|Publishers||R. Narain & Co.|
|Author||Nobel Editorial Board|
Cyber Security – MCA (206)
This book is designed to meet the needs of master of computer application students studying for the very first time in their curriculum. Thus complexity of the matter has been avoided with a view that complete course content has to be completed by the student in limited time period. The subject matter has been presented in a lucid, comprehensive and systematic manner which is easy to understand and also develops writing ability for students to score good marks in upcoming examination. This book includes all types of questions according to new pattern of university. Course content has been divided into topic wise and in chapter wise form according to curriculum framed by Dr. A.P.J. Abdul Kalam Technical University, Lucknow. This book includes unsolved papers of last years and sample paper. We hope that this book will be successful in its objectives and will receive appreciation from students and teachers alike.
Estimated Delivery for Urban Areas 3 to 4 Days
Estimated Delivery for Rural Areas 5 to 7 Days
|Dimensions||20 × 12 cm|
Table of Content
UNIT I – Introduction- Introduction to Information Systems, Types of InformationSystems, Development of Information Systems, Introduction to Information Security and CIA triad, Need for Information Security, Threats to Information Systems, Information Assurance and Security Risk Analysis, Cyber Security.
UNIT II – Application Security- (Database, E-mail and Internet),Data Security Considerations-(Backups, Archival Storage and Disposal of Data), Security Technology-(Firewall , VPNs, Intrusion Detection System), Access Control.Security Threats -Viruses, Worms, Trojan Horse, Bombs, Trapdoors, Spoofs, E-mail Viruses, Macro Viruses, Malicious Software, Network and Denial of Services Attack.
UNIT III – Introduction to E-Commerce , Threats to E-Commerce, Electronic PaymentSystem, e- Cash, Credit/Debit Cards. Digital Signature, Cryptography Developing Secure Information Systems, Application Development Security, Information Security Governance & Risk Management, Security Architecture& Design Security Issues in Hardware, Data Storage & DownloadableDevices, Physical Security of IT Assets – Access Control, CCTV, BackupSecurity Measures.
UNIT IV – Security Policies- Why policies should be developed, Policy ReviewProcess, Publication and Notification Requirement of policies, Types of policies – WWW policies, Email Security policies, Corporate Policies, Sample Security Policies.Case Study – Corporate Security
UNIT V – Information Security Standards- ISO, IT Act, Copyright Act, IPR. CyberCrimes , Cyber Laws in India; IT Act 2000 Provisions, Intellectual Property Law, Copy Right Law , Semiconductor Law and Patent Law , Software Piracy and Software License.
Salient features include:
- Comprehensive coverage of theoretical aspects in easiest way through diagrams and flow charts.
- All intricate aspects are explained by simple, lucid and specific explanations and substantiated with neat and elaborate diagrammatic sketches.