Programme: B.Tech Scheme and Syllabi

Total Page:16

File Type:pdf, Size:1020Kb

Programme: B.Tech Scheme and Syllabi 1 | Syllabus for B. Tech Computer Science & Engineering. w.e.f. Academic session 2020-21 Programme: B.Tech Computer Science & Engineering Scheme and Syllabi w.e.f. Academic Session 2020-21 BUEST SCHOOL OF ENGINEERING & EMERGING TECHNOLOGIES 2 | Syllabus for B. Tech Computer Science & Engineering. w.e.f. Academic session 2020-21 (Common Curriculum for B. Tech I year – All Branches) Semester - I (Group-A) Sr.No Code Course Title L T P Credit 1 UMA-101 Engineering Mathematics I 3 1 0 3.5 2 UPY- 10 1 Engineering Physics 3 1 2 4.5 3 XXX - XXX Department Electiv e -1 - - - - 4 UHU -1 01 Communication and Professional Skills in English 3 0 2 4.0 5 UEC- 10 5 Principles of Electronics Engineering 3 1 2 4.5 6 UME -1 05 Principles of Mechanical Engineering 3 1 2 4.5 7 UPD- 10 1 Personality Developm ent Program me 0 0 2 1.0 Department Elective – 1 1 UCS-103 Fundamentals of Computers & C Programming 3 1 2 4.5 2 UCS-104 Programming in C 3 1 2 4.5 Total 18 5 12 26.5 Total Hours: 35 (Group-B) Sr.No Code Course Title L T P Credit 1 UMA-101 Engineering Mathematics I 3 1 0 3.5 2 UCH-101 Engineering Chemistry 3 1 2 4.5 3 XXX - XXX Department Electiv e -1 - - - - 4 UEE-105 Principles of Electrical Engineering 3 1 2 4.5 5 UEG-101 Engineering Graphics Drawing 0 0 6 3 6 UEN-101 Environmental Science 3 0 0 3 7 UWP-110 Workshop Practice 0 0 3 1.5 Department Elective – 1 1 UCS-103 Fundamentals of Computers & C Programming 3 1 2 4.5 2 UCS-104 Programming in C 3 1 2 4.5 Total 15 4 15 24.5 Total Hours: 34 (Common Curriculum for B. Tech I year – All Branches) Semester - II (Group-A) Sr.No Code Course Title L T P Credit 1 UMA - 10 2 Engineering Mathem atics II 3 1 0 3.5 2 UCH -10 1 Engineering Chemistry 3 1 2 4.5 3 UEE-1 05 Principles of Electrical Engineering 3 1 2 4.5 4 UEG-101 Engineering Graphics Drawing 0 0 6 3 5 UEN-101 Environmental Science 3 0 0 3 6 UWP-110 Workshop Practice 0 0 3 1.5 7 XXX-XXX Department Electiv e -2 - - - - Department Elective – 2 1 IBM-102 Introduction to PHP using IDE 3 1 2 4.5 2 UCS-1 02 Advanced C Programming 3 1 2 4.5 Total 15 4 15 24.5 Total Hours:34 3 | Syllabus for B. Tech Computer Science & Engineering. w.e.f. Academic session 2020- 21 (Group-B) Sr.No Code Course Title L T P Credit 1 UMA - 10 2 Engineering Mathem atics II 3 1 0 3.5 2 UPY-101 Engineering Physics 3 1 2 4.5 3 UHU -1 01 Communication & Professional skills in English 3 0 2 4 4 UEC-105 Principles of Electronics Engineering 3 1 2 4.5 5 UME-105 Principles of Mechanical Engineering 3 1 2 4.5 6 UPD-101 Personality Development Programme 0 0 2 1.0 7 XXX-XXX Department Elective-2 - - - - Department Elective – 2 1 IBM-102 Introduction to PHP using IDE 3 1 2 4.5 2 UCS-1 02 Advanced C Programming 3 1 2 4.5 Total 18 5 12 26.5 Total Hours:35 SUMMER BREAK Sr. Code Subject L T P Credit 1. UTR- 201 Industrial Training 0 0 0 4 SEMESTER –III Sr.No Code Course Title L T P Credit 1 UCS-2 51 Relational Database Management System 3 1 2 4.5 2 UEC-201 Digital Electronics 3 1 2 4.5 3 UCS-2 00 Data Structure & Algorithms with C 3 1 2 4.5 4 UCS-2 01 Computer Architecture & Organization 3 1 0 3.5 5 UCS-2 50 Object Oriented Methods and Programming 3 1 2 4.5 6 UTR-201 Industrial Training (Undertaken during Summer 0 0 0 4.0 Vaca tio n s) 7 UPD-201 Personality Developm ent Program me 2 0 0 2.0 8 XXX-XXX Department Elective-3 - - - - Department Elective – 3 1 IBM-200 Introduction to Virtualization Technology 3 0 2 4.0 2 UCS-2 02 Principles of Programming Language 3 1 0 3.5 3 UCS-2 08 System Softw are 3 1 0 3.5 4 UCS-2 10 Modeling and Simulation 3 1 2 4.5 5 UCS-2 15 Human Aspects of Information Technology 3 1 0 3.5 6 IBM-232 Linux on Mainframe 3 0 0 3.0 7 IBM-211 IT Applications and Open Standards 2 0 0 2.0 8 IBM-252 Advance Concepts in Telecom Business 2 0 0 2.0 9 IBM-223 Advanced Statistical Analysis 3 0 0 3.0 4 | Syllabus for B. Tech Computer Science & Engineering. w.e.f. Academic session 2020- 21 SEMESTER –IV Sr.No Code Course Title L T P Credit 1 UMA - 25 1 Discrete Mathematics and Logic Design 3 1 0 3.5 2 UCS-2 55 Analysis and Design of Algorithms 3 1 0 3.5 3 UCS-2 81 Operating System 3 1 2 4.5 4 UCS-2 52 Software Engineering 3 1 0 3.5 5 UCS-2 53 Computer Networks 3 1 2 4.5 6 UPD-251 Personality Developm ent Program me 2 0 0 2 7 XXX-XXX Department Elective-4 - - - - 8 XXX-XXX Department Elective-5 - - - - Department Elective – 4 1 IBM-253 Dynamic Paradigm in Cloud Computing and 0 0 0 2 Virtualization 2 UGP-251 General Proficiency 0 0 0 1 Department Electiv e – 5 1 IBM-251 Cloud Computing Techniques 3 1 0 3.5 2 UCS-2 82 Mobile Application Development 3 1 2 4.5 3 UCS-2 84 Invention & Innovations in Computing 3 1 0 3.5 4 UCS-2 85 Ecommerce & ERP 3 1 0 3.5 5 UCS-2 80 Fundamentals of Structured Programming 3 1 0 3.5 6 IBM-233 Mainframe OS services 3 0 0 3 7 IBM-212 OSS Development Methodology 3 0 0 3 8 IBM-260 Advance Concepts in Telecom Business 2 0 0 2 9 IBM-261 Data warehouse and Multidimensional modelling 3 0 2 4 SUMMER BREAK Sr. Code Subject L T P Credit 1. UTR- 301 Industrial Training 0 0 0 4 SEMESTER –V Sr.No Code Course Title L T P Credit 1 UEC-305 Microprocessor Theory and Its Applications 3 1 2 4.5 2 UCS-3 01 Theory of Automata and Computation 3 1 0 3.5 3 UCS-3 02 Internet Fundam entals & Web Designing 3 1 2 4.5 4 UCS-3 06 Advanced Programming 3 1 2 4.5 5 UTR-301 Industrial Training (Undertaken during Summer 0 0 0 4 Vaca tio n s) 6 UPD-301 Personality Development Programme 2 0 0 2 7 XXX-XXX Department Electiv e -6 - - - - 8 XXX-XXX Department Electiv e -7 - - - - 5 | Syllabus for B. Tech Computer Science & Engineering. w.e.f. Academic session 2020-21 Department Elective – 6 1 IBM-302 Cloud Computing Architecture 3 1 0 3.5 2 UCS-347 Object Oriented Software Engineering 4 0 0 4 3 UCS-348 Distributed Systems 4 0 0 4 4 UCS-330 Artificial Intelligence & Expert System 3 1 2 4.5 6 UCS-349 Advanced Databases 4 0 0 4 7 IBM-332 Mainframe DBMS 2 0 0 2 8 IBM-311 Marketing & Services in OSS 2 0 0 2 9 IBM-351 Global Telecom Policies & Trends 3 0 0 