-
Site Admin
Study Notes on Cyber Laws & Intellectual Property Rights – Cyber Forensics | Elective Paper-IV SEM 4
Unit 1: Fundamentals of Cyber Law Introduction to Cyber Space Jurisprudence of Cyber Law Scope of Cyber Law Cyber Law in India Special Reference to Information Technology Act, 2000 (as amended) Information Technology Act, 2008 Introduction to Cyber Space Definition: Cyber space refers to the virtual environment created by interconnected computer systems. Example: Websites, social…
-
Site Admin
Study Notes on Security Testing – Cyber Forensics | Core Paper- XVI SEM 4
Unit 1: Access Control Testing Access Control Tests of Networks (External Interface) Networks (Internal Interface and DMZ) Physical Access Testing Piggybacking Anonymous Entry Break-in Wireless Access Testing Board Classes of Testing Black Box of Zero Knowledge Crystal Box or Full Knowledge Testing Grey Box Testing Unit 2: Security Audit Choosing the Standard Against Which to…
-
Site Admin
Study Notes on Business Continuity & Disaster Recovery Management – Cyber Forensics | Core Paper- XV SEM 4
Unit 1: Introduction Introduction to Business Continuity Management (BCM) and Disaster Recovery (DR) Terms and Definitions BCM Principles BCM Lifecycle BCM Programme Management Understanding the Organization Determining Business Continuity Strategy Developing and Implementing a BCM Response BCM Exercising Maintaining and Reviewing BCM Arrangements Embedding BCM in the Organization’s Culture BCM in Business: Benefits and Consequences…
-
Site Admin
Study Notes on Governance, Risk & Compliance – Cyber Forensics | Core Paper- XIV SEM 4
Unit 1: Governance, Risk & Compliance Definition, Scope, and Objectives – IT Governance Metrics & Framework – BASEL – OECD Unit 2: Best Practices for IT Governance ITIL ISO/IEC 27001 Control Objectives of Information and Related Technology (COBIT) The Information Security Management Maturity Model Capability Maturity Model Any other latest standards and compliance technologies Unit…
-
Site Admin
Study Notes on Application Security – Cyber Forensics | Core Paper- XIII SEM 4
Unit 1: Application Types Client/Server Applications Components of Client/Server Applications (Logical & Physical Architecture) Web Applications About Web Applications Technologies used to create Web Applications Components of Web Application Architecture Data Warehouse Applications About DW Applications Uses Physical & Logical Architecture Management Information Systems Unit 2: Web application security Introduction to web application Primer OWASP…
Search
Category
- 1 Notes (18)
- Administrative Law (5)
- Advocates & Judges (22)
- AIBE Exams (3)
- Alternate Dispute Resolution (5)
- Analysis (2)
- Announcements (38)
- Articles (13)
- Banking Law (5)
- Bare Acts (1)
- Call for Papers (23)
- Case Laws (606)
- Certificate Courses (9)
- Civil Procedure (5)
- Class Notes (128)
- Company Law (7)
- Constitutional Law (7)
- Contract Law (7)
- Contract Law II (5)
- Criminal Law (10)
- Criminal Procedure Code (6)
- CS Executive (35)
- Cyber & IT Law (9)
- Cyber Laws (34)
- Cyber Security Tools (3)
- Digital Marketing (2)
- Environmental Law (6)
- Family Law II (5)
- Featured (4)
- Human Rights (5)
- Insurance Law (5)
- Intellectual Property I (6)
- Interpretation of Statutes (5)
- Jobs (85)
- Journalism & Media (31)
- Jurisprudence (5)
- KSLU (12)
- Labour Laws (5)
- Law Exams (19)
- Law of Evidence (5)
- Law of Torts (6)
- Law School Conferences (22)
- Law School Darshan (2)
- Law Schools (110)
- Legal Guides (1)
- LLB Exams (13)
- LLB Guide (147)
- LLM Exams (2)
- Matrimonial & Family law (6)
- Moot Court (6)
- News (84)
- News (23)
- News & Articles (9)
- PGD CyberLaw (6)
- Press and Registration of Books Act (1)
- Professional Ethics (5)
- Public International Law (5)
- Question Papers (11)
- Registration of Newspapers (Central) Rules (1)
- RERA / Real Estate Law (1)
- Resources for Lawyers (1)
- Right to Information (RTI) (5)
- Taxation (4)
- Transfer of Property (6)
- Tuition & Courses (1)
Recent Post
- HardenAD: Fortifying Your Active Directory in Minutesby Site Admin
- BloodHound: Unveiling the Labyrinth of Attack Paths in AD and AADby Site Admin
- Ping Castle: Free Active Directory Security Assessment Toolby Site Admin
- Indian Space Policy 2023: A Comprehensive Reviewby Site Admin
- All You Need to Know About Common Vulnerabilities, Attack Vectors, and Mitigation Techniquesby Site Admin