Gujarat Technological University: W.E.F. AY 2018-19
Gujarat Technological University: W.E.F. AY 2018-19
Gujarat Technological University: W.E.F. AY 2018-19
Bachelor of Engineering
Subject Code: 3150714
Semester – V
Subject Name: Cyber Security
Prerequisite: None
Rationale: In this digital age, the information and data are immense and need to be secured. The cyber crimes
have increased as attackers see it as gaining big rewards. There is a need to examine the cyber attack patterns
and provide security measures for them and also need to learn the cyber laws formed to effectively act upon
cyber crimes.
Content:
w.e.f. AY 2018-19
GUJARAT TECHNOLOGICAL UNIVERSITY
Bachelor of Engineering
Subject Code: 3150714
Overflow, Attack on wireless Networks.
Reference Books:
1. Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives by Nina
Godbole and Sunit Belpure, Publication Wiley
2. Cyber Security and Cyber Laws Paperback – 2018 by Alfred Basta, Nadine Basta , Mary Brown ,
Ravinder Kumar, publication Cengage
3. 3. Anti-Hacker Tool Kit (Indian Edition) by Mike Shema, Publication Mc Graw Hill.
4. Cyber security and laws – An Introduction, Madhumita Chaterjee, Sangita Chaudhary, Gaurav Sharma, Staredu
Solutions
List of Practical:
1. Install Kali Linux. Examine the utilities and tools available in Kali Linux and find out which tool is
the best for finding cyber attack/vulnerability.
2. Evaluate network defense tools for following
(i) IP spoofing
(ii) DOS attack
3. Explore the Nmap tool and list how it can be used for network defence.
4. Explore the NetCat tool.
5. Use Wireshark tool and explore the packet format and content at each OSI layer.
6. Examine SQL injection attack.
Page 2 of 3
w.e.f. AY 2018-19
GUJARAT TECHNOLOGICAL UNIVERSITY
Bachelor of Engineering
Subject Code: 3150714
7. Perform SQL injection with SQLMap on vulnerable website found using
google dorks.
Page 3 of 3
w.e.f. AY 2018-19
GUJARAT TECHNOLOGICAL UNIVERSITY
Bachelor of Engineering
Subject Code: 3150714
8. Examine software keyloggers and hardware keyloggers.
9. Perform online attacks and offline attacks of password cracking.
10. Consider a case study of cyber crime, where the attacker has performed on line credit card fraud.
Prepare a report and also list the laws that will be implemented on attacker..
Page 4 of 3
w.e.f. AY 2018-19