0% found this document useful (0 votes)
123 views10 pages

Cyber Security Lab Manual

The document outlines the Cyber Security Lab course objectives and outcomes at Guru Nanak University, focusing on understanding cyber security, analyzing legal frameworks, and promoting self-cyber-protection. It includes a list of experiments related to reporting cyber crimes and securing digital transactions, as well as recommended textbooks and online resources. Additionally, it provides a detailed checklist for reporting cyber crimes online through the Cyber Cell of the Police Department in India.

Uploaded by

Ramadevi Marri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
123 views10 pages

Cyber Security Lab Manual

The document outlines the Cyber Security Lab course objectives and outcomes at Guru Nanak University, focusing on understanding cyber security, analyzing legal frameworks, and promoting self-cyber-protection. It includes a list of experiments related to reporting cyber crimes and securing digital transactions, as well as recommended textbooks and online resources. Additionally, it provides a detailed checklist for reporting cyber crimes online through the Cyber Cell of the Police Department in India.

Uploaded by

Ramadevi Marri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Guru Nanak University

University Institute of Engineering and Technology (UIET)

ET22CS207U Cyber Security Lab L-T-P-C: 0-0-2-1

Course Objectives
Understand Emerging Technologies basic terms and their applications
Analyse and evaluate existing legal framework and laws on cyber security
Analyse and evaluate the digital payment system security and remedial measures
against digital payment frauds.
Creating awareness on self-cyber-protection as well as societal cyber-protection
Course Outcomes
CO1. Understand the concept of Cyber security and issues and challenges associated with
it.
CO2. Understand the cyber crimes, their nature, legal remedies and as to how report the
crimes through available platforms and procedures.
CO3. Appreciate various privacy and security concerns on online Social media and
understand the reporting procedure of inappropriate content, underlying legal aspects
and best practices for the use of Social media platforms.
CO4. Understand the basic concepts related to E-Commerce and digital payments. They
will become familiar with various digital payment modes and related cyber security
aspects, RBI guidelines and preventive measures against digital payment frauds.
CO5. Understand the basic security aspects related to Computer and Mobiles. They will
be able to use basic tools and technologies to protect their devices.

List of experiments
1. Checklist for reporting cyber crime at Cyber crime Police Station.
2. Checklist for reporting cyber crime online.
3. Reporting phishing emails.
4. Demonstration of email phishing attack and preventive measures.
5. Basic checklist, privacy and security settings for popular Social media platforms.
6. Reporting and redressal mechanism for violations and misuse of Social media platforms.
7. Configuring security settings in Mobile Wallets and UPIs.
8. Checklist for secure net banking
9. Setting, configuring and managing three password policy in the computer (BIOS,
Administrator and Standard User).
10. Setting and configuring two factor authentication in the Mobile phone.
11. Security patch management and updates in Computer and Mobiles.
12. Managing Application permissions in Mobile phone.
13. Installation and configuration of computer Anti-virus.
14. Installation and configuration of Computer Host Firewall.
15. Wi-Fi security management in computer and mobile.

Text Book:

1. Cyber Crime Impact in the New Millennium, by R. C Mishra , Auther Press. Edition
2010.
2. Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal
Perspectives by Sumit Belapure and Nina Godbole, Wiley India Pvt. Ltd. (First Edition,
2011)
3. Security in the Digital Age: Social Media Security Threats and Vulnerabilities by Henry
A. Oliver, Create Space Independent Publishing Platform. (Pearson , 13 th November,
2001)
4. Electronic Commerce by Elias M. Awad, Prentice Hall of India Pvt Ltd.
5. Cyber Laws: Intellectual Property & E-Commerce Security by Kumar K, Dominant
Publishers.
6. Network Security Bible, Eric Cole, Ronald Krutz, James W. Conley, 2nd Edition, Wiley
India Pvt. Ltd.
7. Fundamentals of Network Security by E. Maiwald, McGraw Hill.

Reference Book

Online References

NPTEL/ SWAYAM course

Experiment 2
AIM: Checklist for reporting cyber-crime online.

Description: Now you can lodge complaint of cyber-crime online with Cyber Cell of Police
Department for cybercrimes committed all over India like Email Frauds, Social Media crimes,
Mobile App related crimes, Business Email Compromise, Data Theft, Ransomeware, Net
Banking/ATM Frauds, Fake Calls Frauds, Insurance Frauds, Lottery Scam, Bitcoin, Cheating
Scams, Online Transactions Frauds etc. The Cyber Crime Cell of Police Department is a
specialized unit that handles all complex and sensitive cases of cyber-crime including those in
which victims are women and children. The Cyber Crime Cell has modern facilities like Cyber
Lab having cyber forensic capabilities including extraction of deleted data from different
devices.
Steps to Report a Cyber Crime
Step 1: Visit the website of cyber cell https://cybercrime.gov.in/
The following Menu will open

I. Filing Complaint of Women / Child Related Crime

Step 2: For Women and Child Related Crimes Click on WOMEN/ CHILD RELATED
CRIME
Step 3: Chose REPORT ANONYMOUSLY or REPORT AND TRACK Option

i. Reporting the Crime anonymously

If you Chose REPORT ANONYMOUSLY the following Menu will open

Step 4: Click on File Complaint Option

The following menu will open

Step 5: Click on Accept after reading the information

The following Menu will open


Step 6: Fill the information asked in the Menu
Step 7: Click on SAVE & NEXT Option

Step 8: Enter Suspect Details


Step 9 : Click on Preview & Submit Button

Step 10: Click on Submit Button

ii. Report and Track


Step 1: Open Cyber Crime Login option

The following Menu will open


Step 2: Enter Required information
Select State : Select your state from the list

User Name / Complainant Name : Type user name or Complainant


Name

Mobile No: Enter your Mobile No

Step 3: Click on OTP Button

Enter OTP

Enter Security code shown on the screen

Step 4: Login

Step 5: Enter Required information as explained in Para I above and


Lodge Complaint

You might also like