Subject Details
Dept     : CSE-IOT
Sem      : 6
Regul    : 2019
Faculty : Ms.S.Jayashree
phone  : 9486603510
E-mail  : jayaa1974@gmail.com
90
Page views
31
Files
3
Videos
2
R.Links

Icon
Lecture Notes

UNIT 1:
pdf
download    open file
Introduction to Cyber Crime.
pdf
download    open file
Need for Cyber Law
pdf
download    open file
Information Technology ACT 2000
pdf
download    open file
Controlling And Preventing Cybercrime.
pdf
download    open file
E-Governance
pdf
download    open file
Legal Recognition of Electronic Records.
UNIT 2:
pdf
download    open file
Regulating Certifying Authorities
pdf
download    open file
Recognition of Foreign Authorities
pdf
download    open file
License to Issue Electronic Signature Certificates
pdf
download    open file
Penalty and Compensation for Damaging to Computer System
pdf
download    open file
Compensation for Failure to Protect Data
pdf
download    open file
License to Issue Electronic Signature Certificates
UNIT 3:
pdf
download    open file
Interception & Monitoring of Electronic Communications
pdf
download    open file
Tampering with Computer Source Documents
pdf
download    open file
Tampering with Computer Source Documents
pdf
download    open file
Punishment for Cyber Terrorism
pdf
download    open file
Offenses
pdf
download    open file
Interception & Monitoring of Electronic Communications
UNIT 4:
pdf
download    open file
Personal Jurisdiction in Cyberspace
pdf
download    open file
Freedom of Expression and privacy in Cyberspace.
pdf
download    open file
Cyber Crimes & Legal Framework Cyber Crimes against Individuals, Institution and State
pdf
download    open file
Cyber Crimes & Legal Framework Cyber Crimes against Individuals, Institution and State
pdf
download    open file
Governance of social media
UNIT 5:
pdf
download    open file
Introduction to ethical hacking
pdf
download    open file
Vulnerability scanning using NMAP and Nessus
pdf
download    open file
Differences between a bug bounty and a client-initiated pentest
pdf
download    open file
Ethical hacking tool: Burp Suite
pdf
download    open file
Configuring Burp Suite-Setting up proxy listeners
pdf
download    open file
Creating target scopes in Burp Suite.