BCC301 / BCC401/ CYBER SECURITY
BCC301H / BCC401H
Course Outcome ( CO) Bloom’s Knowledge Level (KL)
At the end of course , the student will be able to
CO 1 Understand the basic concepts of cyber security and cybercrimes. K1, K2
CO 2 Understand the security policies and cyber laws. K1, K2
CO 3 Understand the tools and methods used in cyber crime K2
CO 4 Understand the concepts of cyber forensics K1, K2
CO 5 Understand the cyber security policies and cyber laws K2
DETAILED SYLLABUS
Unit Topic
Lecture
INTRODUCTION TO CYBER CRIME : Cybercrime- Definition and Origins of the word Cybercrime and
Information Security, Who are Cybercriminals? Classifications of Cybercrimes, A Global Perspective
I on Cybercrimes, Cybercrime Era: Survival Mantra for the Netizens.
04
Cyber offenses: How Criminals Plan the Attacks, Social Engineering, Cyber stalking, Cybercafe and
Cybercrimes, Botnets: The Fuel for Cybercrime, Attack Vector.
CYBER CRIME : Mobile and Wireless Devices-Introduction, Proliferation of Mobile and Wireless
Devices, Trends in Mobility, Credit Card Frauds in Mobile and Wireless Computing Era, Security
Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices, Authentication Service
II
Security, Attacks on Mobile/Cell Phones, Mobile Devices: Security Implications for organizations, 04
Organizational Measures for Handling Mobile, Organizational Security Policies and Measures in
Mobile Computing Era.
TOOLS AND METHODS USED IN CYBERCRIME : Introduction, Proxy Servers and Anonymizers,
Phishing, Password Cracking, Keyloggers and Spywares, Virus and Worms, Trojan-horses and
III Backdoors, Steganography, DoS and DDoS At-tacks, SQL Injection, Buffer Overflow, Attacks on 04
Wireless Networks. Phishing and Identity Theft: Introduction to Phishing, Identity Theft (ID Theft).
UNDERSTANDING COMPUTER FORENSICS: Introduction, Digital Forensics Science, The Need for
Computer Forensics, Cyber forensics and Digital Evidence, Forensics Analysis of E-Mail, Digital
Forensics Life Cycle, Chain of Custody Concept, Network Forensics, Approaching a Computer
IV Forensics Investigation. 04
Forensics and Social Networking Sites: The Security/Privacy Threats, Challenges in Computer
Forensics.
INTRODUCTION TO SECURITY POLICIES AND CYBER LAWS : Need for An Information Security
V
Policy, Introduction to Indian Cyber Law, Objective and Scope of the Digital Personal Data 04
Protection Act 2023, Intellectual Property Issues, Overview of Intellectual Property Related
Legislation in India, Patent, Copyright, Trademarks.