Cybersecurity Syllabus
Cybersecurity Syllabus
Cybersecurity Syllabus
Prerequisites: -
A course on Computer Networks.
Course Objectives:
To understand the fundamentals of cyber security.
To understand various categories of Cybercrime, Cyber-attacks on mobile, tools and
techniques used in Cybercrime and case studies.
To have an overview of the Cyber laws and concepts of Cyber forensics.
Course Outcome:-
Have a good understanding of Cyber Security and the Tools.
Identify the different types of Cyber Crimes.
Have a good understanding of Cyber laws
To develop Cyber forensics awareness.
Identify attacks, security policies and credit card frauds in mobile and Wireless Computing
Era.
Unit Topic No of lectures
SPPU BBA (CA) COURSE CONTENT - SEMESTER V and VI CBCS/2019 PATTERN - uploaded 10-6-2021 Page 2
2.5 Botnets: The Fuel for Cybercrime, Botnet, Attack Vector
2.6 Cybercrime: Mobile and Wireless Devices – Proliferation - Trends in
Mobility
2.7 Credit Card Frauds in Mobile and Wireless Computing Era
2.8 Security Challenges Posed by Mobile Devices
2.9 Authentication Service Security
2.10 Attacks on Mobile/Cell Phones
3 Chapter 3:- Tools and Methods Used in Cybercrime 05
3.1 Introduction
3.2 Proxy Servers and Anonymizers
3.3 Phishing
3.4 Password Cracking
3.5 Keyloggers and Spywares
3.6 Virus and Worms
3.7 Trojan Horses and Backdoors
3.8 Steganography
3.9 DoS and DDoS Attacks
3.10 SQL Injection
4 Chapter 4 :- Cybercrimes and Cyber security: The Legal Perspectives 07
4.1 Introduction
4.2 Cybercrime and the Legal Landscape around the World
4.3 Why Do We Need Cyberlaws: The Indian Context
4.4 The Indian IT Act
4.5 Challenges to Indian Law and Cybercrime Scenario in India
4.6 Consequences of not Addressing the Weakness in Information
Technology Act
4.7 Digital Signatures and the Indian IT Act
4.8 Amendments to the Indian IT Act
4.9 Cybercrime and Punishment
4.10 Cyberlaw, Technology and Students: Indian Scenario
5 Chapter 5:- Cyber Forensics 06
5.1 Introduction
5.2 Historical background of Cyber forensics
5.3 Digital Forensics Science
5.4 The Need for Computer Forensics
5.5 Cyber Forensics and Digital evidence
5.6 Forensics Analysis of Email
5.7 Digital Forensics Lifecycle
5.8 Challenges in Computer Forensics
6 Chapter 6:- Cybersecurity: Organizational Implications 07
6.1 Organizational Implications: Cost of cybercrimes and IPR issues
6.2 Web threats for organizations
6.3 Security and Privacy Implications from Cloud Computing
6.4 Social media marketing
6.5 Social computing and the associated challenges for organizations,
Protecting people’s privacy in the organization
6.6 Organizational guidelines for Internet usage and safe computing
guidelines and computer usage policy
6.7 Incident handling
SPPU BBA (CA) COURSE CONTENT - SEMESTER V and VI CBCS/2019 PATTERN - uploaded 10-6-2021 Page 3
6.8 Intellectual property in the cyberspace of cyber security.
7 Chapter 7:- Cybercrime: Illustrations, Examples and Mini-Cases 06
7.1Real-Life Examples
7.2 Mini-Cases
7.3 Illustrations of Financial Frauds in Cyber Domain
7.4 Digital Signature-Related Crime Scenarios
7.5 Digital Forensics Case Illustrations
7.6 Online Scams
References Books:
1. Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives – Nina
Godbole, SunitBelapure, Wiley: April 2011 India Publications Released.
2. Principles of Information Security,-Michael E Whitman, Herbert J Mattord, 3rd Edition, 2011.
3. Computer Security: Principles and Practice -William Stallings and Lawrie Brown, 3rd edition, Pearson,
2015.
4. Cyber Security Essentials- James Graham Richard Howard Ryan Olson
SPPU BBA (CA) COURSE CONTENT - SEMESTER V and VI CBCS/2019 PATTERN - uploaded 10-6-2021 Page 4