You are on page 1of 2

CYBER AND INFORMATION SECURITY

Course code:

BNN 102

Credit Units: 02

Course Objective:
This course is designed for students seeking a broad understanding of Cyber and Information Security. It will
provide the student with basic knowledge of cyber crime dynamics, cyber law & Intellectual property issues, explore
legal & policy developments for dealing fraud using Cyber space. The course will address issues involving hackers,
malware, social theories, protocols, firewalls, and intrusion detection. In addition, this course will discuss the
prevention and security measures.

Learning Outcomes:
So1: scientific & computing foundation: ability to apply knowledge of mathematics, science, engineering and
computing appropriate to the discipline.
So4: design assessment: ability to design a system, component, or process to meet desired needs within realistic
constraints such as economic, environmental, social, political, ethical, health and safety, manufacturability, and
sustainability
So6: professionalism: ability to demonstrate the understanding of professional, ethical, legal, security and social
issues and responsibilities.
Sr.
No.

1

Course Title
(Course Code)

Cyber
Information
Security

Program
Educational
Objectives
1 2
3
4

Student Outcomes

1

2

3

4

5

6

7

8

9

10

11

12

13

14

&
X

X

Course Contents:
Module I: Cyber & Information Security Concepts
Cyber security, Information security, Security triad: Confidentiality, Integrity, Availability, Goals for Security,
Security threats and attacks, Basic Terminology : Adware, Back Door, Black Hat, Botnet, Cracker , Phishing,
Polymorphic Virus, Spam , Spoofing, Zombie / Zombie Drone , DOS/DDOS , Trojan Horse , DNS Poisoning, Email
Spoofing, Information Security Services , Web and E-commerce Security.
Module II: Cyber Crimes
Introduction of Cyber Crime: Hacking, Cyber Squatting, Cyber Stalking, Password Cracking, Classic Cybercrime,
Cyber Terrorism, Crimes of deception, Content oriented on line crime, Intrusion Detection, Malicious Software
Detection.: An Overview of online fraud, Identity theft, Intellectual Property Theft, Virtual Crime, Cyber Forensics:
Introduction, Evaluation of crime scene & Evidence Collection, Recovery Process
Module III: Cyber Law & IT Act
Cyber Laws: Jurisdiction and Sovereignty. The IT Act of India 2000, Intellectual Property Rights, Ownership &
Enforcement of IPR, Copy right objective , Transfer of copy right, practical aspect of licensing , benefits,
jurisdictional Issues, copy right in digital media, patents in cyber world, Defenses for Infringement, Security
Standards.
Module IV: Information Security
Security Models, Protection Measures, Software Security and Database Security, Authentication in Distributed
Systems, Insecure Network connections, Information Warfare and Surveillance, Introduction to
Cryptography, Message Authentication and Hash functions, Digital Signatures, Digital Watermarking, Biometric
Security, Overview of Security Management.

Lenny Malware: Fighting Malicious Code. 2006 Wall. 2007 Ross J Anderson. 2010 Ortmeier. Britz. Joel Scrambray. 2005 Skoudis. 2004 Skoudis. 2/e. Security Management: An Introduction. Familiarization with existing Cyber Laws. Prentice Hall PTR. Polity Publishing . Ed & Zeltser. Pearson Education Marjie T. Acquaintance to Intellectual Property Rights. A: Attendance Text & Reference:          Mark Merkow. Vincent Liu. Examination Scheme: Components Weightage (%) A 5 CT 10 S/V/Q 8 HA 7 EE 70 CT: Class Test.Learning Outcomes:    Awareness about Cyber Crimes and Information Security Issues. P. S/V/Q: Seminar/Viva/Quiz. Prentice Hall PTR. Caleb Sima. Plano. David. Tom. 3 /e. 2nd edition. Network Security Essentials (Applications and Standards) Pearson Education. Pearson Education William Stallings. 1/e.. Hacking Exposed Web Applications. HA: Home Assignment. 2008 . Second Ed. EE: End Semester Examination. TX . Counter Hack Reloaded. Information Security : Principles and Practices. Prentice Hall. J. Second Edition. Ed & Liston. Cybercrime: The Transformation of Crime in the Information Age. Security Engineering: A Guide to Building Dependable Distributed Systems. Computer Forensics and Cyber Crime : An Introduction..