0% found this document useful (0 votes)
276 views

Digital Awareness

This document outlines a course on digital awareness and cyber security for third year bachelor's degree students. The course aims to teach students how to safely and securely use digital tools and the internet. It is divided into 5 units that will cover topics such as web browsers, email, digital payments, e-governance services, social media, cyber security, and cyber crimes. The course is worth 2 credits and will include 30 lectures over the semester. Students will be evaluated through an external objective assessment worth 50 marks.

Uploaded by

dj.newsense7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
276 views

Digital Awareness

This document outlines a course on digital awareness and cyber security for third year bachelor's degree students. The course aims to teach students how to safely and securely use digital tools and the internet. It is divided into 5 units that will cover topics such as web browsers, email, digital payments, e-governance services, social media, cyber security, and cyber crimes. The course is worth 2 credits and will include 30 lectures over the semester. Students will be evaluated through an external objective assessment worth 50 marks.

Uploaded by

dj.newsense7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Part A Introduction

Program: Degree Class: B.A./B.Sc./B.Com./B.H.Sc./BCA Year: III Year Session: 2023-24


Subject: Foundation Course
1. Course Code X3-FCBD1T
2. Course Title Digital Awareness - Cyber Security
3. Course Type Ability Enhancement Compulsory Course
4. Pre-requisite (if Compulsory for all Third Year students
any)
5. Course Learning After completing the course, student will be able to :
outcomes (CLO)
● Make optimum use of web browsers, search engines and Chatbots
● Creating e-mail account, sending, receiving and managing emails.
● Describe reporting procedure of phishing emails.
● Identify email phishing attack and preventive measures.
● Configure security settings in Mobile Wallets and UPIs.
● Practice safe, legal and ethical means of using Information
Technology.
● Practice and use the various online financial and government services
of day-to-day use.
● Understand the basic concepts related to E-Commerce and digital
payments.
● Discuss cyber security aspects, RBI guidelines and preventive
measures against digital payment frauds.
● Explore and learn the online available courses of his/her interest.
● Use the Digilocker and Academic Bank of Credit.
● Describe the concept of Cyber security and issues and challenges
associated with it. .
● Explain the process of reporting cyber crime at Cyber crime Police
Station/ at online platform.
● Appreciate various privacy and security concerns on online Social
media.
● Guide through the reporting procedure of inappropriate content.
● Perform privacy and security settings for popular Social media
platforms.
6. Credit Value 2
7. Total Marks Max. Marks: 50 Min. Marks:
Part B – Content of the Course

Total No. of Lectures 30 ( 01 hour per week)


Unit Topics No. of
Lectures

I Overview of Computer and Web-technology, Architecture of cyberspace, World wide 05


web, Advent of internet, Internet infrastructure for data transfer and governance,
Internet society.
Use of Internet: Web browsers, search engines and Chatbots. Difference between
Website & Portal, E-mail: Account opening, sending & receiving e-mails, managing
Contacts & Folders.
Computer Security: Issues & protection, firewall & antivirus, making secure online
transactions. Internet safety and digital security. Ethical use of digital resources,
Measures of Online Self Protection.
Keywords: Browser, Search Engine, Website, Virus, Security, Firewall, Cyber
Ethics.
II Digital Payments and e-Commerce: 07
Internet Banking: National Electronic Fund Transfer (NEFT), Real Time Gross
Settlement (RTGS), Immediate Payment Service (IMPS)
Digital Financial Tools: Understanding OTP [One Time Password], QR [Quick
Response] Code, UPI [Unified Payment Interface], AEPS [Aadhaar Enabled Payment
System]; USSD [Unstructured Supplementary Service Data], Card [Credit / Debit],
eWallet, PoS [Point of Sale]
Definition of E-Commerce- Main components of E-Commerce, Elements of E-
Commerce security, E-Commerce threats, E-Commerce security best practices, Online
Bill Payment. Digital payments related common frauds and preventive measures. RBI
guidelines and provisions of Payment Settlement Act, 2007.
Keywords:Inetrnet Banking, Digital Financial Tools, eWallet, e-Commerce
Security.
III e-Governance Service- 06
Overview of e-Governance Services like Railway Reservation, passport, eHospital;
Accessing various e-Governance Services on Mobile Using “UMANG APP”.
Exploring services and resources of Government of India Portal
(https://www.mygov.in/).
Digi-Locker: About digilocker, features and benefits of digilocker, Registering,
accessing and getting various certificates and mark sheets on digilocker.
Academic Bank of Credit (ABC): About ABC, features and benefits of ABC,
Registering, accessing, getting and sharing academic credits.
Exploring Online Learning resources: Online learning through SWAYAM Central,
(https://swayam.gov.in/) and e-pathshala (https://epathshala.nic.in/).
Keywords: Internet Banking, NEFT, RTGS, IMPS, OTP, UPI, QR Code, AEPS, E-
Governance, Umang.
IV Introduction to Cyber security- 05
Regulation of cyberspace, Concept of cyber security, Issues and challenges of cyber
security.
Definition of cyber crimes and offences, Cyber crime targeting computers and mobiles,
Cyber crime against women and children, Cyber bullying. Financial frauds, Social
engineering attacks, Malware and Ransomware attacks, zero day and zero click attacks.
Cyber criminals modus-operandi, Reporting of cyber crimes, Remedial and mitigation
measures, Legal perspective of cyber crime, IT Act 2000 and its amendments,
Organisations dealing with Cyber crime and Cyber security in India, Case studies.
Keywords: Cyber Space, Cyber Security, Cyber Offences, Zero Click Attack, Zero
Day Attack, Ransomware, Reporting Cyber Crimes, Cyber Crimes Case Studies.
V Social Media Overview and Security- 06
Introduction to Social Networks, Types of Social media, Social media platforms, Social
media monitoring, Hashtag, Viral content, Social media marketing, Social media
privacy, Challenges, opportunities and pitfalls in online social network, Security issues
related to social media, Flagging and reporting of inappropriate content, Laws regarding
posting of inappropriate content, Best practices for the use of Social media, Case
studies.
Keywords: Social Media Platforms, Hashtagging, Social Media Marketing,
flagging of contents in social media.
Part C-Learning Resources

