Detailed Syllabus
BCC301 / BCC401 / BCC301H / BCC401H
Course Information
| Course Code | BCC301 / BCC401 / BCC301H / BCC401H |
|---|---|
| Course Title | Cyber Security |
| Total Units | 5 |
| Total Lectures | 20 (4 per unit) |
| Bloom's Level | K1 (Remember), K2 (Understand) |
Unit-Wise Syllabus
UNIT I: Introduction to Cyber Crime
- Cybercrime: Definition and Origins of the word Cybercrime and Information Security
- Who are Cybercriminals?
- Classifications of Cybercrimes
- A Global Perspective on Cybercrimes
- Cybercrime Era: Survival Mantra for the Netizens
- Cyber Offenses: How Criminals Plan the Attacks
- Social Engineering
- Cyber Stalking
- Cybercafe and Cybercrimes
- Botnets: The Fuel for Cybercrime
- Attack Vector
Lectures: 04 | View Study Material
UNIT II: Cyber Crime - Mobile and Wireless Devices
- Mobile and Wireless Devices: Introduction
- Proliferation of Mobile and Wireless Devices
- Trends in Mobility
- Credit Card Frauds in Mobile and Wireless Computing Era
- Security Challenges Posed by Mobile Devices
- Registry Settings for Mobile Devices
- Authentication Service Security
- Attacks on Mobile/Cell Phones
- Mobile Devices: Security Implications for Organizations
- Organizational Measures for Handling Mobile
- Organizational Security Policies and Measures in Mobile Computing Era
Lectures: 04 | View Study Material
UNIT III: Tools and Methods Used in Cybercrime
- Introduction to Tools and Methods
- Proxy Servers and Anonymizers
- Phishing
- Password Cracking
- Keyloggers and Spywares
- Virus and Worms
- Trojan Horses and Backdoors
- Steganography
- DoS and DDoS Attacks
- SQL Injection
- Buffer Overflow
- Attacks on Wireless Networks
- Phishing and Identity Theft: Introduction to Phishing
- Identity Theft (ID Theft)
Lectures: 04 | View Study Material
UNIT IV: Understanding Computer Forensics
- Introduction to Computer Forensics
- Digital Forensics Science
- The Need for Computer Forensics
- Cyber Forensics and Digital Evidence
- Forensics Analysis of E-Mail
- Digital Forensics Life Cycle
- Chain of Custody Concept
- Network Forensics
- Approaching a Computer Forensics Investigation
- Forensics and Social Networking Sites: The Security/Privacy Threats
- Challenges in Computer Forensics
Lectures: 04 | View Study Material
UNIT V: Introduction to Security Policies and Cyber Laws
- Need for an Information Security Policy
- Introduction to Indian Cyber Law
- Objective and Scope of the Digital Personal Data Protection Act 2023
- Intellectual Property Issues
- Overview of Intellectual Property Related Legislation
Lectures: 04 | View Study Material
Course Outcomes Mapping
| Unit | Primary CO | Bloom's Level |
|---|---|---|
| Unit I | CO1 - Basic concepts of cyber security and cybercrimes | K1, K2 |
| Unit II | CO1 - Security in mobile and wireless computing | K1, K2 |
| Unit III | CO3 - Tools and methods used in cyber crime | K2 |
| Unit IV | CO4 - Concepts of cyber forensics | K1, K2 |
| Unit V | CO2, CO5 - Security policies and cyber laws | K1, K2 |
Reference Materials
The following textbooks and reference materials are recommended for comprehensive study:
- Nina Godbole, Sunit Belapure, "Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives", Wiley India
- Thomas J. Mowbray, "Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions", Wiley
- Information Technology Act, 2000 (Amended 2008)
- Digital Personal Data Protection Act, 2023