CYBER SECURITY
BCC301 / BCC401 / BCC301H / BCC401H
Dr. A.P.J. Abdul Kalam Technical University, Uttar Pradesh
Course Overview
This course provides a comprehensive understanding of cybercrime, security threats, defensive mechanisms, forensic investigation techniques, and the legal framework governing cyberspace. The curriculum is designed to equip students with foundational knowledge essential for information security professionals.
Core Learning Areas
- Cybercrime Fundamentals
- Mobile and Wireless Security
- Attack Tools and Methods
- Digital Forensics
- Cyber Laws and Policies
Introduction to the Course
Cyber Security is a critical discipline in computer science and information technology that focuses on protecting computer systems, networks, programs, and data from digital attacks, unauthorized access, and damage.
The course covers fundamental concepts of cybercrime and its classification, security challenges in mobile and wireless computing environments, tools and methods employed by cybercriminals, computer forensics principles, and the legal and policy frameworks essential for information security professionals.
Examination Focus
This course operates at Bloom's Taxonomy levels K1 (Remember) and K2 (Understand). Questions will primarily test recall of definitions, concepts, and classifications, along with comprehension and explanation of security mechanisms and procedures.
Academic Importance of Cyber Security
The study of Cyber Security holds significant academic and professional relevance in the contemporary digital era:
- Critical Infrastructure Protection: Understanding how to protect essential systems and networks that support national security, economy, and public safety.
- Data Protection: Learning mechanisms to safeguard sensitive personal and organizational data from theft and misuse.
- Legal Compliance: Gaining knowledge of cyber laws and regulations essential for organizations to operate within legal boundaries.
- Career Opportunities: Cyber security professionals are in high demand across government agencies, corporations, and security firms.
- Digital Forensics: Developing skills to investigate cybercrimes and gather digital evidence for legal proceedings.
- Risk Management: Understanding how to assess, mitigate, and manage security risks in information systems.
Course Outcomes
Upon successful completion of this course, students will be able to:
| CO | Course Outcome Description | Level |
|---|---|---|
| CO1 | Understand the basic concepts of cyber security and cybercrimes, including definitions, classifications, and global perspectives on cybercrime. | K1, K2 |
| CO2 | Understand the security policies and cyber laws, including national and international legal frameworks governing cyberspace. | K1, K2 |
| CO3 | Understand the tools and methods used in cyber crime, including attack vectors, malware types, and exploitation techniques. | K2 |
| CO4 | Understand the concepts of cyber forensics, including evidence collection, analysis procedures, and chain of custody principles. | K1, K2 |
| CO5 | Understand the cyber security policies and cyber laws applicable to information systems and digital transactions. | K2 |
Bloom's Taxonomy Knowledge Levels
This course primarily operates at the following cognitive levels:
| Level | Category | Description | Application in Course |
|---|---|---|---|
| K1 | Remember | Recall of facts, terms, basic concepts, and definitions | Defining cybercrime, listing types of malware, recalling legal provisions |
| K2 | Understand | Comprehension of concepts, explaining ideas, interpreting information | Explaining attack mechanisms, describing forensic procedures, interpreting security policies |
Course Structure
| Unit | Title | Focus Areas | Lectures |
|---|---|---|---|
| I | Introduction to Cyber Crime | Definitions, classifications, cybercriminals, attack vectors | 04 |
| II | Mobile and Wireless Devices | Mobile security challenges, authentication, organizational policies | 04 |
| III | Tools and Methods | Malware, proxies, password cracking, attack techniques | 04 |
| IV | Computer Forensics | Evidence collection, chain of custody, forensic procedures | 04 |
| V | Security Policies and Laws | IT Act, DPDP Act 2023, intellectual property, compliance | 04 |
Total Lectures: 20