Cybersecurity Syllabus

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Savitribai Phule Pune University

T.Y.B.B.A (C.A.) Semester –V


Course Code: CA-501
Subject Name: Cyber Security
Total Hours : 48 lectures Total Credits: 03

Prerequisites: -
 A course on Computer Networks.
Course Objectives:
 To understand the fundamentals of cyber security.
 To understand various categories of Cybercrime, Cyber-attacks on mobile, tools and
techniques used in Cybercrime and case studies.
 To have an overview of the Cyber laws and concepts of Cyber forensics.
Course Outcome:-
 Have a good understanding of Cyber Security and the Tools.
 Identify the different types of Cyber Crimes.
 Have a good understanding of Cyber laws
 To develop Cyber forensics awareness.
 Identify attacks, security policies and credit card frauds in mobile and Wireless Computing
Era.
Unit Topic No of lectures

1 Chapter 1:- Introduction to Cyber Crime and Cyber Security 07


1.1 Introduction
1.2 Cybercrime: Definition and Origin of the Word
1.3 Cybercrime and Information Security
1.4 Who are Cybercriminals?
1.5 Classifications of Cybercrimes:
E-Mail Spoofing, Spamming, Cyber defamation, Internet Time Theft,
Salami Attack/Salami Technique, Data Diddling,Forgery, Web Jacking,
Newsgroup, Spam/Crimes Emanating from Usenet Newsgroup, Industrial
Spying/Industrial Espionage, Hacking,OnlineFrauds,Computer Sabotage,
Email Bombing/Mail Bombs, Computer Network Intrusions, Password
Sniffing, Credit Card Frauds, Identity Theft
1.6 Definition of Cyber Security
1.7 Vulnerability, Threats and Harmful acts
1.8 CIA Triad
1.9 Cyber Security Policy and Domains of Cyber Security Policy
2 Chapter 2 :- Cyber offenses and Cyberstalking 10
2.1 Criminals Plan: Categories of Cybercrime Cyber Attacks:
Reconnaissance, Passive Attack, Active Attacks, Scanning/Scrutinizing
gathered Information, Attack (Gaining and Maintaining the System
Access), Social Engineering, and Classification of Social Engineering.
2.2 Cyberstalking: Types of Stalkers, Cases Reported on Cyberstalking,
Working of Stalking
2.3 Real-Life Incident of Cyber stalking
2.4 Cybercafe and Cybercrimes

SPPU BBA (CA) COURSE CONTENT - SEMESTER V and VI CBCS/2019 PATTERN - uploaded 10-6-2021 Page 2
2.5 Botnets: The Fuel for Cybercrime, Botnet, Attack Vector
2.6 Cybercrime: Mobile and Wireless Devices – Proliferation - Trends in
Mobility
2.7 Credit Card Frauds in Mobile and Wireless Computing Era
2.8 Security Challenges Posed by Mobile Devices
2.9 Authentication Service Security
2.10 Attacks on Mobile/Cell Phones
3 Chapter 3:- Tools and Methods Used in Cybercrime 05
3.1 Introduction
3.2 Proxy Servers and Anonymizers
3.3 Phishing
3.4 Password Cracking
3.5 Keyloggers and Spywares
3.6 Virus and Worms
3.7 Trojan Horses and Backdoors
3.8 Steganography
3.9 DoS and DDoS Attacks
3.10 SQL Injection
4 Chapter 4 :- Cybercrimes and Cyber security: The Legal Perspectives 07
4.1 Introduction
4.2 Cybercrime and the Legal Landscape around the World
4.3 Why Do We Need Cyberlaws: The Indian Context
4.4 The Indian IT Act
4.5 Challenges to Indian Law and Cybercrime Scenario in India
4.6 Consequences of not Addressing the Weakness in Information
Technology Act
4.7 Digital Signatures and the Indian IT Act
4.8 Amendments to the Indian IT Act
4.9 Cybercrime and Punishment
4.10 Cyberlaw, Technology and Students: Indian Scenario
5 Chapter 5:- Cyber Forensics 06
5.1 Introduction
5.2 Historical background of Cyber forensics
5.3 Digital Forensics Science
5.4 The Need for Computer Forensics
5.5 Cyber Forensics and Digital evidence
5.6 Forensics Analysis of Email
5.7 Digital Forensics Lifecycle
5.8 Challenges in Computer Forensics
6 Chapter 6:- Cybersecurity: Organizational Implications 07
6.1 Organizational Implications: Cost of cybercrimes and IPR issues
6.2 Web threats for organizations
6.3 Security and Privacy Implications from Cloud Computing
6.4 Social media marketing
6.5 Social computing and the associated challenges for organizations,
Protecting people’s privacy in the organization
6.6 Organizational guidelines for Internet usage and safe computing
guidelines and computer usage policy
6.7 Incident handling

SPPU BBA (CA) COURSE CONTENT - SEMESTER V and VI CBCS/2019 PATTERN - uploaded 10-6-2021 Page 3
6.8 Intellectual property in the cyberspace of cyber security.
7 Chapter 7:- Cybercrime: Illustrations, Examples and Mini-Cases 06
7.1Real-Life Examples
7.2 Mini-Cases
7.3 Illustrations of Financial Frauds in Cyber Domain
7.4 Digital Signature-Related Crime Scenarios
7.5 Digital Forensics Case Illustrations
7.6 Online Scams

References Books:
1. Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives – Nina
Godbole, SunitBelapure, Wiley: April 2011 India Publications Released.
2. Principles of Information Security,-Michael E Whitman, Herbert J Mattord, 3rd Edition, 2011.
3. Computer Security: Principles and Practice -William Stallings and Lawrie Brown, 3rd edition, Pearson,
2015.
4. Cyber Security Essentials- James Graham Richard Howard Ryan Olson

SPPU BBA (CA) COURSE CONTENT - SEMESTER V and VI CBCS/2019 PATTERN - uploaded 10-6-2021 Page 4

You might also like