Cyber Security-updated-R01

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Course Name: Cyber Security

Course Code: TEE7098


Faculty: Engineering
Course Credit: 2
Course Level: 1
Sub-Committee (Specialization): Computer Science

Learning Objectives:
The students will be able to-
1. Understand the fundamentals of cyber security.
2. Understand basic cryptography algorithms.
3. Understand basics of ethical hacking.
4. Understand the different cyber laws and their importance.
Pre-requisites:
No pre-requisite needed.

Course Outline:

Unit No. Details Hours


1 Introduction to Cyber Security: 8
Basic Cyber Security Concepts, layers of security, Vulnerability,
Threat, Harmful acts, Internet Governance Challenges and
Constraints, Computer Criminals, CIA Triad, Assets and Threats,
Motive of attackers, Active attacks, Passive attacks, Software
attacks, hardware attacks, Cyber Threats-Cyber Warfare, Cyber
Crime, Cyber Terrorism, Cyber Espionage, etc., Comprehensive
Cyber Security PolicyCase Study - Recent cyber attack

2 Cyber Laws: 8
Introduction, Evolution of the IT act, Essentials of Cyber Security and
Cyber Law, Features of IT Act 2000, Amendments in IT Act and its
effects, Importance of Technology, and Internet Policies in security
plan, Power of arrest without warrant under the IT Act, 2000,
Cybercrime and criminal justice : penalties, adjudication and appeals
under the IT Act, 2000, The Indian Evidence Act of 1872 v.
Information Technology Act, 2000Case study Recent cybercrime
against any country/state/organization punished under Cyber law

3 Introduction to Cryptography: 7
Encryption/Decryption, Introduction of Symmetric and Asymmetric
Key algorithms, Study Digital Signatures, Hash Function, Public Key
Infrastructure, demonstration of Cryptool to understand cryptography
algorithms
4 Introduction to Digital Forensics: 7
Digital Forensics, Darknet and Darkweb, Malware analysis, Intrusion
Detection SystemSecurity Tools demo: Virtual Lab setup, working
with Kali Linux, Google dorking commands, NMap demo
Total 30
Recommended Books:

Sr. Book title Authors Publishers


No.
1 Applied Cryptography - Protocols, Schneier, B. John Wiley and
Algorithms, and Source Code in C, Sons, 1995
Second Edition.
2. Computer Security Gollmann, D. Wiley, 1999
3. Cryptography - Theory and Practice Stinson D. CRC Press, Boca
Raton, FA, 1995
4. Cyber Security: Understanding Cyber Godbole Wiley India Pvt
Crimes, Computer Forensics And Legal Ltd.
Perspectives, First Edition
5. Firewalls and Internet Security: Repelling Cheswick W., Bellovin S. Addison-Wesley
the Wily Hacker
6. Fundamentals of Computer Security Amoroso E. Prentice-Hall
Technology
7. Practical Unix and Internet Security Garfinkel S., Spafford G. O'Reilly
8. Security Engineering: A Guide to Anderson R. Wiley
Building
Dependable Distributed Systems
9. Web Security: A Step-by-Step Reference Stein L. Addison Wesley
Guide Longman, Inc.,
1998

Pedagogy:
1. Classroom Lectures
2. Experiential Learning
3. Hands-on demo

Evaluation:
A. Continuous Assessment
a. Essential
i. Unit Tests
ii. Assignments
b. Optional
i. Quizzes
ii. Mini Project
Course Outcomes:

The student will be able to


CO1: Illustrate the fundamentals of cyber security.
CO2: Summarizing the different cyber laws and their importance.
CO3: Explain various cryptography algorithms and demonstrate using Cryptool.
CO4: Illustrate and demonstrate the essential of ethical hacking & digital forensics.

Course Articulation Matrix:

1: Slight (Low) 2: Moderate (Medium) 3: Substantial (High)


PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 2 3 3 2 2
CO2 3 3 2 2
CO3
2 2 3 3 2 2
CO4
2 3 3

Name of the experts designing the course :

Sr. No. Name Designation Organization/ Institute


1
Dr. Sonali Kothari Associate Professor SIT, Lavale
2 Principal IT Security Johnson and Johnson,
Mr. Mahesh Pavaskar
Architect Brussels, Belgium

You might also like