Text Books, Reference Books, Other resources


Suggested Readings:
● Praveen Kumar Shukla, Surya Prakash Tripathi, Ritendra Goel “Introduction to Information Security
and Cyber Laws” Dreamtech Press.
● Vivek Sood, “Cyber law simplified”, Tata McGrawHill, Education (India).
● T. Bradley "Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security”.
● Cyber Crime Impact in the New Millennium, by R. C Mishra , Auther Press. Edition 2010.
● Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives by Sumit
Belapure and Nina Godbole, Wiley India Pvt. Ltd. (First Edition, 2011)
● Security in the Digital Age: Social Media Security Threats and Vulnerabilities by Henry A. Oliver,
Create Space Independent Publishing Platform. (Pearson , 13th November, 2001)
● Electronic Commerce by Elias M. Awad, Prentice Hall of India Pvt Ltd.
● Cyber Laws: Intellectual Property & E-Commerce Security by Kumar K, Dominant Publishers.
● Network Security Bible, Eric Cole, Ronald Krutz, James W. Conley, 2nd Edition, Wiley India Pvt. Ltd.
● Fundamentals of Network Security by E. Maiwald, McGraw Hill

Reference Books:
● M. Stamp, “Information Security: Principles and Practice”, Wiley.

● David J. Loundy, “Computer Crime, Information Warfare, And Economic Espionage”, Carolina
Academic Press.
Suggested equivalent online courses: e-reading:

● http://egyankosh.ac.in//handle/123456789/9489
● https://workspace.google.com/intl/en_in/training/
● https://www.classcentral.com/course/openlearn-science-maths-technology-preparing-your-96104
● https://www.udemy.com/course/free-computer-literacy-101-course/
● https://www.mygov.in/
● https://epathshala.nic.in/
● https://www.digilocker.gov.in/
● https://www.abc.gov.in/
● https://swayam.gov.in/

PART D: Assessment and Evaluation

Suggested Evaluation Methods:


Maximum Marks: 50
University Exam (UE): 50 Marks
External Assessment: 50 Objective type questions 50 Marks
University Exam (UE):
Time : 01.00 Hours
Any remarks/suggestions:
भाग अ - प रचय

काय म: उपा ध क ा: बी.ए.एससी.बी/.कॉम.बी/.एससी.एच.बी/./बी.सी.ए. वष:तत


ृ ीय स : 2023-24

वषय: आधार पा य म
1 पा म का कोड X3-FCBD1T
2 पा म का शीषक डिजटल जाग कता -साइबर सुर ा
3 पा म का कार यो यता संवधन अ नवाय पा य म

