0% found this document useful (0 votes)
16 views4 pages

Cyber Security

Cyber Security Syllabus

Uploaded by

Sawan Sanghvii
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
16 views4 pages

Cyber Security

Cyber Security Syllabus

Uploaded by

Sawan Sanghvii
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 4
B.C.A. (Semester - 5 and Semester - 6) Saurashtra University To be effective from June - 2024 CS-27: Cyber Security Objectivi ‘* Learn the foundations of Cyber Security and threat landscape. ‘* To equip students with the technical knowledge and skills needed to protect and defend against cyber threats. ‘© To expose students to governance, regulatory, legal, economic, environmental, social and ethical contexts of cyber security. * To develop skills in students that can help them plan, implement, and monitor cyber security mechanisms to ensure the protection of information technology assets. Prerequisites: * Basic Computer Skills. * OS and Programming knowledge, Networking Fundamentals ‘Critical Thinking and Problem-Solving Skills Unit No. Topic Detail ‘* Defining Cyberspace and Overview of Computer and Web-technology ‘Architecture of cyberspace, ‘* Communication and web technology, ‘Internet, World wide web, Introduction Advent of internet, 1 | toCyber Security | * Internet infrastructure for data transfer and governance, UY | Internet society, ‘© Regulation of cyberspace * Concept of cyber security ‘Issues and challenges of cyber security ‘Classification of cyber crimes * Common cyber crimes = cyber crime targeting computers and mobiles = Cyber crime against women and children = Financial frauds = Social engineering attacks = Malware and ransomware attacks Cyber Crime = Zero day and zero click attacks 2 | and cyber 7 ‘ow ‘© Cybercriminals modus-operandi ‘© Reporting of cyber crimes «Remedial and mitigation measures + Legal perspective of cyber crime ‘*ITAct 2000 and its amendments Cyber crime and offences ‘© Organisations dealing with Cyber crime and Cyber Security in India + Case studies Page 9 of 21 B.C.A. (Semester - 5 and Semester - 6) Saurashtra University To be effective from June - 2024 Social Media 3 | Overview and Security Introduction to Social networks Types of Social media Social media platforms Social media monitoring Hashtag Viral content Social media marketing, Social media privacy Challenges, opportunities and pitfalls in Online Social Network Security issues related to social media Flagging and reporting of inappropriate content Laws regarding posting of inappropriate content Best practices for the use of Social media Case studies E-commerce 4 | and Digital Payments Definition of E-Commerce Main components of E-Commerce Elements of E-Commerce security E-Commerce threats E-Commerce security best practices Introduction to digital payments Components of digital payment and stake holders Modes of digital payments © Banking Cards © Unified Payment Interface (UP!) o eWallets © Unstructured Supplementary Service Data (USSD) © Aadhar enabled payments Digital payments related common frauds and preventive measures RBI guidelines on digital payments and customer protection in unauthorized banking transactions Relevant provisions of Payment Settlement Act, 2007. Digital Devices Security, 5 | Tools and Technologies for Cyber Security End Point device and Mobile Phone security Password policy Security patch management Data backup Downloading and management of third party software Device security policy Cyber Security best practices Significance of host firewall and Anti-virus Management of host firewall and Anti-virus Wi-Fi security Configuration of basic security policy and permissions Page 10 of 21 B.C.A. (Semester - 5 and Semester - 6) Saurashtra University To be effective from June - 2024 Reference Books: Cyber Crime Impact in the New Millenium, by R. C. Mishra, Auther Press. Edition 2010. Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives by Sumit Belapure and nina Godbole, Wiley India Pvt. Ltd. (First Edition, 2011) Security in the Digital Age: Social Media Security Threats and Vulnerabilities by Henry A. Oliver, Create Space Independent Publishing Platform (Pearson, 13" November, 2001) Electronic Commerce by Elias M. Awad, Prentice Hall of India Pvt. Ltd. Cyber Laws: Intellectual Property & E-Commerce Security by Kumar k, Dominant Publishers Network Security Bible, Eric Cole, Ronald Krutz, James W. Conley, 2° Edition, Wiley India Pvt. Ltd Fundamentals of Network Security by E. Maiwald, McGraw Hill Course Outcomes: After completion of this module, students would be able to understand the concept of Cyber security and issues and challenges associated with it Understand the cyber crimes, their nature, legal remedies and as to how report the crimes through available platforms and procedures. Able to appreciate various privacy and security concerns on online Social media and understand the reporting procedure of inappropriate content, underlying legal aspects and best practices for the use of Social media platforms, Understand the basic concepts related to E-commerce and digital payments. Familiar with various digital payment modes and related cyber security aspects, RBI guidelines and preventive measures against digital payment frauds. Understand the basic security aspects related to Computer and Mobiles. Able to use basic tools and technologies to protect their devices. Suggested Practical: Unit 2: 1) Checklist for reporting cyber crime at Cyber crime Police station. 2) Checklist for reporting cyber crime online 3) Reporting phishing emails. 4) Demonstration of email phishing attack and preventive measures. Unit 3: 1) Basic checklist, privacy and security settings for popular Social media platforms 2) Reporting and redressal mechanism for violations and misuse of Social media platforms. Unit 1) Configuring security settings in Mobile Wallets and UPIs 2) Checklist for secure net banking Page 11 of 21 B.C.A. (Semester - 5 and Semester - 6) Saurashtra University To be effective from June - 2024 Unit 1) Setting, configuring and managing three password policy in the computer (BIOS, Administrator and Standard User). 2), Setting and configuring two factor authentications in the Mobile phone. 3) Security patch management and updates in Computer and Mobiles. 4) Managing Application permissions in Mobile Phone. 5) Installation and configuration of computer Anti-virus, 6) Installation and configuration of Computer Host Firewall. 7) Wi ecurity management in computer and mobile. Page 12 of 21

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy