0% found this document useful (0 votes)
250 views

Cyber Security 5th Sem MCQ

Cyber Security

Uploaded by

sdvsbba1996
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
250 views

Cyber Security 5th Sem MCQ

Cyber Security

Uploaded by

sdvsbba1996
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 4
vad wine, LAE’ exjorayoad Be exyioriah, vageat s6sgO- 04, vloccanbaky, ree - So58 ~ Gaye stonfgSB+ Yer? ~ 2021) RANI CHANNAMMA UNIVERSITY Vidyasangama, National Highway - 04, Bhootaramanahatti, Belagavi - 591156 (NAAC Accredited with B+ Grade - 2021) E-mail:academic@rcubacin HOTUAS modmFoa Website:www.rcubacin Phone No. 0831-2565214/34 et Office of the Registrar KO. Dora), joaTOD/ 18 Deport /2023-24/ Z BLE amo 0 JAN 4 Bees Salo: 2023-248 Zgebe mOnod mass Kacxerid Sde AOvzZo°S Cyber Security Descriptive scseen MCQ(Multiple Choice Questions) ssaechss woz. : Aa, HOMEY wmoects O208:30-01-2024 abeoydad Azioh merle wgeddgod, & ahaod ag mss sdmamodriv mpmabrobried semajciedond, 2023-248¢ ¥grls meno MBE dacderid Sée Aas Cyber Security wxjobs atecdgchss Omperierk Descriptive adorn MCQ(Multiple Choice Questions) SmamamA & sheos SeneOnd, AOO Oeladt veay shodecin acawds Ha gabsiah, & Dagedodoodi ongseond. er" eh Dard 2 Ovo aly “dem ‘omg. Sec-crmen secummy eeg> ‘aso, 1. mpmobrdh, xortog, coaiep igiah dele hy chmdoRvad, ema, 2. RBRODFE, emA, DnadzoY dey morose ery Rocants MEE admamPai. 3 1. Sentry ex madraberis, cond UAE AgOMA, Sem. 2. ox xeimVOD, ood thiEh aYxaoROAd, demd. 3, womibomtises (Poginss), ceed Has dgdayoad, Sema. 4, Om BS © scanned with OKEN Scanner Rani Channamma University Belagavi Vidyasangama,NH-04,Bhutaramanahatti,Belagavi-591156 All UG Programmes [ BA, BSc, BCom, BBA, BCA, BSW ] Syllabus of Cyber Security (SEC) For V Semester 2023-24 onwards © scanned with OKEN Scanner Program ~All the Under Graduate Course Title regezammes Semester v — Course Codes| SEC-g Theory) x - Contact hours | 4SHrs @ hsiweek) Duration of SEAT Te Formative Assessment Min Marks 50 Summative Assessment Marks cg) hed att 7 mata at he nd of this course, should be able to understand the Gybererimes Te Procedures, “™edies and as to how report the crimes through available platforms ard 0 7 - - CO: On complet 71 OF this Course, students should be able to appreciate various privacy an security oncems on online Socal media and understand the reporting procedure o Np lent, underlyin, q i inappropriate eo lying legal aspects and best practices for the use of Social After the completion of this module, students would be able To understand Whe basi co4 | SoncePls related to E-Commerce and digital payments. They will become familiar wit 4 J various digital payment modes and related eyber security aspects, RB guidelines and Preventive measures against digital payment frauds, Students, after completion of this module will be able to understand the basic security COS | aspects related to Computer and Mobiles, They will be able to use basic tools an technologies to protect their devices. Contents 45Hrs Module-I. Introduction to Cyber security: Defining Cyberspace and Overview Computer and Web-technology, Architecture of cyberspace, Communication and wel] 09 technology, Internet, World wide web, Advent of internet, Internet infrastructure for deta transfer and governance, Internet society, Regulation of cyberspace, Concept of cybe security, Issues and challenges of cyber security. Module-II. Cyber-erime and Cyber law: Classification of oybererimes, Common eyber crimes- cyber-crime targeting computers and mobiles, cyber crime against women and 09 children, financial frauds, social engineering attacks, malware and ransomwate attacks, zero day and zero click attacks, Cybercriminals modus-operandi, Reporting of cybe crimes, Remedial and mitigation measures, Legal perspective of cyber crime, IT Act 2000 and its amendments, Cyber-crime and offences, Organisations dealing with Cyber. crime and Cyber security in India, Case studies. Module TH. Social Media Overview and Security: Introduction to Social networks Types of Social media, Social media platforms, Social media monitoring, Hash tag, Viral content, Social media marketing, Social media privacy, Challenges, opportunities and 98 pitfalls in online social network, Security issues related to social media, Flagging ant Teporting of inappropriate content, Laws regarding posting of inappropriate content, Best Practices for the use of Social media, Case studies. © scanned with OKEN Scanner Module IV. Definition of E- Commerce, Main components of E-Commieree, Elements 0 E-Commerce, security, E-Commerce threats, E-commerce security best. practices ‘Advantage of e-commerce, Survey of popular e-commerce sites, Introduction to digital payments, Components of digital payment and stake holders] 9g Modes of digital payments- Banking Cards, Unified Payment interface (UPI), e-Wallets; Unstructured Supplementary Service Data (USSD), Aadhar enabled payments, Digital ayments related common frauds and preventive measures. RBI gl ines on digital] ayments and customer protection in unauthorized banking transactions. Relevant provisions of Payment Settlement Act,2007, Module V. End Point device and Mobile phone security, Password policy, Securit patch management, Data backup, Downloading and management of third-party software, Device security policy, Cyber Security best practices, Significance of host firewall and Ant-virus, Management of host firewall and Anti-virus, Wi-Fi security, Configuration of basic security policy and permissions. Course Articulation Matrix: Mapping of Course Outcomes (COs) with Program Outcomes Course Out comes(COs) Program Program Outcomes (POs) Outcomes (POs) T7744 7 a9 10] 1) 2) 3] 14] 15 Quickly understand the given problem and come up with the correct answer Identify, construct and compute numerical situations by work with numbers Conceive and develop a methodology for analyzing data and solving a problem. Define, modify and apply critical thinking to real time situations. Pedagogy: Problem Solving (iz aR Formative Assessment for Theory” bes ae ‘Assessment Occasion/type @ Marks: Internal Tests 30 “Assignment/Surprise Test 20 50 Marks “Marks Semester End Exam (MCQ Type) 50. Sp Questions. each carries | mark, ferences - i 1 (yber Crime Impact in the New Millennium, by R. C 2 ber Lawst Intellectual Property & E-Commerce Security by Kumar K, Dominant Publishers, ‘undamentals of Network Security by E. Maiwald, McGraw Hill. Security Bible, Eric Cole, Ronald Krutz, James W. Conley, 2nd ition, Wiley India Pvt. Ltd. vel) Joy 5 © scanned with OKEN Scanner

You might also like