4 पूवापे ा तत
ृ ीय वष के सभी व या थय के लए अ नवाय
(Prerequisite)
(य द कोई हो)
5 पा म अ ययन इस पा म के सफल समापन पर, िव ाथ िन म स म ह गे:
क प रलि धयां ● वेब ाउज़र, सच इंजन और चैटबॉ स का उपयोग ।
(कोस ल नग ● ई-मेल खाता बनाना, ईमेल भेजना, ा त करना और बंधन ।
आउटकम) (CLO)
ं ईमेल क रपो टग क
● फ़ शग या का वणन ।
● ईमेल फ़ शंग अटै क और नवारक उपाय क पहचान ।
● मोबाइल वॉलेट और UPI म सुर ा से टं स कॉि फ़गर करना ।
● सूचना ौ यो गक का उपयोग करने के सुर त, कानूनी और नै तक
मानक के साथ योग ।
● दै नक उपयोग क व भ न ऑनलाइन व ीय और सरकार सेवाओं का
उपयोग ।
● ई-कॉमस व डिजटल भुगतान संबंधी बु नयाद अवधारणाओं क समझ ।
● साइबर सुर ा पहलुओं, आरबीआई के दशा नदश और डिजटल भुगतान म
धोखाधड़ी के नवारक उपाय ।
● उसक च के ऑनलाइन उपल ध पा य म को ए स लोर करना ।
● डिजलॉकर और अकाद मक बक ऑफ े डट का उपयोग ।
● साइबर सुर ा क अवधारणा और इससे जड़ु े मु द और चुनौ तयां ।
● साइबर अपराध पु लस टे शन/ऑनलाइन लेटफॉम पर साइबर अपराध क
रपोट करने क या ।
● ऑनलाइन सोशल मी डया पर व भ न गोपनीयता और सुर ा ।
● अनप
ु यु त साम ी क रपो टग या ।
● लोक य सोशल मी डया लेटफॉम के लए गोपनीयता और सुर ा से टंग।
6 े िडट मान 2
7 कु ल अंक अिधकतम अंक: 50 यूनतम उ ीण अंक:
भाग ब- पा य म क वषयव तु

कुल या यान सं या- 30 ( त स ताह 01 घंटा)


