• Tidak ada hasil yang ditemukan

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD KUKATPALLY, HYDERABAD – 500 085.

N/A
N/A
Protected

Academic year: 2023

Membagikan "JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD KUKATPALLY, HYDERABAD – 500 085."

Copied!
38
0
0

Teks penuh

Degrees, the candidate must complete all the academic requirements of the courses in accordance with the course structure. If the examiner's report is again negative, the diploma thesis is rejected in an expedited procedure. Exclusion from the examination hall and cancellation of participation in this subject only for all registered candidates.

Exclusion from the examination hall and cancellation of taking this course and all other courses that the candidate has already taken, including practical exams and project work, and may not appear in the remaining exams of the courses of this semester/. The candidate's hall ticket should be canceled and sent to the university. Continuation of the course by the candidate is subject to the academic regulations regarding seat withdrawal.

Exclusion from the exam hall and cancellation of taking this course and all other courses that the candidate has already taken, including practical exams and project work, is not allowed in the remaining exams of the courses of this semester/year. Exclusion from the examination hall and cancellation occurs in this subject and all other subjects that the candidate has already taken, including practical exams and project work, and he is not allowed to take the remaining exams in the subjects of this semester/year. Exclusion of the student of the post-secondary school from the examination hall and cancellation of taking this subject and all other subjects that the candidate has already taken, including practical exams and project work, and he is not allowed to take the remaining exams in the subjects of this semester/year.

Cancellation of performance in that subject and all other subjects in which the candidate has appeared including practical examinations and project work of that semester/annual examination.

TECH - CYBER FORENSIC & INFORMATION SECURITY / CYBER SECURITY COURSE STRUCTURE AND SYLLABUS

Wenbo Mao, “Modern Cryptography Theory and Practice”, Pearson Education, 2004 3. Atul Kahate, “Cryptography and Network Security”, Tata McGrew Hill, 2003. Introduction: Network Concepts – Threats in Networks – Network Security Controls – Importance of Security – Threat Models – Security Concepts – General risk mitigation methods. IP and Web Security: IP Security: Overview - Architecture - Authentication Header - Security Payload Encapsulation - Key Management - Web Security: Web Security Considerations - Secure Socket Layer and Transport Layer Security - Secure Electronic Transaction - Web Issues.

WIRELESS TECHNOLOGIES: Introduction to wireless technologies - Wireless data networks - Personal networks - Portable media - WLAN standards - WLAN protection - Countermeasures - WEP (Wired Equivalence Protocol). Security in data networks: Wireless security issues - CDPD (Cellular Digital Packet Data) security - GPRS (General Packet Radio Service) security - GSM (Global System for Mobile Communications) security - IP security. Foundations: Introduction to Cloud Computing, Migrating to the Cloud, Enriching the "Integration as a Service" Paradigm for the Cloud Era, Enterprise Cloud Computing Paradigm.

Introduction to networked storage: development of JBOD, DAS, SAN, NAS and CAS, direct attached storage (DAS) environments: elements, connectivity and management, Storage Area Networks (SAN): elements and. Introduction to Security and Authentication: Software Security - Dealing with Widespread Security Failures, Bugtraq, CERT Advisory, RISKS Summary, Technical Trends Affecting Software Security, "Ilirat", Beyond Reliability, Penetration and Remediation, an Art and engineering, security goals, prevention, Traceability and auditing, monitoring, privacy and confidentiality, multi-level security, anonymity, authentication, integrity, know your enemy – Common software security pitfalls. Intrusion detection rationale: Security intrusion detection – Threat information – Risk quantification – Return on investment (ROI).

Applications and Tools: Tool Selection and Acquisition Process - Intrusion Detection Bro - Prelude Intrusion Detection - Cisco Security IDS - Snorts Intrusion Detection - NFR Security. Legal Issues and Standards of Organizations: Law Enforcement / Criminal Prosecutions – Standard of Due Care – Evidence Issues, Organizations and Standards. Investigation: Introduction to Cyber ​​Crime Investigation, Investigation Tools, Electronic Discovery, Digital Evidence Collection, Evidence Preservation, Email Investigation, Email Tracking, IP Tracking, Email Recovery, Practical Studies. Introduction to Computer Security: Definition, Security Threats, Government Requirements, Information Protection and Access Controls, Computer Security Efforts, Computer Security Standards, Mandates and Legislation, Privacy Considerations, International Security Activity.

Designing and Managing a Secure System, Introduction to the Orange Book, Security Policy Requirements, Accountability, Assurance and Documentation Requirements, Network Security, Red Book and Government Network Assessments. Arithmetic Coding – Image Compression – Graphics Interchange Format – Tagged Image File Format – Digitized Documents – Introduction to JPEG Standards. Introduction to network programming: OSI model, Unix standards, TCP and UDP & TCP connection establishment and format, buffer sizes and limits, standard Internet services, protocol use with a common Internet application.

Future Directions - Cloud Computing Security - Security Appliances - User Centric Identity Management - Identity Based Encryption (IBE) - Virtualization in Host Security. Introduction to Intellectual Property Law - Evolutionary Past - Intellectual Property Rights Toolkit - Paralegal Tasks in Intellectual Property Law Ethical Obligations in Paralegal Tasks in Intellectual Property Law - Introduction to Cyber ​​Law - Innovations and Inventions Trade Related Intellectual Property Rights. Introduction to copyright - Principles of copyright principles - Subjects of copyright - Rights guaranteed by copyright - Copyright Ownership, transfer and duration - Right to prepare derivative works - Distribution rights - Rights to perform the work Advertising Formalities of copyright and Registration - Limitations - Copyright Disputes and International Copyright Law - Semiconductor Chip Protection Act.

Introduction to Trade Secrets – Enforcement of Trade Secrets – Physical Safety – Restraint of Employees – Employee Non-Disclosure Agreement – ​​Trade Secrets Act – Unfair Competition – Trade Secret Litigation – Breach of Contract – Application of State Law.

Referensi

Dokumen terkait

The results of this study are expected to add insight into knowledge and experience which is very important in describing the implementation of Project-based Learning using Instagram

FK Universitas Tarumanegara Jakarta, http://journal.fkm.ui.ac.id/kesmas/article/view/347/346 diakses tanggal 8 desember 2018 Moyad, A.M., 2004, Fad Diets and Obesity - Part I: