0% found this document useful (1 vote)
267 views

Cyber Security

This document provides an overview of a cyber security course. The course aims to teach students about cyber threats, cybercrimes, and how to protect information technology assets. The course objectives are to expose students to the cyber security landscape, relevant legal and ethical issues, and technical skills to defend against cyber threats. The course outcomes include understanding cyber attacks and legal frameworks, analyzing digital payment security and social media use, and increasing awareness of cybersecurity best practices. The course covers topics such as cybercrime and law, social media security, e-commerce and digital payments, and security tools and technologies. References for further reading are also provided.
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
267 views

Cyber Security

This document provides an overview of a cyber security course. The course aims to teach students about cyber threats, cybercrimes, and how to protect information technology assets. The course objectives are to expose students to the cyber security landscape, relevant legal and ethical issues, and technical skills to defend against cyber threats. The course outcomes include understanding cyber attacks and legal frameworks, analyzing digital payment security and social media use, and increasing awareness of cybersecurity best practices. The course covers topics such as cybercrime and law, social media security, e-commerce and digital payments, and security tools and technologies. References for further reading are also provided.
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 3

Course Code: L T P C

CYBER SECURITY

PRE-REQUISITE:

Knowledge of computer networks

Knowledge of cryptography and network security

OBJECTIVES:

1. Learn the foundations of Cyber security and threat landscape

2..To expose students to governance, regulatory, legal, economic, environmental, social and
ethical contexts of cyber security.
3.. To develop skills in students that can help them plan, implement, and monitor cyber
security mechanisms to ensure the protection of information technology assets
4.. To expose students to responsible use of online social media networks
5. To equip students with the technical knowledge and skills needed to protect and defend
against cyber threats
COURSE OUTCOME:

CO1: Understand the cyber security threat landscape with various types of cyber-attacks,
cybercrimes, vulnerabilities and remedies
CO2: Analyse and evaluate existing legal framework and laws on cyber security.
CO3: Analyse and evaluate the digital payment system security and remedial measures against
digital payment frauds
CO4: Evaluate and communicate the human role in security systems with an emphasis on
ethics, social engineering vulnerabilities and training
CO5: Increase awareness about cyber-attack vectors and safety against cyber-frauds. And take
measures for self-cyber-protection as well as societal cyber-protection

MAPPING WITH PROGRAMME OUTCOMES:


PO PO PO PO PO PO PO PO PO PO PO PO PS PS PS
1 2 3 4 5 6 7 8 9 10 11 12 01 02 03
CO1 S L M M
CO2 S M L
CO3 S M
C04 M L M S
CO5
S - Strong M – Medium L – Low
UNIT I: Introduction to Cyber security
Defining Cyberspace and Overview of Computer and Web-technology, Architecture of
cyberspace, Communication and web technology, Internet, World wide web, Advent of
internet, Internet infrastructure for data transfer and governance, Internet society,
Regulation of cyberspace, Concept of cyber security, Issues and challenges of cyber security.
UNIT II: Cybercrime and Cyber law

Classification of cybercrime, Common cybercrimes- cybercrime targeting computers and


mobiles, cybercrime against women and children, financial frauds, social engineering
attacks, malware and ransom ware attacks, zero day and zero click attacks, Cybercriminals
modus-operandi , Reporting of cybercrimes, Remedial and mitigation measures, Legal
perspective of cybercrime, IT Act 2000 and its amendments, Cybercrime and offences,
Organizations dealing with Cybercrime and Cyber security in India, Case studies.
UNIT III: Social Media Overview and Security
Introduction to Social networks. Types of Social media, Social media platforms, Social
media monitoring, Hash tag, Viral content, Social media marketing, Social media privacy,
Challenges, opportunities and pitfalls in online social network, Security issues related to social
media, Flagging and reporting of inappropriate content, Laws regarding posting of
inappropriate content, Best practices for the use of Social media, Case studies.
UNIT IV: E - C o m m e r c e and Digital Payments
Definition of E- Commerce, Main components of E-Commerce, Elements of E-Commerce
security, E-Commerce threats, E-Commerce security best practices, Introduction to digital
payments, Components of digital payment and stake holders, Modes of digital payments-
Banking Cards, Unified Payment Interface (UPI), e-Wallets, Unstructured Supplementary
Service Data (USSD), Aadhar enabled payments, Digital payments related common frauds
and preventive measures. RBI guidelines on digital payments and customer protection in
unauthorized banking transactions. Relevant provisions of Payment Settlement Act,2007,
UNIT V: Digital Devices S e c u r i t y Tools and Technologies for Cyber Security
End Point device and Mobile phone security, Password policy, Security patch management,
Data backup, Downloading and management of third party software, Device security policy,
Cyber Security best practices, Significance of host firewall and Ant-virus, Management of host
firewall and Anti-virus, Wi-Fi security, Configuration of basic security policy and permissions

REFERENCES:
1. Cyber Crime Impact in the New Millennium, by R. C Mishra , Auther Press. Edition 2010.

2. Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives by
Sumit Belapure and Nina Godbole, Wiley India Pvt. Ltd. (First Edition, 2011)

3. Security in the Digital Age: Social Media Security Threats and Vulnerabilities by Henry A.
Oliver, Create Space Independent Publishing Platform. (Pearson , 13th November, 2001)

4. Electronic Commerce by Elias M. Awad, Prentice Hall of India Pvt Ltd.


5. Cyber Laws: Intellectual Property & E-Commerce Security by Kumar K, Dominant Publishers.

6. Network Security Bible, Eric Cole, Ronald Krutz, James W. Conley, 2nd Edition, Wiley India
Pvt. Ltd.
Fundamentals of Network Security by E. Maiwald, McGraw Hill.

PREPARED BY:

Dr.D.THAMARAISELVI AP/CSE

You might also like