X hits on this document





20 / 27

Characteristics, the system of professions, computing as a profession, professional relationships, responsibilities, code of ethics and professional conduct Privacy: Computers and privacy issue, reframing this issue, legislative background, better

privacy protection

Unit- 2 Intellectual property issues in cyberspace:

(08 Hrs)

Introduction to intellectual property Protections via Copyright, Trade Secrets, Trademarks, Patents, Contracting to protect intellectual property, Protection options – Encryption, copyright

on web-content, copyright on software

Ethical Decision Making:

(08 Hrs)

Types of ethical choices, Making defensible decisions, Ethical dilemmas, law and ethics, Guidelines for dilemma (Informal and Formal), Four-step analysis process of solving dilemma Case studies: i) A stolen password ii) Recovery of data leads to Discovery of confidential files

iii) Do copyright ethics change overseas?

Unit 3- Crime incident Handling Basics:

(08 Hrs)

Hacking, cyber activism, Tracking hackers, clues to cyber crime, privacy act, search warrants, common terms, organizational roles, procedure for responding to incidents, reporting procedures, legal considerations

Information Technology Act 2000 Scope, jurisdiction, offense and contraventions, powers of police, adjudication

Unit 4- Cyber Forensics:

(08 Hrs)

Cyber forensics, cyber crime examples, forensics casework, investigative incident-response actions, computer forensics tools, Threats in cyberspaces, Blended attacks Sample Policy Documents: i) Antivirus Guidelines Policy ii) Internal Lab Security Policy iii)

Server Security Policy iv) Wireless Communications Policy

Unit 5-

(08 Hrs)

Information Security Certifications, CISSP and SSCP, CISA and CISM, SCP, GIAC, certification weaknesses, Role of these certified professionals, Windows Server 2003 Security Fundamentals

Text/ Reference Books:

  • 1.

    Deborah G Johnson, “ Computer Ethics”, Pearson Education Pub., ISBN : 81-7758-593-2.

  • 2.

    Earnest A. Kallman, J.P Grillo, “Ethical Decision making and IT: An Introduction with


Cases”, John

McGraw Hill Pub. W. Rittinghouse, William







Elsevier Pub. 4. Michael E. Whitman, Herbert J. Mattord, “Principles of Information Security”, 2nd Edition,,

CengageLearning Pub. 5. Randy Weaver, Dawn Weaver, “Network Infrastructure Security”, Cengage Learning Pub.

Term Work: The term work shall consist of at least 10 experiments/ assignments based on the syllabus above. Assessment of term work should be done which will consider the points below and the marks should be awarded accordingly.

  • *

    Continuous lab assessment

    • *

      Actually performing practicals in the laboratory during the semester

Practical Examination:

Document info
Document views62
Page views62
Page last viewedTue Oct 25 09:19:47 UTC 2016