3 10 IBM-345 Data mining and Predictive modelling 3 0 2 4 Department Elective – 7 1 IBM-300 Web Application Server and Advanced PHP 3 1 2 4.5 2 UCS-380 Managem ent Information System 4 0 0 4 3 UCS-335 Agile software development 4 0 0 4 4 UCS-389 Software Project Management 4 0 0 4 5 IBM-341 Busin e ss Strategy and Analytics 3 0 0 3 SEMESTER-VI Sr.No Code Course Title L T P Credit 1 UCS-3 50 Compiler Design 3 1 0 3.5 2 UCS-3 53 Computer Peripherals & Interfaces 3 1 2 4.5 UCS-3 56 Data Warehousing & Data Mining 3 1 0 3.5 3 4 UMA - 35 1 Statistical Methods 3 1 0 3.5 5 UPD-351 Personality Developm ent Program me 2 0 0 2 XXX-XXX Department Electiv e -8 - - - - 6 Department Electiv e -9 7 XXX-XXX - - - - XXX-XXX Department Elective-10 - - - - 8 Department Electiv e – 8 IBM-354 Dynamic Paradigm in Cloud Computing & 0 0 0 2 1 Virtualization UGP-351 General Proficiency 0 0 0 1 2 Department Electiv e – 9 1 IBM-323 Graphics and Animation Tools 3 1 2 4.5 UCS-3 51 Computer Graphics 3 1 2 4.5 2 UCS-3 98 Multim e dia 3 1 2 4.5 3 4 UCS-3 77 Cyber Security 4 0 0 4 5 IBM-333 Virtualization on Mainframes 3 0 0 3 IBM-352 Mobile Communication Standards 3 0 2 4 6 7 IBM-342 Expert Systems 3 0 2 4 Department Electiv e – 10 IBM-355 Cloud Deployment Models 3 0 2 4 1 2 UCS-3 97 Parallel Computing 4 0 0 4 UCS-3 96 Information Storage & Management 4 0 0 4 3 6 | Syllabus for B. Tech Computer Science & Engineering.
Recommended publications
  • Coleman-Coding-Freedom.Pdf
    Coding Freedom !" Coding Freedom THE ETHICS AND AESTHETICS OF HACKING !" E. GABRIELLA COLEMAN PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD Copyright © 2013 by Princeton University Press Creative Commons Attribution- NonCommercial- NoDerivs CC BY- NC- ND Requests for permission to modify material from this work should be sent to Permissions, Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, 6 Oxford Street, Woodstock, Oxfordshire OX20 1TW press.princeton.edu All Rights Reserved At the time of writing of this book, the references to Internet Web sites (URLs) were accurate. Neither the author nor Princeton University Press is responsible for URLs that may have expired or changed since the manuscript was prepared. Library of Congress Cataloging-in-Publication Data Coleman, E. Gabriella, 1973– Coding freedom : the ethics and aesthetics of hacking / E. Gabriella Coleman. p. cm. Includes bibliographical references and index. ISBN 978-0-691-14460-3 (hbk. : alk. paper)—ISBN 978-0-691-14461-0 (pbk. : alk. paper) 1. Computer hackers. 2. Computer programmers. 3. Computer programming—Moral and ethical aspects. 4. Computer programming—Social aspects. 5. Intellectual freedom. I. Title. HD8039.D37C65 2012 174’.90051--dc23 2012031422 British Library Cataloging- in- Publication Data is available This book has been composed in Sabon Printed on acid- free paper. ∞ Printed in the United States of America 1 3 5 7 9 10 8 6 4 2 This book is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE !" We must be free not because we claim freedom, but because we practice it.
