You are on page 1of 2

COURSE

Fundamentals of Cyber Security CREDITS 3


TITLE
COURSE COURSE
CSE Core/PE/OE/Minor L-T-P 3-0-0
CODE CATEGORY
LEARNING
Version Approval Details BTL-3
LEVEL

ASSESSMENT SCHEME
Semester End
During Semester Assessment (DSA)
Examination

MSE-1 MSE-2 DSA Components Attendance SEE

10% 10% 25% 5% 50%

In this Fundamental of Cyber security, you will be given an extensive overview of the various branches of computing
security. You will learn cybersecurity concepts, issues, and tools that are critical in solving problems in the computing
Course security domain.
Description You will have opportunities to learn essential techniques in protecting systems and network infrastructures, analyzing
and monitoring potential threats and attacks, devising and implementing security solutions for organizations large or
small.
1. Exhibit knowledge to secure corrupted systems, protect personal data, and secure computer networks in an
organization.
2. Practice with an expertise in academics to design and implement security solutions.
Course
3. Understand key terms and concepts in Cryptography, Governance and Compliance.
Objective
4. Develop cyber security strategies and policies
5. Understand principles of web security and to guarantee a secure network by monitoring and analyzing the nature
of attacks through cyber/computer forensics software/tools.
Upon completion of this course, the students will be able to
1. Analyze and evaluate the cyber security needs of an organization.
2. Determine and analyze software vulnerabilities and security solutions to reduce the risk of exploitation.
Course 3. Measure the performance and troubleshoot cyber security systems.
Outcome 4. Implement cyber security solutions and use of cyber security, information assurance, and cyber/computer forensics
software/tools.
5. Comprehend and execute risk management processes, risk treatment methods, and key risk and performance
indicators.

Prerequisites:

CO, PO AND PSO MAPPING


PO PO- PO- PO- PO- PO- PO- PO- PO- PO - PO- PO- PSO- PSO- PSO-
CO
-1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
CO-1 3 - - - - - - - - - - - -

CO-2 2 3 2 - - 2 2 - - - - - - - -

CO-3 2 3 2 - 3 2 2 - - 2 - - 1 - -

CO-4 2 3 2 2 3 3 2 - 2 2 2 3 2 2 2

CO-5 2 2 2 3 3 3 2 2 2 3 2 3 2 2 2

1: Weakly related, 2: Moderately related and 3: Strongly related


MODULE 1: Introduction to Computer Security (9 hrs)

How Seriously Should You Take Threats to Network Security? - Identifying Types of Threats - Assessing the
Likelihood of an Attack on Your Network - Networks and the Internet - Network Basics - How the internet Works - CO-1
History of the Internet - Basic Network Utilities – Other Network Devices - Advanced Network Communications
Topics

MODULE 2: Cyber Stalking, Fraud, and Abuse (9 hrs)

- How Internet Fraud Works - Identity Theft –Cyber Stalking - Protecting Yourself against Cyber Crime - Denial of CO-2
Service Attacks -Denial of Service - Illustrating an Attack - Common Tools Used for DoS .- DoS Weaknesses -
Specific DoS attacks - Land Attack-Distributed Denial of Service (DDoS)

MODULE 3: Malware - Viruses (9 hrs)

Unit – III
- How a Virus Spreads - Trojan Horses - The Buffer-Overflow Attack- The Sasser Virus/Buffer Overflow - Spyware - CO-3
Other Forms of Malware – Detecting and Eliminating Viruses and Spyware - Techniques Used by Hackers - Basic
Terminology - The Reconnaissance Phase - Actual Attacks

MODULE 4: Industrial Espionage in Cyberspace (9 hrs)

What Is Industrial Espionage? - Information as an Asset - Real-World Examples of Industrial Espionage - How Does CO-4
Espionage Occur? - Phone Taps and Bugs - Protecting against Industrial Espionage - Industrial Espionage Act - Spear
Phishing - Encryption - Cryptography Basics- History of Encryption- Modern Methods - Legitimate Versus Fraudulent
Encryption Methods
MODULE 5: Computer Security Software (9 hrs)

Virus Scanners - Firewalls - Antispyware - Intrusion-Detection Software - Network Scanning and Vulnerability
Scanning -Basics of Assessing a System - Securing Computer Systems - Cyber Terrorism and Information Warfare CO-5
Actual Cases of Cyber Terrorism -China Eagle Union- Economic Attacks -Military Operations Attacks- General
Attacks - Supervisory Control and Data Acquisitions - Information Warfare- Actual Cases.

TEXT BOOKS
1. Chuck Easttom, “Computer Security Fundamentals” Second edition, Pearson education, 2012

REFERENCE BOOKS
Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short, “Cyber Security Essentials, Wiley publication
1.

2. Erdal Ozkaya, “Cybersecurity: the Beginner's Guide”, Packet publication 2019.


E BOOKS
1. https://uou.ac.in/sites/default/files/slm/Introduction-cyber-security.pdf
MOOC
1. https://www.youtube.com/watch?v=w9dkh1cfB6Y

You might also like