INTRODUCTION TO CYBER SECURITY

Paper Code: 
24GCAI301
Credits: 
04
Periods/week: 
04
Max. Marks: 
100.00
Objective: 

Course Objectives:

The course will enable the students to build a career in the field of cyber security.

 

Course Outcomes: 

Course

Learning outcome

(at course level)

Learning and teaching strategies

Assessment Strategies

Course Code

Course

title

24GCAI 301

INTRODUCTION TO CYBER SECURITY (Theory)

 

CO1. Discuss the concept of Cyber Security and issues and challenges associated with it.

CO2.  Elaborate the Cybercrimes, their nature, legal remedies and as to how to report the crime through available platforms and procedures.

CO3. Appraise various privacy and security concerns on online social media and understand the reporting procedure of inappropriate content, underlying legal aspects and best practices for the use of social media platforms.

CO4. Discuss the concept of digital payment modes and their related Cyber Security aspects as per RBI guidelines

CO5. Analyze the basic security issues related to computer and mobiles.

CO6.Contribute effectively in course-specific interaction

Approach in teaching:

Interactive Lectures, Discussion, PowerPoint Presentations, Informative videos

Learning activities for the students: 

Self-learning assignments, Effective questions, presentations.

 

 

 

Assessment tasks will include Class Test on the topics, Semester end examinations, Quiz, Student presentations and assignments.

 

12.00
Unit I: 
Introduction to Cyber Security

Introduction to Cyber Space and overview of Computer and Web Technology, Architecture of Cyber space, Communication and web technology, Internet, world wide web, advent of Internet, Internet Infrastructure for data transfer and governance, Internet society, Regulation of cyberspace, concept of cyber security, Issues and challenges of Cyber security.

 

12.00
Unit II: 
Cybercrime and Cyber Law

Classification of cybercrimes, common cyber crimes-cybercrimes targeting Computer, Cyber Crime against women and children, financial frauds, social engineering attacks, malware and ransomware attacks, zero day and zero click attacks, cybercriminals modus-operandi, reporting of cybercrimes, remedial and mitigation measures, legal perspective of cybercrime , IT Act 2000 and its amendments, cybercrime and offenses, organizations dealing with cybercrime and cyber security in India.

 

12.00
Unit III: 
Social Media Overview and Security

Introduction to social networks. Types of Social media, Social media platforms, Social media monitoring, Hashtag, Viral Content, Social media marketing, Social media Privacy, Challenges, opportunities and pitfalls in online social network, Security issues related to social media, Flagging and reporting of inappropriate content.

 

12.00
Unit IV: 
E-Commerce and Digital Payments

Electronic Commerce Definition, main components of E-Commerce, Elements of E-Commerce Security, E-Commerce threats, E-Commerce security best practices. Introduction to digital payments, Components of digital payments and stakeholders, modes of digital payments-banking cards, unified payment interface (UPI), e-wallets, Unstructured Supplementary Service Data (USSD), Aadhar enabled payments, Digital payment related common frauds and preventive measures. RBI guidelines on digital payment and customer protection in unauthorized banking transactions. Relevant provisions of payment settlement Act, 2007.

 

12.00
Unit V: 
Digital Devices Security, Tools and Technologies for Cyber Security

End point devices and mobile phone security, Password policy, Security Patch management, data backup, Downloading and management of third party software, Device Security policy, Cyber Security Best Practices, Significance of host firewall and Antivirus, Management of host firewall and Antivirus, Wi-Fi Security, Configuration of basic security policy and permissions.

 

ESSENTIAL READINGS: 

Suggested Text Books:

  1. Nina Godbole, Sunit Belapure, “Cyber Security”, Wiley India, 2014, ISBN-13 No.: 9788126521791.
  2. E.Maiwald,“Fundamentals of Network Security”, Mc Graw Hills

 

REFERENCES: 

Suggested Reference Books:

1.     Nina Godbole, “Information Systems Security, 2ed: Security Management, Metrics, Frameworks and Best Practices”, Wiley India (1 January 2017), New Delhi

2.     Kennetch J. Knapp, “Cyber Security & Global Information Assurance Information Science”,

3.     Publishing.

4.     Marine R.C,”Cybercrime Impact in the New Millennium”, Auther Press.

5.     Henry A. Oliver, “Security in the Digital Age: Social Media Security Threats and Vulnerabilities”, Create Space Independent Publishing Platform.

6.     Websites for more information is available on: The Information Technology ACT, 2008- TIFR: https://www.tifrh.res.in

 

Reference Journals:

1.     IEEE Transactions on Dependable and Secure Computing

2.     Journal of Cybersecurity

3.     IET Information Security

 

e-Resources including links

1.     https://www.w3schools.com/cybersecurity/

2.     https://www.javatpoint.com/cyber-security-tutorial

3.     https://www.geeksforgeeks.org/cyber-security-tutorial/

Academic Year: