Inside

Cyber Security (Sem 5, Karnataka Univ)

275.00

This textbook has been designed as per the New Model Curriculum designed under National Education Policy (NEP) applicable to B.Sc./BCA/BSc-Data Science/BCA Artificial Intelligence/MCA syllabus 2023-24 Course of various Universities and autonomous college in Karnataka.

The book is designed as a self-contained, comprehensive classroom text book, consisting of numerous examples and case studies. Moreover, the chapters are discussed well in a simple language with figures and examples to give an illustrated study of this subject systematically. The book also provides real time case studies for the better understanding.

The chapters are arranged according to the B.Sc./BCA/BSc-Data Science/BCA Artificial Intelligence/MCA syllabus. The topics covered are: concept of Cyber security and issues and challenges associated with it. cybercrimes, their nature, legal remedies and as to how report the crimes through available platforms and procedures. Concept of various privacy and security concerns on online social media and understand the reporting procedure of inappropriate content, underlying legal aspects and best practices for the use of social media platforms.

Contents –

1. Introduction to Cyber Security
1.1 Cyberspace
1.1.1 History of Cyberspace
1.2 Overview of Computer and Web Technology
1.2.1 Web Technology
1.2.2 Classification of Web Technology
1.3 Architecture of Cyberspace
1.4 Communication and Web Technology
1.4.1 Web Browser
1.5 Internet
1.5.1 Basic Services of Internet
1.5.2 World Wide Web (WWW)
1.6 Working of World Wide Web (WWW)
1.7 Advent of Internet
1.7.1 History of the Internet
1.7.2 Working of Internet
1.7.3 Father of Internet : Tim Berners – Lee
1.8 Internet Infrastructure for Data Transfer and Governance
1.8.1 Governance of Internet Resources
1.8.2 Internet Names and Numbers
1.8.3 Governance of Internet Infrastructure
1.9 Internet Society
1.9.1 Main Goal of Internet Society
1.9.2 Activity of Internet Society
1.10 Regulation of Cyberspace
1.10.1 Need of Regulating Cyperspace
1.10.2 Practical Problems in Extending the Traditional Laws to Cyberspace
1.11 Cyber Security
1.11.1 Types of Cyber Security
1.11.2 Importance of Cyber Security
1.11.3 Cyber Security Goals
1.11.4 Types of Cyber Security Threats
1.11.5 The System Affected by Security Breaches and Attacks
1.11.6 Benefits of Cyber Security
1.11.7 Cyber Safety Tips
1.12 Cyber Security Challenges
1.12.1 Ransomware Evolution
1.12.2 Blockchain Revolution
1.12.3 IOT Threats
1.12.4 AI Expansion
1.12.5 Serverless Apps Vulunerability
1.13 Exercise: Questions

2. Cyber Crime and Cyber Law
2.1 Classification of Cyber Crimes
2.1.1 Cyber Crimes Against Persons
2.1.2 Cyber Crimes Against Property
2.1.3 Cyber Crimes Against Government
2.2 Common Forms of Cyber Crimes
2.2.1 Cyber Crime Targeting Computers and Mobile Devices
2.2.2 Cyber Crime Against Women and Child
2.2.3 Financial Fraud
2.2.4 Social Engineering
2.2.5 Malware and Ransomware Attacks
2.2.6 Zero-day
2.2.7 Criminal Modus Operandi
2.3 Reporting of Cyber Crimes
2.3.1 In case of Hacking the Information
2.3.2 In case of E-mail Abuse, Vulgar E-mail etc.
2.4 Reporting a Cyber Fraud
2.4.1 Reporting a Cyber Fraud Through Online
2.5 Remedial and Mitigation Measures
2.6 Legal Prospective of Cyber Crime
2.6.1 Advantages of Cyber Law
2.7 IT Act 2000 and Its Amendments
2.7.1 Salient Features of the Information Technology Act, 2000
2.7.2 Amendments Brought in the Information Technology Act, 2000
2.8 Cyber Crime and Offences
2.8.1 Offences
2.9 Organisation Dealing with Cyber Crime and Cyber Security in India
2.9.1 Objectives of I4C
2.10 Case Study
2.11 Exercise: Questions

3. Social Networking
3.1 Working of Social Networking
3.1.1 Purpose of Social Networking
3.2 Types of Social Networking
3.2.1 Advantages and Disadvantages of Social Networking
3.2.2 Social Networks in Business
3.3 Types of Social Media
3.4 Social Media Platform
3.5 Social Media Monitoring
3.6 Social Media Marketing
3.7 Social Media Privacy
3.8 Challenges
3.9 Security Issues Related to Social Media
3.9.1 To Mitigate These Security Issues, Individuals and Organisations can take Several Measures
3.10 Flagging and Reporting Inappropriate Content
3.11 Laws Regarding the Posting of Inappropriate Content
3.12 Best Practice for the Use of Social Media
3.13 Case Study
3.14 Exercise: Questions

ISBN

Year of publication

2025

Edition

Pages

Weight

218 (In Grams)

Book Code

Student Dollar Price

11

Type

Author

Anusha A.,

Dr. Ashoka S.B.,

Shilpa G.N.

Publisher

Himalaya pub