Characteristics, the system of professions, computing as a profession, professional relationships, responsibilities, code of ethics and professional conduct Privacy: Computers and privacy issue, reframing this issue, legislative background, better
Unit- 2 Intellectual property issues in cyberspace:
Introduction to intellectual property Protections via Copyright, Trade Secrets, Trademarks, Patents, Contracting to protect intellectual property, Protection options – Encryption, copyright
on web-content, copyright on software
Ethical Decision Making:
Types of ethical choices, Making defensible decisions, Ethical dilemmas, law and ethics, Guidelines for dilemma (Informal and Formal), Four-step analysis process of solving dilemma Case studies: i) A stolen password ii) Recovery of data leads to Discovery of confidential files
iii) Do copyright ethics change overseas?
Unit 3- Crime incident Handling Basics:
Hacking, cyber activism, Tracking hackers, clues to cyber crime, privacy act, search warrants, common terms, organizational roles, procedure for responding to incidents, reporting procedures, legal considerations
Information Technology Act 2000 Scope, jurisdiction, offense and contraventions, powers of police, adjudication
Unit 4- Cyber Forensics:
Cyber forensics, cyber crime examples, forensics casework, investigative incident-response actions, computer forensics tools, Threats in cyberspaces, Blended attacks Sample Policy Documents: i) Antivirus Guidelines Policy ii) Internal Lab Security Policy iii)
Server Security Policy iv) Wireless Communications Policy
Information Security Certifications, CISSP and SSCP, CISA and CISM, SCP, GIAC, certification weaknesses, Role of these certified professionals, Windows Server 2003 Security Fundamentals
Text/ Reference Books:
Deborah G Johnson, “ Computer Ethics”, Pearson Education Pub., ISBN : 81-7758-593-2.
Earnest A. Kallman, J.P Grillo, “Ethical Decision making and IT: An Introduction with
McGraw Hill Pub. W. Rittinghouse, William
Elsevier Pub. 4. Michael E. Whitman, Herbert J. Mattord, “Principles of Information Security”, 2nd Edition,,
CengageLearning Pub. 5. Randy Weaver, Dawn Weaver, “Network Infrastructure Security”, Cengage Learning Pub.
Term Work: The term work shall consist of at least 10 experiments/ assignments based on the syllabus above. Assessment of term work should be done which will consider the points below and the marks should be awarded accordingly.
Continuous lab assessment
Actually performing practicals in the laboratory during the semester