0
Program
Semester V
Name
Course Title Cyber Security (Theorv)
Course Code: SEC-5 No. of Credits 03
Contact hours 45Hrs Duration of SEA/Exam 03 hrs
Formative Assessment
Marks I 50 Summative Assessment Marks 50
Course Outcomes (COs): After the successful completion of the course, the student will be able to:
COi After completion of this course, students would be able to understand the concept of
Cvber security and issues and challenges associated with it.
CO2 Students, at the end of this course, should be able to understand the cyber crimes, thei
nature, legal remedies and as to how report the crimes through available platforms an
procedures.
CO3 On completion of this course, students should be able to appreciate various privacy an
security concerns on online Social media and understand the reporting procedure o
inappropriate content, underlying legal aspects and best practices for the use of Socia
media platforms.
After the completion of this module, students would be able to understand the basis
concepts related to E-Commerce and digital payments. They will become familiar wit
CO4 various digital payment modes and related cyber security aspects, RBI guidelines an
preventive measures against digital payment frauds.
Students, after completion of this module will be able to understand the basic sccurit
cos aspects related to Computer and Mobiles. They will be able to use basic tools an
technologies to protect their devices.
Contents 45Hrs
Module-I. Introduction to Cyber security; Defining Cyberspace and Overview o
Computer and Web-technology, Architecture of cyberspace, Communication and wel 09
technology, Internet, World wide web, Advent of internet, Internet infrastructure for date
transfer and governance, Internet society, Regulation of cyberspace, Concept of cybet
securitv. Issues and challenges of cvber security.
Module-II. Cyber-crime and Cyber law: Classification of cybercrimes, Common cyber
crimes- cyber-crime targeting computers and mobiles, cyber crime against women an
09
children, financial frauds, social engineering attacks, malware and ransomware attacks
zero day and zero click attacks, Cybercriminals modus-operandi, Reporting of cybe
crimes, Remedial and mitigation measures, Legal perspective of cyber crime, IT Ac
2000 and its amendments, Cyber-crime and offences, Organisations dealing with Cyber
crime and Cvber securitv in India, Case studies.
Module Ill. Social Media Overview and Security: Introduction to Social networks.
Types of Social media, Social media platforms, Social media monitoring, Hashtag, Viral
content, Social media marketing, Social media privaey, Challenges, opportunities an 08
pitfalls in online social network, Security issues related to social media, Flagging an
reporting of inappropriate content, Laws regarding posting of inappropriate content, Bes
practices for the use of Social media, Case studies.
0
Module IV. Definition of E- Commerce, Main components of E-Commerce, Elements o
E-Commerce security, E-Commerce threats, E-Commerce security best practices
Advantage of e-commerce, Survey of popular e-commerce sites.
Introduction to digital payments, Components of digital payment and stake holders 08
Modes of digital payments- Banking Cards, Unified Payment Interface (UPI), e-Wallets
Unstructured Supplementary Service Data (USSD), Aadhar enabled payments, Digital
payments related common frauds and preventive measures. RBI guidelines on digita
payments and customer protection in unauthorized banking transactions. Relevan
orovisions of Pavment Settlement Act,2007.
Module V. End Point device and Mobile phone security, Password policy, Security
patch management, Data backup, Downloading and management of third-party software
Device security policy, Cyber Security best practices, Significance of host firewall am 11
Am-virus, Management of host firewall and Anti-virus, Wi-Fi security, Configuration of
basic security policv and permissions.
Course Articulation Matrix: Mapping of Course Outcomes (COs) with Program Outcomes
Course Out comes(COs) /Program Program Outcomes (POs)
Outcomes (POs) I 23 45 6i7 8/9 10 II 12 13 14 15
Quickly understand the given problem
and come up with the correct answer
Identify, construct and compute numerical
situations by work with numbers
Conceive and develop a methodology for
analyzing data and solving a problem.
Define, modify and apply critical thinking
to real time situations.
Pedagogy; Problem Solving
Formative Assessment for Theory
Assessment Occasion/type Marks
Internal Testl 30%
Assignment/Surprise Test 20%
Total 50 Marks
Formative Assessment as per guidelines.
Text/References
I Cyber Crime Impact in the New Millennium, by R. C Mishra, Auther Press. Edition 2010
2 Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives by Sumit
Belapure and Nina Godbole, Wiley India Pvt. Ltd. (First Edition, 2011)
3 Security in the Digital Age: Social Media Security Threats and Vulnerabilities by Henry A. Oliver,
reate Space Independent Publishing Platform. (Pearson, 13 November, 2001)
4 vber Laws: Intellectual Property & E-Commerce Security by Kumar K, Dominant Publishers.
5 undamentals of Network Security by E. Maiwald, McGraw Hill.
6 Network Security Bible, Eric Cole, Ronald Krutz, James W. Conley, 2nd Edition,
Wilev India Pvt. Ltd.