0% found this document useful (0 votes)
53 views6 pages

VAC-Information Security 2021-Report Compressed

Uploaded by

aurshiv123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views6 pages

VAC-Information Security 2021-Report Compressed

Uploaded by

aurshiv123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Value Added Course

INFORMATION AND CYBER SECURITY


Course Outcome:

CO1: Understand the information security, cyber security, physical security and critical
security components, cyber security threat landscape, cyber warfare, cyber crime,
cyber terrorism and cyber espionage (Understand)

CO2: Explain the different security vulnerabilities and various cyber security safeguards
including vulnerabilities in software, network security, weak authentication, poor
cyber security awareness, biometrics, cryptography, Denial of Service Filters,
ethical hacking, firewalls, and online and mobile banking security (Explain)

CO3: Understand how to secure web applications, and services, e-mail security, social
media security, and WiFi security (Understand)

CO4: Analyse various intrusion detection and prevention techniques including physical
theft, unauthorized access, malware infection, network based intrusion detection
and prevention systems (Analyse)

CO5: Understand the cyber security regulations and standards, cyber security
initiatives in India, Information Technology Act, and National Cyber Security
Policy 2013 (Understand)

Module 1 Introduction

Introduction to information and cyber security

Physical security and its importance

Critical security components

Cyber threats:- Cyber security threat landscape, cyber


warfare, cyber crime, cyber terrorism, cyber espionage

Module Outcome:

After completion of this module, the student should be able to:

MO1: Understand the information security, cyber security, physical security and
critical security components (Understand)

MO1: Analyse various cyber threats including cyber security threat landscape,
cyber warfare, cyber crime, cyber terrorism and cyber espionage (Evaluate)
Module 2 Security Vulnerabilities and Safeguards

Security vulnerabilities-Vulnerabilities in software, complex


network architectures and network security, weak
authentication, social engineering, poor cyber security
awareness.

Security safeguards- Access control, authentication, biometrics,


cryptography, denial of service filters, ethical hacking, firewalls,
hacker-attacker-countermeasures, online and mobile banking
security.

Module Outcome:

After completion of this module, the student should be able to:

MO2: Explain the different security vulnerabilities including vulnerabilities in


software, network security, weak authentication, and poor cyber security
awareness (Explain)

MO2: Explain various cyber security safeguards including access control,


authentication, biometrics, cryptography, Denial of Service Filters, ethical
hacking, firewalls, and online and mobile banking security (Explain)

Module 3 Securing Web Applications, Services and Servers

Introduction, basic security for HTTP applications and


services, basic security for SOAP services, e-mail security,
social media security, WiFi security.

Module Outcome:

After completion of this module, the student should be able to:

MO3: Understand how to secure web applications, and services including basic
security for HTTP applications and services, basic security for SOAP
services, e-mail security, social media security, WiFi security (Understand)

Module 4 Intrusion Detection and Prevention

Intrusion, physical theft, unauthorized access, malware


infection, intrusion detection and prevention techniques,
network based intrusion detection and prevention systems.

Module Outcome:

After completion of this module, the student should be able to:

MO4: Analyse various intrusion detection and prevention techniques including


physical theft, unauthorized access, malware infection, network based
intrusion detection and prevention systems (Analyse)

Module 5 Cyberspace and the Law

Introduction, cyber security regulations and standards, cyber


security initiatives in India, Information Technology Act,
National cyber security policy 2013.

Module Outcome:

After completion of this module, the student should be able to:

MO5: Understand the cyber security regulations and standards, cyber


security initiatives in India, Information Technology Act, National Cyber
Security Policy 2013 (Understand)

Activities, Learning Resources and Assessment

Suggested Class Room Activities

 Presentations on selected topics


 Quizzes
 Discussions
 Tutorials

Learning Resources

1. Alazab, Mamoun, and Tang, MingJian (2019). Deep Learning Applications for Cyber Security.
Springer International Publishing.
2. Andress, Jason (2019). Foundations of Information Security: A Straight forward Introduction.
No Starch Press.
3. Awad, Ali Ismail, and Fairhurst, Michael (2018). Information Security: Foundations,
technologies and applications. Institution of Engineering & Technology.
4. Bagad V. S., I. A. Dhotre and Manish Khodaskar, (2019) Information and Cyber Security.
Technical Publications, 2nd Edition
5. Cyber Attacks and Counter Measures: User Perspective
http://uou.ac.in/progdetail?pid=CEGCS-17
6. Cyber Security Techniques http://uou.ac.in/progdetail?pid=CEGCS-17
7. Daras, Nicholas J. (2019) Cyber-Security and Information Warfare. Nova Science Publishers.
8. Fundamentals of Information Security http://uou.ac.in/progdetail?pid=CEGCS-17
9. Ghernaouti-Helie, Solange (2013). Cyber Power: Crime, Conflict and Security in Cyberspace.
EPFL Press.
10. Information System http://uou.ac.in/progdetail?pid=CEGCS-17
11. Introduction to Cyber Security available at http://uou.ac.in/foundation-course
12. Johansen, Gerard (2017).Digital Forensics and Incident Response. Packt Publishing
13. Kizza, Joseph Migga (2014). Computer Network Security and Cyber Ethics. McFarland.
14. Krishna, P. Venkata, Gurumoorthy, Sasikumar, and Obaidat, Mohammad S. (2019) Social
Network Forensics, Cyber Security, and Machine Learning. Springer Singapore.
15. Landoll, Douglas J. (2016). Information Security Policies, Procedures, and Standards: A
Practitioner’s Reference. Auerbach Publications.
16. Li, Kuan-Ching, Chen, Xiaofeng, and Susilo, Willy (2019) Advances in Cyber Security:
Principles, Techniques, and Applications. Springer Singapore.
17. Nishesh Sharma (2017) Cyber Forensics in India: A Legal Perspective. Universal Law
Publishing, 1st Edition.
18. Pachghare V. K. (2019) Cryptography and Information Security. PHI Learning, 3rd, Edition.
19. Prasad, Ramjee, and Rohokale, Vandana (2020) Cyber Security: The Lifeline of Information
and Communication Technology. Springer
20. Surya Prakash Tripathi, Ritendra Goel and Praveen Kumar Shukla (2014) Introduction to
Information Security and Cyber Laws. Dreamtech Press, 1st Edition

Assessment

100 percent summative assessment: 2 hour written exam

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy