0 ratings0% found this document useful (0 votes) 237 views4 pagesCyber Security
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
B.C.A. (Semester - 5 and Semester - 6)
Saurashtra University
To be effective from June - 2024
CS-27: Cyber Security
Objectivi
‘* Learn the foundations of Cyber Security and threat landscape.
‘* To equip students with the technical knowledge and skills needed to protect and defend
against cyber threats.
‘© To expose students to governance, regulatory, legal, economic, environmental, social and
ethical contexts of cyber security.
* To develop skills in students that can help them plan, implement, and monitor cyber
security mechanisms to ensure the protection of information technology assets.
Prerequisites:
* Basic Computer Skills.
* OS and Programming knowledge, Networking Fundamentals
‘Critical Thinking and Problem-Solving Skills
Unit
No. Topic Detail
‘* Defining Cyberspace and Overview of Computer and Web-technology
‘Architecture of cyberspace,
‘* Communication and web technology,
‘Internet, World wide web,
Introduction
Advent of internet,
1 | toCyber
Security | * Internet infrastructure for data transfer and governance,
UY | Internet society,
‘© Regulation of cyberspace
* Concept of cyber security
‘Issues and challenges of cyber security
‘Classification of cyber crimes
* Common cyber crimes
= cyber crime targeting computers and mobiles
= Cyber crime against women and children
= Financial frauds
= Social engineering attacks
= Malware and ransomware attacks
Cyber Crime
= Zero day and zero click attacks
2 | and cyber 7
‘ow ‘© Cybercriminals modus-operandi
‘© Reporting of cyber crimes
«Remedial and mitigation measures
+ Legal perspective of cyber crime
‘*ITAct 2000 and its amendments
Cyber crime and offences
‘© Organisations dealing with Cyber crime and Cyber Security in India
+ Case studies
Page 9 of 21B.C.A. (Semester - 5 and Semester - 6)
Saurashtra University
To be effective from June - 2024
Social Media
3 | Overview and
Security
Introduction to Social networks
Types of Social media
Social media platforms
Social media monitoring
Hashtag
Viral content
Social media marketing, Social media privacy
Challenges, opportunities and pitfalls in Online Social Network
Security issues related to social media
Flagging and reporting of inappropriate content
Laws regarding posting of inappropriate content
Best practices for the use of Social media
Case studies
E-commerce
4 | and Digital
Payments
Definition of E-Commerce
Main components of E-Commerce
Elements of E-Commerce security
E-Commerce threats
E-Commerce security best practices
Introduction to digital payments
Components of digital payment and stake holders
Modes of digital payments
© Banking Cards
© Unified Payment Interface (UP!)
o eWallets
© Unstructured Supplementary Service Data (USSD)
© Aadhar enabled payments
Digital payments related common frauds and preventive measures
RBI guidelines on digital payments and customer protection in
unauthorized banking transactions
Relevant provisions of Payment Settlement Act, 2007.
Digital
Devices
Security,
5 | Tools and
Technologies
for Cyber
Security
End Point device and Mobile Phone security
Password policy
Security patch management
Data backup
Downloading and management of third party software
Device security policy
Cyber Security best practices
Significance of host firewall and Anti-virus
Management of host firewall and Anti-virus
Wi-Fi security
Configuration of basic security policy and permissions
Page 10 of 21B.C.A. (Semester - 5 and Semester - 6)
Saurashtra University
To be effective from June - 2024
Reference Books:
Cyber Crime Impact in the New Millenium, by R. C. Mishra, Auther Press. Edition 2010.
Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives by Sumit
Belapure and nina Godbole, Wiley India Pvt. Ltd. (First Edition, 2011)
Security in the Digital Age: Social Media Security Threats and Vulnerabilities by Henry A. Oliver,
Create Space Independent Publishing Platform (Pearson, 13" November, 2001)
Electronic Commerce by Elias M. Awad, Prentice Hall of India Pvt. Ltd.
Cyber Laws: Intellectual Property & E-Commerce Security by Kumar k, Dominant Publishers
Network Security Bible, Eric Cole, Ronald Krutz, James W. Conley, 2° Edition, Wiley India Pvt. Ltd
Fundamentals of Network Security by E. Maiwald, McGraw Hill
Course Outcomes:
After completion of this module, students would be able to understand the concept of
Cyber security and issues and challenges associated with it
Understand the cyber crimes, their nature, legal remedies and as to how report the
crimes through available platforms and procedures.
Able to appreciate various privacy and security concerns on online Social media and
understand the reporting procedure of inappropriate content, underlying legal aspects
and best practices for the use of Social media platforms,
Understand the basic concepts related to E-commerce and digital payments.
Familiar with various digital payment modes and related cyber security aspects, RBI
guidelines and preventive measures against digital payment frauds.
Understand the basic security aspects related to Computer and Mobiles.
Able to use basic tools and technologies to protect their devices.
Suggested Practical:
Unit 2:
1) Checklist for reporting cyber crime at Cyber crime Police station.
2) Checklist for reporting cyber crime online
3) Reporting phishing emails.
4) Demonstration of email phishing attack and preventive measures.
Unit 3:
1) Basic checklist, privacy and security settings for popular Social media platforms
2) Reporting and redressal mechanism for violations and misuse of Social media
platforms.
Unit
1) Configuring security settings in Mobile Wallets and UPIs
2) Checklist for secure net banking
Page 11 of 21B.C.A. (Semester - 5 and Semester - 6)
Saurashtra University
To be effective from June - 2024
Unit
1) Setting, configuring and managing three password policy in the computer (BIOS,
Administrator and Standard User).
2), Setting and configuring two factor authentications in the Mobile phone.
3) Security patch management and updates in Computer and Mobiles.
4) Managing Application permissions in Mobile Phone.
5) Installation and configuration of computer Anti-virus,
6) Installation and configuration of Computer Host Firewall.
7) Wi
ecurity management in computer and mobile.
Page 12 of 21