    [Show full text]
  • Firebrand Waves of Digital Activism 1994-2014: the Rise and Spread of Hacktivism and Cyberconflict (Prepublication Copy) Athina Karatzogianni
    University of Leicester From the SelectedWorks of Athina Karatzogianni Fall September 1, 2015 Firebrand Waves of Digital Activism 1994-2014: The Rise and Spread of Hacktivism and Cyberconflict (Prepublication Copy) Athina Karatzogianni This work is licensed under a Creative Commons CC_BY-NC-SA International License. Available at: https://works.bepress.com/athina_karatzogianni/25/ [Please note: This document was the original manuscript submitted to Palgrave Macmillan in January 2015 and is shared here openly. The published book is copyedited, has alterations, amendments and corrections, and has undergone a standard production process, therefore is considerably different to this bepress document. The book Karatzogianni, A. (2015) Firebrand Waves of Digital Activism 1994-2014: The Rise and Spread of Hacktivism and Cyberconflict, Basingstoke: Palgrave Macmillan ISBN 978-1-137-31793-3 can be bought online on ebook or hard/paperback here: http://www.palgrave.com/la/book/9780230242463. If you choose to reference this document and not the published book, please reference appropriately by using the bepress link]. Firebrand Waves of Digital Activism 1994-2014: The Rise and Spread of Hacktivism and Cyberconflict Athina Karatzogianni Associate Perofessor Media and Communication University of Leicester E: [email protected] or [email protected] Preface and Acknowledgements Introduction: Four Phases of Digital Activism and Cyberconflict Chapter One: Origins and Rise of Digital Activism (1994-2007) 1.1 First Phase (1994-2001): The Origins of Digital Activism 1. 2 Second Phase (2001-2007): The Rise of Digital Activism Chapter Two: The Third Phase (2007-2010): Spread of Digital Activism 2.1 Russia-related Cyberconflicts 2.2.
    [Show full text]
  • Dissecting the 'Hacker Manifesto'
    Dissecting the ‘Hacker Manifesto’ S.M.Furnell, P.Dowland and P.W.Sanders Network Research Group School of Electronic, Communication and Electrical Engineering University of Plymouth Plymouth United Kingdom e-mail : [email protected] Abstract Twelve years ago, a text was written within the hacking community which is widely referred to as the ‘Hacker Manifesto’. This text, and the opinions that it offers, have since been widely embraced by the hacker community and the document is referenced from numerous sites on the Internet. This paper sets out to examine the content of the Manifesto and considers the validity of many of the messages that it imparts. The Manifesto is considered to present an undoubtedly pro-hacker message, without acknowledging other perspectives or the wider implications of the activities that it is advocating. The paper explores some of these issues, examining both the consequences of the Manifesto’s dissemination and ways in which security professionals and society at large should respond. It is concluded that whilst the Manifesto obviously cannot bear the sole responsibility for promoting and encouraging hacker activity, it at best sends out an incomplete message that should be balanced with appropriate counter-argument. Keywords : Hackers, Computer Abuse, Information Society. Introduction The definition of the term ‘hacker’ has changed considerably over the last 30 years. In the 1960s, hackers were the dedicated software and hardware gurus, and the term largely referred to persons capable of implementing elegant / technically advanced solutions to technologically complex problems. In the 1990s, however, the moniker implies something rather different and is commonly used to refer to persons dedicated to entering systems by identifying and exploiting security weaknesses.
