Cyber Security & IOT (EC-8004)
rgpv bhopal, diploma, rgpv syllabus, rgpv time table, how to get transcript from rgpv, rgpvonline,rgpv question paper, rgpv online question paper, rgpv admit card, rgpv papers, rgpv scheme
RGPV notes CBGS Bachelor of engineering
Syllabus
UNIT 1:
Introduction, Classifications of Cybercrimes: E-Mail Spoofing, Spamming, Cyber
defamation, Industrial Spying/Industrial Espionage, Hacking, Software Piracy, Password
Sniffing, Credit Card Frauds, Cyberstalking, Botnets, Phishing, Pharming, Man-in-theMiddle attack, Password Cracking, Keyloggers and Spywares, Virus and Worms, Trojan
Horses and Backdoors, DoS and DDoS Attacks, SQL Injection, Buffer Overflow, Malware,
Ransomware, Types of Identity Theft, Techniques of ID Theft, Cyber terrorism, Browser
Attacks, Reverse Engineering, Cross site scripting
UNIT 2:
Introduction to Cyber Security, Cyber Security Goals, Cyber Security policy, Domain of
Cyber Security Policy, Elements, Cyber Security Evolution, Implementing Hardware
Based Security, Software Based Firewalls, Security Standards, Assessing Threat Levels,
Forming an Incident Response Team, Reporting Cybercrime, Difference between cyber
forensics and cyber security.
UNIT 3:
The Internet of Things: An Overview, The “Internet” of “Things”, The Technology of the
Internet of Things, Importance of Internet of Things, Understanding Smart Devices,
Design Principles for Connected Device, Network Connections, Traditional Network,
Transferring Data Over a Network, Understanding IP Address, Wireless Technologies,
Wi-Fi, Bluetooth, Cellular Networks, Mesh Networks.
UNIT 4:
Internet Principles, Internet Communications, IP, TCP, The IP Protocol Suite (TCP/IP),
UDP, IP addresses, DNS, Static IP address Assignment, Dynamic IP Address Assignment,
IPv6, MAC Address, TCP and UDP Ports, HTTP Ports other Common Ports, Application
Layer Protocols.
UNIT 5:
Prototyping: Sketching, Familiarity, Cost versus Ease of Prototyping, Prototypes and
Production, Embedded Platform, Physical Prototypes and Mass Personalization,
Introduction to Cloud, Climbing into the Cloud, Open Source, Closed Source, Mixing
Open and Closed Source.
NOTES by Ayush Sinha (Student)
- Unit 1
- Unit 2
- Unit 3
- Unit 4
- Unit 5
Books Recommended
1. Nina Godbole and Sunit Belpure , Cyber Security Understanding Cyber Crimes,
Computer Forensics and Legal Perspectives, Wiley
2. Jennifer L. Bayuk, J. Healey, P. Rohmeyer, Marcus Sachs, Jeffrey Schmidt, Joseph
Weiss Cyber Security Policy Guidebook, John Wiley & Sons 2012.
3. McEwen Adrian and Cassimally Hakim, “Designing the Internet of Things” Wiley
India Pvt. Ltd., 2016.
4. Miller Michael, “The Internet of Things”, Pearson India Education Services Pvt.
Ltd., 2015.
You May Also Like
- EC-8001 - VLSI Design
- EC-8002 - Advanced Communication System
- EC-8003 - Principles Management & Economics [Elective-V]
- EC-8003 - Mobile Computing [Elective-V]
- EC-8003 - Digital Control System [Elective-V]
- EC-8004 - Advanced Digital Signal Processing [Elective-VI]
- EC-8004 - Radar Engineering [Elective-VI]
- EC-8005 - Project-II
- EC-8006 - Departmental Choice (Internal Assessment)
- EC-8007 - Group Discussion (Internal Assessment)