Detailed Syllabus

BCC301 / BCC401 / BCC301H / BCC401H

Course Information

Course Code BCC301 / BCC401 / BCC301H / BCC401H
Course Title Cyber Security
Total Units 5
Total Lectures 20 (4 per unit)
Bloom's Level K1 (Remember), K2 (Understand)

Unit-Wise Syllabus

UNIT I: Introduction to Cyber Crime

  • Cybercrime: Definition and Origins of the word Cybercrime and Information Security
  • Who are Cybercriminals?
  • Classifications of Cybercrimes
  • A Global Perspective on Cybercrimes
  • Cybercrime Era: Survival Mantra for the Netizens
  • Cyber Offenses: How Criminals Plan the Attacks
  • Social Engineering
  • Cyber Stalking
  • Cybercafe and Cybercrimes
  • Botnets: The Fuel for Cybercrime
  • Attack Vector

Lectures: 04 | View Study Material

UNIT II: Cyber Crime - Mobile and Wireless Devices

  • Mobile and Wireless Devices: Introduction
  • Proliferation of Mobile and Wireless Devices
  • Trends in Mobility
  • Credit Card Frauds in Mobile and Wireless Computing Era
  • Security Challenges Posed by Mobile Devices
  • Registry Settings for Mobile Devices
  • Authentication Service Security
  • Attacks on Mobile/Cell Phones
  • Mobile Devices: Security Implications for Organizations
  • Organizational Measures for Handling Mobile
  • Organizational Security Policies and Measures in Mobile Computing Era

Lectures: 04 | View Study Material

UNIT III: Tools and Methods Used in Cybercrime

  • Introduction to Tools and Methods
  • Proxy Servers and Anonymizers
  • Phishing
  • Password Cracking
  • Keyloggers and Spywares
  • Virus and Worms
  • Trojan Horses and Backdoors
  • Steganography
  • DoS and DDoS Attacks
  • SQL Injection
  • Buffer Overflow
  • Attacks on Wireless Networks
  • Phishing and Identity Theft: Introduction to Phishing
  • Identity Theft (ID Theft)

Lectures: 04 | View Study Material

UNIT IV: Understanding Computer Forensics

  • Introduction to Computer Forensics
  • Digital Forensics Science
  • The Need for Computer Forensics
  • Cyber Forensics and Digital Evidence
  • Forensics Analysis of E-Mail
  • Digital Forensics Life Cycle
  • Chain of Custody Concept
  • Network Forensics
  • Approaching a Computer Forensics Investigation
  • Forensics and Social Networking Sites: The Security/Privacy Threats
  • Challenges in Computer Forensics

Lectures: 04 | View Study Material

UNIT V: Introduction to Security Policies and Cyber Laws

  • Need for an Information Security Policy
  • Introduction to Indian Cyber Law
  • Objective and Scope of the Digital Personal Data Protection Act 2023
  • Intellectual Property Issues
  • Overview of Intellectual Property Related Legislation

Lectures: 04 | View Study Material

Course Outcomes Mapping

Unit Primary CO Bloom's Level
Unit I CO1 - Basic concepts of cyber security and cybercrimes K1, K2
Unit II CO1 - Security in mobile and wireless computing K1, K2
Unit III CO3 - Tools and methods used in cyber crime K2
Unit IV CO4 - Concepts of cyber forensics K1, K2
Unit V CO2, CO5 - Security policies and cyber laws K1, K2

Reference Materials

The following textbooks and reference materials are recommended for comprehensive study:

  1. Nina Godbole, Sunit Belapure, "Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives", Wiley India
  2. Thomas J. Mowbray, "Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions", Wiley
  3. Information Technology Act, 2000 (Amended 2008)
  4. Digital Personal Data Protection Act, 2023