VAC-Information Security 2021-Report Compressed
VAC-Information Security 2021-Report Compressed
CO1: Understand the information security, cyber security, physical security and critical
security components, cyber security threat landscape, cyber warfare, cyber crime,
cyber terrorism and cyber espionage (Understand)
CO2: Explain the different security vulnerabilities and various cyber security safeguards
including vulnerabilities in software, network security, weak authentication, poor
cyber security awareness, biometrics, cryptography, Denial of Service Filters,
ethical hacking, firewalls, and online and mobile banking security (Explain)
CO3: Understand how to secure web applications, and services, e-mail security, social
media security, and WiFi security (Understand)
CO4: Analyse various intrusion detection and prevention techniques including physical
theft, unauthorized access, malware infection, network based intrusion detection
and prevention systems (Analyse)
CO5: Understand the cyber security regulations and standards, cyber security
initiatives in India, Information Technology Act, and National Cyber Security
Policy 2013 (Understand)
Module 1 Introduction
Module Outcome:
MO1: Understand the information security, cyber security, physical security and
critical security components (Understand)
MO1: Analyse various cyber threats including cyber security threat landscape,
cyber warfare, cyber crime, cyber terrorism and cyber espionage (Evaluate)
Module 2 Security Vulnerabilities and Safeguards
Module Outcome:
Module Outcome:
MO3: Understand how to secure web applications, and services including basic
security for HTTP applications and services, basic security for SOAP
services, e-mail security, social media security, WiFi security (Understand)
Module Outcome:
Module Outcome:
Learning Resources
1. Alazab, Mamoun, and Tang, MingJian (2019). Deep Learning Applications for Cyber Security.
Springer International Publishing.
2. Andress, Jason (2019). Foundations of Information Security: A Straight forward Introduction.
No Starch Press.
3. Awad, Ali Ismail, and Fairhurst, Michael (2018). Information Security: Foundations,
technologies and applications. Institution of Engineering & Technology.
4. Bagad V. S., I. A. Dhotre and Manish Khodaskar, (2019) Information and Cyber Security.
Technical Publications, 2nd Edition
5. Cyber Attacks and Counter Measures: User Perspective
http://uou.ac.in/progdetail?pid=CEGCS-17
6. Cyber Security Techniques http://uou.ac.in/progdetail?pid=CEGCS-17
7. Daras, Nicholas J. (2019) Cyber-Security and Information Warfare. Nova Science Publishers.
8. Fundamentals of Information Security http://uou.ac.in/progdetail?pid=CEGCS-17
9. Ghernaouti-Helie, Solange (2013). Cyber Power: Crime, Conflict and Security in Cyberspace.
EPFL Press.
10. Information System http://uou.ac.in/progdetail?pid=CEGCS-17
11. Introduction to Cyber Security available at http://uou.ac.in/foundation-course
12. Johansen, Gerard (2017).Digital Forensics and Incident Response. Packt Publishing
13. Kizza, Joseph Migga (2014). Computer Network Security and Cyber Ethics. McFarland.
14. Krishna, P. Venkata, Gurumoorthy, Sasikumar, and Obaidat, Mohammad S. (2019) Social
Network Forensics, Cyber Security, and Machine Learning. Springer Singapore.
15. Landoll, Douglas J. (2016). Information Security Policies, Procedures, and Standards: A
Practitioner’s Reference. Auerbach Publications.
16. Li, Kuan-Ching, Chen, Xiaofeng, and Susilo, Willy (2019) Advances in Cyber Security:
Principles, Techniques, and Applications. Springer Singapore.
17. Nishesh Sharma (2017) Cyber Forensics in India: A Legal Perspective. Universal Law
Publishing, 1st Edition.
18. Pachghare V. K. (2019) Cryptography and Information Security. PHI Learning, 3rd, Edition.
19. Prasad, Ramjee, and Rohokale, Vandana (2020) Cyber Security: The Lifeline of Information
and Communication Technology. Springer
20. Surya Prakash Tripathi, Ritendra Goel and Praveen Kumar Shukla (2014) Introduction to
Information Security and Cyber Laws. Dreamtech Press, 1st Edition
Assessment