Course Objectives:
The course will enable the students to build a career in the field of cyber security.
Course | Learning outcome (at course level) | Learning and teaching strategies | Assessment Strategies | |
Course Code | Course title | |||
24GCAI 301 | INTRODUCTION TO CYBER SECURITY (Theory)
| CO1. Discuss the concept of Cyber Security and issues and challenges associated with it. CO2. Elaborate the Cybercrimes, their nature, legal remedies and as to how to report the crime through available platforms and procedures. CO3. Appraise various privacy and security concerns on online social media and understand the reporting procedure of inappropriate content, underlying legal aspects and best practices for the use of social media platforms. CO4. Discuss the concept of digital payment modes and their related Cyber Security aspects as per RBI guidelines CO5. Analyze the basic security issues related to computer and mobiles. CO6.Contribute effectively in course-specific interaction | Approach in teaching: Interactive Lectures, Discussion, PowerPoint Presentations, Informative videos Learning activities for the students: Self-learning assignments, Effective questions, presentations.
| Assessment tasks will include Class Test on the topics, Semester end examinations, Quiz, Student presentations and assignments. |
Introduction to Cyber Space and overview of Computer and Web Technology, Architecture of Cyber space, Communication and web technology, Internet, world wide web, advent of Internet, Internet Infrastructure for data transfer and governance, Internet society, Regulation of cyberspace, concept of cyber security, Issues and challenges of Cyber security.
Classification of cybercrimes, common cyber crimes-cybercrimes targeting Computer, Cyber Crime against women and children, financial frauds, social engineering attacks, malware and ransomware attacks, zero day and zero click attacks, cybercriminals modus-operandi, reporting of cybercrimes, remedial and mitigation measures, legal perspective of cybercrime , IT Act 2000 and its amendments, cybercrime and offenses, organizations dealing with cybercrime and cyber security in India.
Introduction to social networks. Types of Social media, Social media platforms, Social media monitoring, Hashtag, Viral Content, Social media marketing, Social media Privacy, Challenges, opportunities and pitfalls in online social network, Security issues related to social media, Flagging and reporting of inappropriate content.
Electronic Commerce Definition, main components of E-Commerce, Elements of E-Commerce Security, E-Commerce threats, E-Commerce security best practices. Introduction to digital payments, Components of digital payments and stakeholders, modes of digital payments-banking cards, unified payment interface (UPI), e-wallets, Unstructured Supplementary Service Data (USSD), Aadhar enabled payments, Digital payment related common frauds and preventive measures. RBI guidelines on digital payment and customer protection in unauthorized banking transactions. Relevant provisions of payment settlement Act, 2007.
End point devices and mobile phone security, Password policy, Security Patch management, data backup, Downloading and management of third party software, Device Security policy, Cyber Security Best Practices, Significance of host firewall and Antivirus, Management of host firewall and Antivirus, Wi-Fi Security, Configuration of basic security policy and permissions.
Suggested Text Books:
Suggested Reference Books:
1. Nina Godbole, “Information Systems Security, 2ed: Security Management, Metrics, Frameworks and Best Practices”, Wiley India (1 January 2017), New Delhi
2. Kennetch J. Knapp, “Cyber Security & Global Information Assurance Information Science”,
3. Publishing.
4. Marine R.C,”Cybercrime Impact in the New Millennium”, Auther Press.
5. Henry A. Oliver, “Security in the Digital Age: Social Media Security Threats and Vulnerabilities”, Create Space Independent Publishing Platform.
6. Websites for more information is available on: The Information Technology ACT, 2008- TIFR: https://www.tifrh.res.in
Reference Journals:
1. IEEE Transactions on Dependable and Secure Computing
e-Resources including links
1. https://www.w3schools.com/cybersecurity/