    [Show full text]
  • An Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St
    University of Missouri, St. Louis IRL @ UMSL Dissertations UMSL Graduate Works 11-22-2005 Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St. Louis, [email protected] Follow this and additional works at: https://irl.umsl.edu/dissertation Part of the Criminology and Criminal Justice Commons Recommended Citation Holt, Thomas Jeffrey, "Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers" (2005). Dissertations. 616. https://irl.umsl.edu/dissertation/616 This Dissertation is brought to you for free and open access by the UMSL Graduate Works at IRL @ UMSL. It has been accepted for inclusion in Dissertations by an authorized administrator of IRL @ UMSL. For more information, please contact [email protected]. Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers by THOMAS J. HOLT M.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2003 B.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2000 A DISSERTATION Submitted to the Graduate School of the UNIVERSITY OF MISSOURI- ST. LOUIS In partial Fulfillment of the Requirements for the Degree DOCTOR OF PHILOSOPHY in Criminology and Criminal Justice August, 2005 Advisory Committee Jody Miller, Ph. D. Chairperson Scott H. Decker, Ph. D. G. David Curry, Ph. D. Vicki Sauter, Ph. D. Copyright 2005 by Thomas Jeffrey Holt All Rights Reserved Holt, Thomas, 2005, UMSL, p. ii ABSTRACT This dissertation examines both the subculture and social organization practices of computer hackers. The concept of normative orders (Herbert, 1998: 347) is used to explore hacker subculture in different contexts.
    [Show full text]
  • Dissecting the ``Hacker Manifesto''
    Dissecting the ``Hacker Manifesto'' S.M. Furnell Research Co-ordinator, Network Research Group, School of Electronic, Communication and Electrical Engineering, University of Plymouth, Plymouth, UK P.S. Dowland Research Student, Network Research Group, School of Electronic, Communication and Electrical Engineering, University of Plymouth, Plymouth, UK P.W. Sanders Visiting Professor, Network Research Group, School of Electronic, Communication and Electrical Engineering, University of Plymouth, Plymouth, UK Keywords as the ``Hacker Manifesto''. This was Computer security, Hacking, Introduction written in 1986 by a hacker who operated Information society The definition of the term ``hacker'' has under the pseudonym of ``The Mentor'' Abstract changed considerably over the last 30 years. and who was a member of the notorious Twelve years ago, a text was In the 1960s, hackers were the dedicated hacking group the Legion of Doom (Sterling, written within the hacking com- software and hardware gurus, and the term 1992). The full text is reproduced in munity which is widely referred to largely referred to persons capable of imple- Figure 1. as the ``Hacker Manifesto''. This text, and the opinions that it menting elegant/technically advanced solu- The Manifesto is still widely accessible, offers, have since been widely tions to technologically complex problems. In some 12 years after it was originally written. embraced by the hacker commu- the 1990s, however, the name implies some- Ordinarily, this could be considered no great nity and the document is refer- thing rather different and is commonly used feat for a piece of literature. However, it is enced from numerous sites on the Internet. This paper sets out to to refer to people dedicated to entering possibly more significant in the context of examine the content of the Mani- systems by identifying and exploiting the technology field, where the pace of festo and considers the validity of security weaknesses.
