Overview of Cyber Security, Internet Governance – Challenges and Constraints, Cyber Threats:- Cyber Warfare-Cyber Crime-Cyber terrorism-Cyber Espionage, Need for a Comprehensive Cyber Security Policy.
Introduction, Basic security for HTTP Applications and Services, Basic Security for SOAP Services, Identity Management and Web Services, Authorization Patterns, Security Considerations, Challenges.
Introduction to Cyber Forensics, Handling Preliminary Investigations, Controlling an Investigation, Conducting disk-based analysis, Investigating Information-hiding, Scrutinizing E-mail, Validating E-mail header information, Tracing Internet access, Tracing memory in real-time.
Introduction, Cyber Security Regulations, Roles of International Law, the state and Private Sector in Cyberspace, Cyber Security Standards. The INDIAN Cyberspace, National Cyber Security Policy 2013.
Self Enablement through Smart Policies – Application Controls – User Controls – Network Controls – End Point Controls - Addressing Mobile and Remote Users
Reference Book:
1. William Stallings, “Cryptography and Network Security Principles and Practice”, Fifth Edition. 2. Charles J.Brooks, Christopher Grow, Philip Craig, Donald Short, “Cyber Security Essentials”, SYBEX – A Wiley Brand.
Text Book:
1. Lawrence C.Miller, “Cyber security for Dummies”, Wiley Brand, Palo Alto Networks Edition, 2014. 2. Erdal Ozkaya, “Hands-on Cyber Security for Finance”, Packet publishing.