CyberSecuritySyllabus V Semester
CyberSecuritySyllabus V Semester
Name Semester V
Course Title Cyber Security (Theory)
Course Code: SEC-5 No. of Credits 03
Contact hours 45Hrs Duration of SEA/Exam 03 Hrs
Formative Assessment
Marks 40 Summative Assessment Marks 60
Course Outcomes (COs): After the successful completion of the course, the student will be able to:
CO1 After completion of this course, students would be able to understand the concept of
Cyber security and issues and challenges associated with it.
CO2 Students, at the end of this course, should be able to understand the cyber crimes, their
nature, legal remedies and as to how report the crimes through available platforms and
procedures.
CO3 On completion of this course, students should be able to appreciate various privacy and
security concerns on online Social media and understand the reporting procedure of
inappropriate content, underlying legal aspects and best practices for the use of Social
media platforms.
After the completion of this module, students would be able to understand the basic
concepts related to E-Commerce and digital payments. They will become familiar with
CO4 various digital payment modes and related cyber security aspects, RBI guidelines and
preventive measures against digital payment frauds.
Students, after completion of this module will be able to understand the basic security
CO5 aspects related to Computer and Mobiles. They will be able to use basic tools and
technologies to protect their devices.
Contents 45Hrs
Module-I. Introduction to Cyber security: Defining Cyberspace and Overview of
Computer and Web-technology, Architecture of cyberspace, Communication and web 09
technology, Internet, World wide web, Advent of internet, Internet infrastructure for data
transfer and governance, Internet society, Regulation of cyberspace, Concept of cyber
security, Issues and challenges of cyber security.
Module-II. Cyber-crime and Cyber law: Classification of cybercrimes, Common cyber-
09
crimes- cyber-crime targeting computers and mobiles, cyber crime against women and
children, financial frauds, social engineering attacks, malware and ransomware attacks,
zero day and zero click attacks, Cybercriminals modus-operandi, Reporting of cyber
crimes, Remedial and mitigation measures, Legal perspective of cyber crime, IT Act
2000 and its amendments, Cyber-crime and offences, Organisations dealing with Cyber-
crime and Cyber security in India, Case studies.
Module III. Social Media Overview and Security: Introduction to Social networks.
Types of Social media, Social media platforms, Social media monitoring, Hashtag, Viral
content, Social media marketing, Social media privacy, Challenges, opportunities and 08
pitfalls in online social network, Security issues related to social media, Flagging and
reporting of inappropriate content, Laws regarding posting of inappropriate content, Best
practices for the use of Social media, Case studies.
Module IV. Definition of E- Commerce, Main components of E-Commerce, Elements of
E-Commerce security, E-Commerce threats, E-Commerce security best practices,
Advantage of e-commerce, Survey of popular e-commerce sites.
Introduction to digital payments, Components of digital payment and stake holders, 08
Modes of digital payments- Banking Cards, Unified Payment Interface (UPI), e-Wallets,
Unstructured Supplementary Service Data (USSD), Aadhar enabled payments, Digital
payments related common frauds and preventive measures. RBI guidelines on digital
payments and customer protection in unauthorized banking transactions. Relevant
provisions of Payment Settlement Act,2007.
Module V. End Point device and Mobile phone security, Password policy, Security
patch management, Data backup, Downloading and management of third-party software,
Device security policy, Cyber Security best practices, Significance of host firewall and 11
Ant-virus, Management of host firewall and Anti-virus, Wi-Fi security, Configuration of
basic security policy and permissions.
Course Articulation Matrix: Mapping of Course Outcomes (COs) with Program Outcomes
Course Out comes(COs) /Program Program Outcomes (POs)
Outcomes (POs) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Quickly understand the given problem
and come up with the correct answer
Identify, construct and compute numerical
situations by work with numbers
Conceive and develop a methodology for
analyzing data and solving a problem.
Define, modify and apply critical thinking
to real time situations.
Text/References
1 Cyber Crime Impact in the New Millennium, by R. C Mishra, Auther Press. Edition 2010
2 Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives by Sumit
Belapure and Nina Godbole, Wiley India Pvt. Ltd. (First Edition, 2011)
3 Security in the Digital Age: Social Media Security Threats and Vulnerabilities by Henry A. Oliver,
Create Space Independent Publishing Platform. (Pearson , 13th November, 2001)
4 Cyber Laws: Intellectual Property & E-Commerce Security by Kumar K, Dominant Publishers.
5 Fundamentals of Network Security by E. Maiwald, McGraw Hill.
6 Network Security Bible, Eric Cole, Ronald Krutz, James W. Conley, 2nd Edition,
Wiley India Pvt. Ltd.