इकाई िवषय ा यान सं या
(1 घंटा/ ा यान)
I कं यट
ू र और वेब- ौ यो गक का अवलोकन, साइबर पेस का आ कटे चर, 05
व ड वाइड वेब, इंटरनेट का आगमन, डेटा ांसफर और गवनस के लए
इंटरनेट इं ा चर, इंटरनेट समाज।
इंटरनेट का उपयोग: वेब ाउज़र, सच इंजन और चैटबॉ स। वेबसाइट और
पोटल, ई-मेल के बीच अंतर, ई-मेल खाता खोलना, ई-मेल भेजना और ा त
करना, कॉ टे स और फ़ो डर का बंधन।
कं यट
ू र सरु ा: मु दे और सरु ा, फ़ायरवॉल और एंट वायरस, सरु त
ऑनलाइन लेनदे न करना। इंटरनेट सुर ा और डिजटल सुर ा। डिजटल
संसाधन का नै तक उपयोग, ऑनलाइन आ म सुर ा के उपाय।
Keywords: Browser, Search Engine, Website, Virus, Security,
Firewall, Cyber Ethics.
II डिजटल भुगतान और ई-कॉमस: 08
इंटरनेट ब कं ग: नेशनल इले ॉ नक फंड ांसफर (एनईएफट ), र यल टाइम
ॉस सेटलमट (आरट जीएस), त काल भुगतान सेवा (आईएमपीएस)
डिजटल व ीय उपकरण: ओट पी [वन टाइम पासवड], यआ
ू र [ि वक
र पांस] कोड, यप
ू ीआई [यू नफाइड पेमट इंटरफेस], एईपीएस [आधार स म
भुगतान णाल ] को समझना; USSD [अन चड स ल म स वस डेटा],
काड [ े डट/डे बट], ई-वॉलेट, PoS [ वाइंट ऑफ सेल]
ई-कॉमस क प रभाषा- ई-कॉमस के मु य घटक, ई-कॉमस सरु ा के त व,
ई-कॉमस स ब धी खतरे , ई-कॉमस सुर ा सव म थाएं, ऑनलाइन बल
भुगतान। डिजटल भुगतान से संबं धत आम धोखाधड़ी और नवारक
उपाय। आरबीआई के दशा नदश और भग
ु तान नपटान अ ध नयम, 2007
के ावधान।
Keywords:Inetrnet Banking, Digital Financial Tools, eWallet, e-
Commerce Security.
III ई-गवनस स वस- 06
रे लवे आर ण, पासपोट, ई-अ पताल जैसी ई-गवनस सेवाओं का अवलोकन;
"उमंग ऐप" का उपयोग करके मोबाइल पर व भ न ई-गवनस सेवाओं तक
पहुंचना। भारत सरकार के पोटल (https://www.mygov.in/) क सेवाओं
और संसाधन क खोज करना।
डजी-लॉकर: डिजलॉकर के बारे म, डिजलॉकर क वशेषताएं और लाभ,
डजीलॉकर पर वभ न माणप और माकशीट को पंजीकृत करना,
ए सेस करना और ा त करना।
अकाद मक बक ऑफ े डट (एबीसी): एबीसी का ववरण, एबीसी क
वशेषताएं और लाभ, पंजीकरण, पहुंच, अकाद मक े डट ा त करना और
साझा करना।
ऑनलाइन श ण संसाधन क खोज: SWAYAM Central
(https://swayam.gov.in/) और ई-पाठशाला (https://epathshala.nic.in/)
के मा यम से ऑनलाइन श ण।
Keywords: Internet Banking, NEFT, RTGS, IMPS, OTP, UPI,
QR Code, AEPS, E-Governance, Umang.
IV साइबर सरु ा का प रचय- 05
साइबर पेस का व नयमन, साइबर सुर ा क अवधारणा, साइबर सुर ा के
मु दे और चुनौ तयाँ।
साइबर अपराध और उ लंघन क प रभाषा, कं यट
ू र और मोबाइल को
ल त साइबर अपराध, म हलाओं और ब च के खलाफ साइबर अपराध,
साइबर बु लंग। व ीय धोखाधड़ी, सोशल इंजी नय रंग हमले, मैलवेयर और
रसमवेयर हमले, जीरो डे और जीरो ि लक अटै क।
साइबर अपरा धय क काय णाल -, साइबर अपराध क रपो टग,
उपचारा मक और शमन उपाय, साइबर अपराध का कानूनी प र े य, आईट
अ ध नयम 2000 और इसके संशोधन, भारत म साइबर अपराध और
साइबर सुर ा से नपटने वाले संगठन, केस टडी।
Keywords: Cyber Space, Cyber Security, Cyber Offences, Zero
Click Attack, Zero Day Attack, Ransomware, Reporting Cyber
Crimes, Cyber Crimes Case Studies.
V सोशल मी डया अवलोकन और सुर ा- 06
सोशल नेटवक का प रचय, सोशल मी डया के कार, सोशल मी डया
लेटफॉम, सोशल मी डया मॉ नट रंग, हैशटै ग, वायरल कंटट, सोशल मी डया
माक टंग, सोशल मी डया ाइवेसी, ऑनलाइन सोशल नेटवक म चुनौ तयां,
अवसर और नक
ु सान, सोशल मी डया से संबं धत सरु ा मु दे , लै गंग और
अनप
ु यु त साम ी क रपो टग, अनप
ु यु त साम ी पो ट करने के संबंध
म कानून, सोशल मी डया के उपयोग के लए थाएं, केस टडी।
Keywords: Social Media Platforms, Hashtagging, Social Media
Marketing, flagging of contents in social media.
भाग स-अनुशिं सत अ ययन संसाधन
पा पु तक, संदभ पु तक, अ य संसाधन
अनुशिं सत सहायक पु तक / थ/अ य पा संसाधन/पा साम ी:
Suggested Readings:
● Praveen Kumar Shukla, Surya Prakash Tripathi, Ritendra Goel “Introduction to Information
Security and Cyber Laws” Dreamtech Press.
● Vivek Sood, “Cyber law simplified”, Tata McGrawHill, Education (India).
● T. Bradley "Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless
Security”.
● Cyber Crime Impact in the New Millennium, by R. C Mishra , Auther Press. Edition 2010.
● Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives by
Sumit Belapure and Nina Godbole, Wiley India Pvt. Ltd. (First Edition, 2011)
● Security in the Digital Age: Social Media Security Threats and Vulnerabilities by Henry A.
Oliver, Create Space Independent Publishing Platform. (Pearson , 13th November, 2001)
● Electronic Commerce by Elias M. Awad, Prentice Hall of India Pvt Ltd.
● Cyber Laws: Intellectual Property & E-Commerce Security by Kumar K, Dominant Publishers.
● Network Security Bible, Eric Cole, Ronald Krutz, James W. Conley, 2nd Edition, Wiley India
Pvt. Ltd.
● Fundamentals of Network Security by E. Maiwald, McGraw Hill

Reference Books:
● M. Stamp, “Information Security: Principles and Practice”, Wiley.

● David J. Loundy, “Computer Crime, Information Warfare, And Economic Espionage”, Carolina
Academic Press.

अनुशिं सत समक ऑनलाइन पा म:


Suggested equivalent online courses: e-reading:

● http://egyankosh.ac.in//handle/123456789/9489
● https://workspace.google.com/intl/en_in/training/
● https://www.classcentral.com/course/openlearn-science-maths-technology-preparing-
your-96104
● https://www.udemy.com/course/free-computer-literacy-101-course/
● https://www.mygov.in/
● https://epathshala.nic.in/
● https://www.digilocker.gov.in/
● https://www.abc.gov.in/
● https://swayam.gov.in/
भाग द - अनुशिं सत मू यांकन िविधयां:

अनुशिं सतसतत मू यांकन िविधयां:


अिधकतम अंक: 50
िव िव ालयीनपरी ा (UE) अंक:50
आकलन :
व तुिन - 50 50
िव िव ालयीन परी ा:
समय- 01.00 घंटे
कोई ट पणी/सुझाव:

You might also like