24BCA530
24BCA530
Course Outcomes:
Upon successful completion of this course, students will be able to,
CO1: Understand the broad set of technical, social & political aspects of Cyber Security.
CO2: To understand various types of cyber-attacks and cyber-crimes and to study the defensive
techniques against these attacks
CO3: Understand the nature of secure software development, operating systems and data base
Design.
CO4: To learn threats and risks within context of the cyber security and will be able to have an
overview of the cyber laws & concepts of cyber forensics
CO5: Have an overview of the cyber laws & concepts of cyber forensics.
Basic Cyber Security Concepts, layers of security, Vulnerability, threat, Harmful acts, Internet
Governance – Challenges and Constraints, Computer Criminals, CIA Triad, Assets and Threat,
motive of attackers, active attacks, passive attacks, Software attacks, hardware attacks, Cyber
Threats-Cyber Warfare, Cyber Crime, Cyber terrorism, Cyber Espionage, etc., Comprehensive
Cyber Security Policy.
Introduction, Cyber Security Regulations, Roles of International Law. The INDIAN Cyberspace,
National Cyber Security Policy. Introduction, Historical background of Cyber forensics, Digital
Forensics Science, The Need for Computer Forensics, Cyber Forensics and Digital evidence,
Forensics Analysis of Email, Digital Forensics Lifecycle, Forensics Investigation, Challenges in
Computer Forensics.
Unit:3: Cybercrime: Mobile and Wireless Devices: 7 Hours
Introduction, Proliferation of Mobile and Wireless Devices, Trends in Mobility, Credit card Frauds
in Mobile and Wireless Computing Era, Security Challenges Posed by Mobile Devices, Registry
Settings for Mobile Devices, Authentication service Security, Attacks on Mobile/Cell Phones,
Organizational security Policies and Measures in Mobile Computing Era, Laptops.
Introduction, cost of cybercrimes and IPR issues, web threats for organizations, security and
privacy implications, social media marketing: security risks and perils for organizations, social
computing and the associated challenges for organizations.
Unit 5: Privacy Issues: Basic Data Privacy Concepts: 10 Hours
Fundamental Concepts, Data Privacy Attacks, Data linking and profiling, privacy policies and their
specifications, privacy policy languages, privacy in different domains- medical, financial, etc
Text Books:
1. https://digitalguardian.com/blog/what-cyber-security
2. https://www.forcepoint.com/cyber-edu/cybersecurity
https://www.youtube.com/watch?v=inWWhr5tnEA
CO1 3 2 2 2 1 1 1 1 1 2 2
CO2 3 2 1 2 1 1 2
CO3 3 2 2 2 2 2 1 2
CO4 3 2 2 2 2 2 1 1 1 2
CO5 3 2 2 2 2 1 1 1 2 2