Professional Documents
Culture Documents
Course Objectives
1. To look at the emerging legal, policy and regulatory issues pertaining to cyberspace and cybercrimes
2. To cover all the topics from fundamental knowledge of Information Technology and Computer Architecture
3. To identify the emerging Cyberlaws, Cybercrime & Cyber security trends and jurisprudence impacting
cyberspace in today’s scenario
4. To enable the participants appreciate, evaluate and interpret the case laws with reference to the IT Act and
other Laws associated with the cyberspace
Course Outcomes
CO1 To provide vivid knowledge about different types of Digital Forensics which will be useful in
investigating real-time cases pertaining to cybercrime
CO2 To provide knowledge related to auditing of computer systems, managing and mitigating risk situations
in the organization and techniques for investigating financial frauds
CO3 To appreciate, evaluate and interpret the case laws with reference to the IT Act and other Laws
associated with the cyberspace
CO4 Students will be able to look at the emerging legal, policy and regulatory issues pertaining to cyberspace
and cybercrimes
CO5 To cover all the topics from fundamental knowledge of Information Technology and Computer
Architecture
CO6 To identify the emerging Cyberlaws, Cybercrime & Cyber security trends and jurisprudence impacting
cyberspace in today’s scenario
Internal Assessment (IA) Mid Term Exam (MTE) End Term Exam (ETE) Total Marks
30 20 50 100
Unit I: 8 Hours
Basics of Computers
Overview and working of computers
Generation and Classification of computers
Basics of computer hardware and software
Booting process in a computer
Computer memory and its classification, other peripherals devices
Unit II: 7 Hours
Computer Architecture
Digital Architecture of CPU – Input Unit, Output Unit and Storage Unit
Types of Storage Media – Hard Drive, SSD, Optical Devices, Holographic Storage, Smart cards
File Systems- Types and components
Operating system and Functions
Unit III: 7 Hours
Suggested Reading
1. V. Rajaraman and Niharika Adabala; “Fundamentals of Computers”, 6th Edition, PHI Learning Pvt. Ltd.,
2015
2. Beherouz. A Forouzan; “Data Communication and Networking”, 4th Edition, TMH, 2000
3. Nina Godbole and Sunit Belapore; “Cyber Security: Understanding Cyber Crimes, Computer Forensics and
Legal Perspectives”, Wiley Publications, 2011
4. Atul Jain; “Cyber Crime: Issues, Threats and Management”, 2004
5. Atul Kahate “Cryptography and Network Security” McGraw Hill Education (India), 2008
6. Matt Bishop, “Computer Security Art and Science”, Pearson/PHI, 2002
7. Karnika Seth; “Computers, Internet and New Technology Laws”, Lexis Nexis Buttersworth Wadhwa, 2012
8. Pavan Duggal; “Cyber Law – The Indian Perspective”, Saakshar Law Publications, 2010
9. Amjad Umar; “Information Security and Auditing in the Digital Age: A Practical and Managerial
Perspective”, NGE Solutions Inc., 2004