    [Show full text]
  • Building Hacker Collective Identity One Text Phile at a Time: Reading Phrack
    Media History Monographs 11:2 (2008-2009) ISSN 1940-8862 Building Hacker Collective Identity One Text Phile at a Time: Reading Phrack Brett Lunceford University of South Alabama Research concerning computer hackers generally focuses on how to stop them; far less attention is given to the texts they create. Phrack, an online hacker journal that has run almost continuously since 1985, is an important touchstone in hacker literature, widely read by both hackers and telephone and network security professionals. But beyond its instantiation as a compendium of illicit technical knowledge, Phrack was, above all, a rhetorical publication. The files in each issue of Phrack created a shared rhetorical vision concerning the place of the hacker underground within society and in relation to law enforcement officials, as well as what it means to be a hacker. This essay examines two important events in the evolution of the hacker movement through the lens of Phrack—Operation Sundevil and the arrest of Kevin Mitnick. How these events were framed in Phrack both shaped and reflected emerging shifts in hacker collective identity. ©2009 Brett Lunceford Media History Monographs 11:2 Lunceford: Reading Phrack Building Hacker Collective Identity One Text Phile at a Time: Reading Phrack Stephen Segaller describes the formation of Managers that Helps Protect Corporate Data the Internet as “one of the twentieth century’s from Assaults by the Hackers” and “The most productive accidents,” explaining that the World of Data Confronts the Joy of Hacking,” “seeds of the Internet were planted by the U.S. which begins, “The recent electronic government in the wake of nationwide concern escapades of a group of Milwaukee youths over the Soviet launch of Sputnik.”44 Hackers have brought national attention to the growing were an integral part of the construction of this problem of computer security,”47 demonstrate network.
    [Show full text]
  • Evolution of Cyber Security Invotra
    Evolution of cyber security Invotra Digital Workplace, Intranet and Extranet 700 bc Scytale used by Greece and Rome to send messages And kids ever since.. Image Source: https://commons.wikimedia.org/wiki/File:Skytale.png 1467 Alberti Cipher was impossible to break without knowledge of the method. This was because the frequency distribution of the letters was masked and frequency analysis - the only known technique for attacking ciphers at that time was no help. Image Source: https://commons.wikimedia.org/wiki/File:Alberti_cipher_disk.JPG 1797 The Jefferson disk, or wheel cypher as Thomas Jefferson named it, also known as the Bazeries Cylinder. It is a cipher system using a set of wheels or disks, each with the 26 letters of the alphabet arranged around their edge. Image Source: https://en.wikipedia.org/wiki/Jefferson_disk#/media/File:Jefferson%27s_disk_cipher.jpg 1833 Augusta Ada King-Noel, Countess of Lovelace was an English mathematician and writer, chiefly known for her work on Charles Babbage's proposed mechanical general-purpose computer, the Analytical Engine. She is widely seen as the world's first programmer Image Source: https://commons.wikimedia.org/wiki/File:Ada_Lovelace_portrait.jpg 1903 Magician and inventor Nevil Maskelyne interrupted John Ambrose Fleming's public demonstration of Marconi's purportedly secure wireless telegraphy technology. He sent insulting Morse code messages through the auditorium's projector. Image Source: https://en.wikipedia.org/wiki/Nevil_Maskelyne_(magician)#/media/File:Nevil_Maskelyne_circa_190 3.jpg 1918 The Enigma Machine. It was developed by Arthur Scherbius in 1918 and adopted by the German government and the nazi party Image Source: https://commons.wikimedia.org/wiki/File:Kriegsmarine_Enigma.png 1932 Polish cryptologists Marian Rejewski, Henryk Zygalski and Jerzy Różycki broke the Enigma machine code.
    [Show full text]
  • Hacking, Polítiques I Cultura Visual
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Revistes Catalanes amb Accés Obert Número 19 (1) Any 2013 pp. 202-219 ISSN: 1696-8298 www.antropologia.cat From the Deep Web to the City Streets: Hacking, Politics and Visual Culture Des de la Deep Web als carrers: hacking, polítiques i cultura visual REBUT: 17.11.2013 // ACCEPTAT: 21.05.2014 Christina Grammatikopoulou Universitat de Barcelona (UB) Abstract Resum The political protests that have taken over urban Les protestes polítiques que, moltes vegades, space on multiple occasions since 2011 have s'han apoderat de l'espai urbà des de 2011 s'han been connected to parallel actions within virtual vinculat amb accions paral·leles en l'espai space, actions that virtual, accions que van implicar el hacking, el involve hacking, hacktivism and piracy. This hacktivisme i la pirateria. Aquest article explora article explores the role of the Internet in the el paper d'Internet en el desenvolupament del development of the protest movement and the moviment de protesta i la idea de la pirateria idea of hacking as a subversive ideological and com una pràctica subversiva ideològica i cultural practice. Starting with global protests, cultural. Partint de les protestes globals, es we will see how they are both linked to each desenvoluparà com es relacionen entre si i com other, and form part of the culture and politics s’emmarquen dins de la cultura i la política de of the information age. Subsequently, the l'era de la informació. A continuació, l'anàlisi se analysis turns to hacking as a political and centrarà en el hacking com un acte polític i cultural act.
