Vous êtes sur la page 1sur 2

CYBER AND INFORMATION SECURITY

Course code:

BNN 102

Credit Units: 02

Course Objective:
This course is designed for students seeking a broad understanding of Cyber and Information Security. It will
provide the student with basic knowledge of cyber crime dynamics, cyber law & Intellectual property issues, explore
legal & policy developments for dealing fraud using Cyber space. The course will address issues involving hackers,
malware, social theories, protocols, firewalls, and intrusion detection. In addition, this course will discuss the
prevention and security measures.

Learning Outcomes:
So1: scientific & computing foundation: ability to apply knowledge of mathematics, science, engineering and
computing appropriate to the discipline.
So4: design assessment: ability to design a system, component, or process to meet desired needs within realistic
constraints such as economic, environmental, social, political, ethical, health and safety, manufacturability, and
sustainability
So6: professionalism: ability to demonstrate the understanding of professional, ethical, legal, security and social
issues and responsibilities.
Sr.
No.

Course Title
(Course Code)

Cyber
Information
Security

Program
Educational
Objectives
1 2
3
4

Student Outcomes

10

11

12

13

14

&
X

Course Contents:
Module I: Cyber & Information Security Concepts
Cyber security, Information security, Security triad: Confidentiality, Integrity, Availability, Goals for Security,
Security threats and attacks, Basic Terminology : Adware, Back Door, Black Hat, Botnet, Cracker , Phishing,
Polymorphic Virus, Spam , Spoofing, Zombie / Zombie Drone , DOS/DDOS , Trojan Horse , DNS Poisoning, Email
Spoofing, Information Security Services , Web and E-commerce Security.
Module II: Cyber Crimes
Introduction of Cyber Crime: Hacking, Cyber Squatting, Cyber Stalking, Password Cracking, Classic Cybercrime,
Cyber Terrorism, Crimes of deception, Content oriented on line crime, Intrusion Detection, Malicious Software
Detection.: An Overview of online fraud, Identity theft, Intellectual Property Theft, Virtual Crime, Cyber Forensics:
Introduction, Evaluation of crime scene & Evidence Collection, Recovery Process
Module III: Cyber Law & IT Act
Cyber Laws: Jurisdiction and Sovereignty. The IT Act of India 2000, Intellectual Property Rights, Ownership &
Enforcement of IPR, Copy right objective , Transfer of copy right, practical aspect of licensing , benefits,
jurisdictional Issues, copy right in digital media, patents in cyber world, Defenses for Infringement, Security
Standards.
Module IV: Information Security
Security Models, Protection Measures, Software Security and Database Security, Authentication in Distributed
Systems, Insecure Network connections, Information Warfare and Surveillance, Introduction to
Cryptography, Message Authentication and Hash functions, Digital Signatures, Digital Watermarking, Biometric
Security, Overview of Security Management.

Learning Outcomes:

Awareness about Cyber Crimes and Information Security Issues.


Familiarization with existing Cyber Laws.
Acquaintance to Intellectual Property Rights.

Examination Scheme:
Components
Weightage (%)

A
5

CT
10

S/V/Q
8

HA
7

EE
70

CT: Class Test, HA: Home Assignment, S/V/Q: Seminar/Viva/Quiz, EE: End Semester Examination; A: Attendance

Text & Reference:

Mark Merkow, Information Security : Principles and Practices, 1/e, Pearson Education
Marjie T. Britz, Computer Forensics and Cyber Crime : An Introduction, 2/e, Pearson Education
William Stallings, Network Security Essentials (Applications and Standards) Pearson Education.
Joel Scrambray, Vincent Liu, Caleb Sima, Hacking Exposed Web Applications, 3 /e, 2010
Ortmeier, P. J. Security Management: An Introduction, 2nd edition, Prentice Hall., 2005
Skoudis, Ed & Zeltser, Lenny Malware: Fighting Malicious Code. Second Ed. Prentice Hall PTR., 2004
Skoudis, Ed & Liston, Tom, Counter Hack Reloaded, Second Edition. Prentice Hall PTR. Plano, TX , 2006
Wall, David, Cybercrime: The Transformation of Crime in the Information Age. Polity Publishing , 2007
Ross J Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, 2008

Vous aimerez peut-être aussi