0% found this document useful (0 votes)
38 views

24BCA530

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views

24BCA530

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

JSS Science and Technology University, Mysuru

Department of Computer Applications


IV Semester Bachelor of Computer Applications
[BCA]
Course Category Course Category Discipline
Code: DSC-17 Name: Core-17
Course Code: 24BCA530 Course Title: Cyber Security
Credit Structure
Total Credits: 3 (L:T:P): 3:0:0
Total Hours: 40 Max. Marks: 100
Prerequisite: Data Communication and networks
Assessment in Weightage and marks

CIE SEE TOTAL


Weightage 40% 60% 100%
Maximum Marks 40 60 100
Minimum Marks 20 25 23

Course Outcomes:
Upon successful completion of this course, students will be able to,
CO1: Understand the broad set of technical, social & political aspects of Cyber Security.
CO2: To understand various types of cyber-attacks and cyber-crimes and to study the defensive
techniques against these attacks
CO3: Understand the nature of secure software development, operating systems and data base
Design.
CO4: To learn threats and risks within context of the cyber security and will be able to have an
overview of the cyber laws & concepts of cyber forensics
CO5: Have an overview of the cyber laws & concepts of cyber forensics.

Unit:1: Introduction 8 Hours

Basic Cyber Security Concepts, layers of security, Vulnerability, threat, Harmful acts, Internet
Governance – Challenges and Constraints, Computer Criminals, CIA Triad, Assets and Threat,
motive of attackers, active attacks, passive attacks, Software attacks, hardware attacks, Cyber
Threats-Cyber Warfare, Cyber Crime, Cyber terrorism, Cyber Espionage, etc., Comprehensive
Cyber Security Policy.

Unit:2: Cyberspace and the Law & Cyber Forensics 8 Hours

Introduction, Cyber Security Regulations, Roles of International Law. The INDIAN Cyberspace,
National Cyber Security Policy. Introduction, Historical background of Cyber forensics, Digital
Forensics Science, The Need for Computer Forensics, Cyber Forensics and Digital evidence,
Forensics Analysis of Email, Digital Forensics Lifecycle, Forensics Investigation, Challenges in
Computer Forensics.
Unit:3: Cybercrime: Mobile and Wireless Devices: 7 Hours

Introduction, Proliferation of Mobile and Wireless Devices, Trends in Mobility, Credit card Frauds
in Mobile and Wireless Computing Era, Security Challenges Posed by Mobile Devices, Registry
Settings for Mobile Devices, Authentication service Security, Attacks on Mobile/Cell Phones,
Organizational security Policies and Measures in Mobile Computing Era, Laptops.

Unit:4: Cyber Security: Organizational Implications: 7 Hours

Introduction, cost of cybercrimes and IPR issues, web threats for organizations, security and
privacy implications, social media marketing: security risks and perils for organizations, social
computing and the associated challenges for organizations.
Unit 5: Privacy Issues: Basic Data Privacy Concepts: 10 Hours
Fundamental Concepts, Data Privacy Attacks, Data linking and profiling, privacy policies and their
specifications, privacy policy languages, privacy in different domains- medical, financial, etc

Cybercrime: Examples and Mini-Cases Examples: Official Website of Maharashtra Government


Hacked, Indian Banks Lose Millions of Rupees, Parliament Attack, Pune City Police Bust Nigerian
Racket, e-mail spoofing instances. Mini-Cases: The Indian Case of online Gambling, An Indian
Case of Intellectual Property Crime, Financial Frauds in Cyber Domain.

Text Books:

1. Nina Godbole and SunitBelpure, Cyber Security Understanding Cyber Crimes,Computer


Forensics and Legal Perspectives, Wiley.
2. B.B. Gupta, D.P. Agrawal, HaoxiangWang,” ComputerandCyberSecurity:Principle s,
Algorithm, Applications, and Perspectives”, CRC Press, ISBN 9780815371335,2018.
Reference Books:
1. Cyber Security Essentials, James Graham, Richard Howard and Ryan Otson,
CRCPress.
2. Introduction to Cyber Security, Chwan-Hwa(john) Wu,J. David Irwin, CRC Press
T&FGroup.
Additional Learning Resources:

1. https://digitalguardian.com/blog/what-cyber-security
2. https://www.forcepoint.com/cyber-edu/cybersecurity
https://www.youtube.com/watch?v=inWWhr5tnEA

Program Outcomes PSO’ s


Course
Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 P012 PSO1 PSO2 PSO3

CO1 3 2 2 2 1 1 1 1 1 2 2
CO2 3 2 1 2 1 1 2
CO3 3 2 2 2 2 2 1 2
CO4 3 2 2 2 2 2 1 1 1 2
CO5 3 2 2 2 2 1 1 1 2 2

1---Low association, 2--- Moderate association, 3---High association

You might also like