    [Show full text]
  • Cybercrime Cases – What Is Your Comfort Level?
    Emerging Technologies Bitcoin 101 and Ransomware San Antonio, TX May 31, 2018 Who’s in the audience? A. Circuit Staff Attorney B. CJA Panel Attorney/ Private Defense Attorney C. Federal Public Defender D. Judge E. Law Clerk F. U.S. Probation Officer G. U.S. Attorney H. Other Years of experience with federal sentencing? A. Less than 2 years B. 2 to 5 years C. 5 to 10 years D. More than 10 years Data Breach Prosecutions -2016 & 2017 5 Data Breach Cases Prosecutions 2016-2017 6 Convictions under 18 USC § 1030 & Sentenced under §2B1.1 12 Convictions 10 Total: 94 Cases Nationally 8 6 4 2 0 CDCA NDCA SDNY NDAL SDFL EDPA EDVA Most Common Chapter 2 SOC’s 7 80 70 60 50 40 30 20 10 0 Loss Steal Personal Info/unathorized 1030 SOC's Sophisticated Means Victims dissemination Chapter 3 Adjustments for 18 U.S.C § 1030 cases 8 Chapter 3 Adjustment Percent Applied in 18 For All Cases in 2017 U.S.C. § 1030 cases Abuse of Position of Trust or Use of a 26.6% 2.4% Special Skill Aggravating Role 7.4% 4.7% Mitigating Role 0.0% 8.2% Obstructing or Impeding the 5.3% 2.1% Administration of Justice Acceptance of Responsibility 90.4% 95.8% 9 Having a Difficult Time Keeping Pace with Technology? What is Bitcoin? This case involves what? What is a Cryptocurrency? The Onion Router? This Attachment Seems Harmless…. Oh No…. Ransomware? Cybercrime Cases – What is Your Comfort Level? A. Excellent – I have a Cutting Edge Knowledge of Trends and Technology.
    [Show full text]
  • The Hacker Crackdown
    LITERARY FREEWARE — Not for Commercial Use by Bruce Sterling <[email protected]> Sideways PDF version 0.1 by E-Scribe <[email protected]> C O N T E N T S Preface to the Electronic Release of The Hacker Crackdown Chronology of the Hacker Crackdown Introduction Part 1: CRASHING THE SYSTEM A Brief History of Telephony / Bell's Golden Vaporware / Universal Service / Wild Boys and Wire Women / The Electronic Communities / The Ungentle Giant / The Breakup / In Defense of the System / The Crash Post- Mortem / Landslides in Cyberspace Part 2: THE DIGITAL UNDERGROUND Steal This Phone / Phreaking and Hacking / The View From Under the Floorboards / Boards: Core of the Underground / Phile Phun / The Rake's Progress / Strongholds of the Elite / Sting Boards / Hot Potatoes / War on the Legion / Terminus / Phile 9-1-1 / War Games / Real Cyberpunk Part 3: LAW AND ORDER Crooked Boards / The World's Biggest Hacker Bust / Teach Them a Lesson / The U.S. Secret Service / The Secret Service Battles the Boodlers / A Walk Downtown / FCIC: The Cutting-Edge Mess / Cyberspace Rangers / FLETC: Training the Hacker-Trackers Part 4: THE CIVIL LIBERTARIANS NuPrometheus + FBI = Grateful Dead / Whole Earth + Computer Revolution = WELL / Phiber Runs Underground and Acid Spikes the Well / The Trial of Knight Lightning / Shadowhawk Plummets to Earth / Kyrie in the Confessional / $79,499 / A Scholar Investigates / Computers, Freedom, and Privacy Electronic Afterwordto *The Hacker Crackdown,* New Years' Day 1994 BRUCE STERLING — THE HACKER CRACKDOWN NOT FOR COMMERCIAL USE 2 Preface to the Electronic Release of The Hacker Crackdown January 1, 1994 — Austin, Texas Hi, I'm Bruce Sterling, the author of this electronic book.
    [Show full text]
  • Digital Democracy and the Impact of Technology on Governance and Politics: New Globalized Practices
    Digital Democracy and the Impact of Technology on Governance and Politics: New Globalized Practices Christina Akrivopoulou Democritus University of Thrace, Greece Nicolaos Garipidis Aristotle University of Thessaloniki, Greece Managing Director: Lindsay Johnston Editorial Director: Joel Gamon Book Production Manager: Jennifer Yoder Publishing Systems Analyst: Adrienne Freeland Development Editor: Monica Speca Assistant Acquisitions Editor: Kayla Wolfe Typesetter: Christina Henning Cover Design: Jason Mull Published in the United States of America by Information Science Reference (an imprint of IGI Global) 701 E. Chocolate Avenue Hershey PA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail: [email protected] Web site: http://www.igi-global.com Copyright © 2013 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher. Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark. Library of Congress Cataloging-in-Publication Data Digital democracy and the impact of technology on governance and politics: new globalized practices / Christina Akrivo- poulou and Nicolaos Garipidis, editors. p. cm. Includes bibliographical references and index. Summary: “This book brings together a detailed examination of the new ideas on electronic citizenship, electronic democracy, e-governance, and digital legitimacy, combining theory with the study of law and public policy”-- Provided by publisher. ISBN 978-1-4666-3637-8 -- ISBN 978-1-4666-3638-5 (ebook) -- ISBN 978-1-4666-3639-2 (print & perpetual access) 1.
    [Show full text]
  • A Summary of Hacking Organizations, Conferences, Publications, and E
    A Summary of Hacking Organizations, Conferences, Publications, and E... http://www.cse.wustl.edu/~jain/cse571-07/ftp/hacking_orgs/ A Summary of Hacking Organizations, Conferences, Publications, and Effects on Society Alisha Cecil [[email protected]] Abstract Since the early 1970's, hackers have been prevalent throughout the computing world. Two main categories of Hackers have evolved: the Open Source and Free Software group and the Security Hackers group. This paper details some of the more notable groups and individuals of each 'category' of hackers, the effects of hacking on society, as well as conferences and publications that they are responsible for that have contributed to the modern hacking world. Table of Contents 1.0 Introduction 2.0 Hacking Sytles 3.0 Hacker Etiquette & Ethics 4.0 Hacking Groups & Individuals 4.1 Open Source & Free Software Hackers 4.2 Security Hackers 4.2.1 Chaos Computer Club (CCC) 4.2.2 Legion of Doom (LoD) 4.2.3 The Mentor 4.2.4 cDc Communications 4.2.5 Shadow Crew 5.0 Hacker Conferences 5.1 Chaos Communication Congress 5.2 SummerCon 5.3 HoHoCon (or Xmas Con) 5.4 DEF CON 5.5 Hackers on Planet Earth (H.O.P.E.) 5.6 Black Hat Briefiengs 6.0 Hacker Publications 6.1 2600: Hacker Quarterly 6.2 Phrack 7.0 Hackers Effects on Society 8.0 Summary List of Acronyms References 1.0 Introduction Since the early 1970's, hackers have been prevalent throughout the computing world. They come in all shapes, 1 of 16 12/19/2007 5:12 PM A Summary of Hacking Organizations, Conferences, Publications, and E..
    [Show full text]