0% found this document useful (0 votes)
197 views1 page

Cyber Security

The document outlines the course outcomes and detailed syllabus for BCC301/BCC401 Cyber Security. Students will learn about cyber security concepts, cyber laws, tools used in cyber crime, and cyber forensics. The syllabus covers topics such as definitions of cyber crime, mobile device security, cyber crime methods, and the importance of security policies.

Uploaded by

shivgovindvns
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
197 views1 page

Cyber Security

The document outlines the course outcomes and detailed syllabus for BCC301/BCC401 Cyber Security. Students will learn about cyber security concepts, cyber laws, tools used in cyber crime, and cyber forensics. The syllabus covers topics such as definitions of cyber crime, mobile device security, cyber crime methods, and the importance of security policies.

Uploaded by

shivgovindvns
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

BCC301 / BCC401/ CYBER SECURITY

BCC301H / BCC401H
Course Outcome ( CO) Bloom’s Knowledge Level (KL)

At the end of course , the student will be able to

CO 1 Understand the basic concepts of cyber security and cybercrimes. K1, K2

CO 2 Understand the security policies and cyber laws. K1, K2

CO 3 Understand the tools and methods used in cyber crime K2

CO 4 Understand the concepts of cyber forensics K1, K2

CO 5 Understand the cyber security policies and cyber laws K2

DETAILED SYLLABUS
Unit Topic
Lecture
INTRODUCTION TO CYBER CRIME : Cybercrime- Definition and Origins of the word Cybercrime and
Information Security, Who are Cybercriminals? Classifications of Cybercrimes, A Global Perspective
I on Cybercrimes, Cybercrime Era: Survival Mantra for the Netizens.
04
Cyber offenses: How Criminals Plan the Attacks, Social Engineering, Cyber stalking, Cybercafe and
Cybercrimes, Botnets: The Fuel for Cybercrime, Attack Vector.

CYBER CRIME : Mobile and Wireless Devices-Introduction, Proliferation of Mobile and Wireless
Devices, Trends in Mobility, Credit Card Frauds in Mobile and Wireless Computing Era, Security
Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices, Authentication Service
II
Security, Attacks on Mobile/Cell Phones, Mobile Devices: Security Implications for organizations, 04
Organizational Measures for Handling Mobile, Organizational Security Policies and Measures in
Mobile Computing Era.

TOOLS AND METHODS USED IN CYBERCRIME : Introduction, Proxy Servers and Anonymizers,
Phishing, Password Cracking, Keyloggers and Spywares, Virus and Worms, Trojan-horses and
III Backdoors, Steganography, DoS and DDoS At-tacks, SQL Injection, Buffer Overflow, Attacks on 04
Wireless Networks. Phishing and Identity Theft: Introduction to Phishing, Identity Theft (ID Theft).

UNDERSTANDING COMPUTER FORENSICS: Introduction, Digital Forensics Science, The Need for
Computer Forensics, Cyber forensics and Digital Evidence, Forensics Analysis of E-Mail, Digital
Forensics Life Cycle, Chain of Custody Concept, Network Forensics, Approaching a Computer
IV Forensics Investigation. 04
Forensics and Social Networking Sites: The Security/Privacy Threats, Challenges in Computer
Forensics.

INTRODUCTION TO SECURITY POLICIES AND CYBER LAWS : Need for An Information Security
V
Policy, Introduction to Indian Cyber Law, Objective and Scope of the Digital Personal Data 04
Protection Act 2023, Intellectual Property Issues, Overview of Intellectual Property Related
Legislation in India, Patent, Copyright, Trademarks.

You might also like