W

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

11.12.

2022

Course Title: Introduction to Cyber Security


Course Code: 22ETC15I/25I CIE Marks 50
Course Type (Theory/Practical Theory SEE Marks 50
/Integrated ) Total Marks 100
Teaching Hours/Week (L:T:P: S) 3-0-0-0 Exam Hours 03
Total Hours of Pedagogy 40 hours Credits 03
Course objectives
 To familiarize cybercrime terminologies and perspectives
 To understand Cyber Offenses and Botnets
 To gain knowledge on tools and methods used in cybercrimes
 To understand phishing and computer forensics

Teaching-Learning Process
These are sample Strategies, which teacher can use to accelerate the attainment of the various course outcomes
and make Teaching –Learning more effective
1. Chalk and Board
2. Demonstration
3. Interactive learning
4. Videos and online material
Module-1 (8 hours of pedagogy)
Introduction to Cybercrime:

Cybercrime: Definition and Origins of the Word, Cybercrime and Information Security, Who are
Cybercriminals? Classifications of Cybercrimes, An Indian Perspective, Hacking and Indian
Laws., Global Perspectives

Textbook:1 Chapter 1 (1.1 to 1.5, 1.7-1.9)

Module-2 (8 hours of pedagogy)


Cyber Offenses:

How Criminals Plan Them: Introduction, How criminals plan the attacks, Social Engineering, Cyber Stalking,
Cybercaafe & cybercrimes.

Botnets: The fuel for cybercrime, Attack Vector.

Textbook:1 Chapter 2 (2.1 to 2.7)

Module-3 ( 8 hours of pedagogy)

1
11.12.2022

Tools and Methods used in Cybercrime: Introduction, Proxy Servers, Anonymizers, Phishing,
Password Cracking, Key Loggers and Spyways, Virus and Worms, Trozen Horses and Backdoors,
Steganography, DoS and DDOS Attackes, Attacks on Wireless networks.

Textbook:1 Chapter 4 (4.1 to 4.9, 4.12)

Module-4 ( 8 ours of pedagogy)


Phishing and Identity Theft: Introduction, methods of phishing, phishing,phising techniques, spear phishing,
types of phishing scams, phishing toolkits and spy phishing, counter measures, Identity Theft

Textbook:1 Chapter 5 (5.1. to 5.3)

Module-5 (8 hours of pedagogy)

Understnading Computer Forensics: Introdcution, Historical Background of Cyberforensics, Digital Foresics


Science, Need for Computer Foresics, Cyber Forensics and Digital Evidence, Digital Forensic Life cycle, Chain of
Custody Concepts, network forensics.

Textbook:1 Chapter 7 (7.1. to 7.5, 7.7 to 7.9)

Course outcome (Course Skill Set)


At the end of the course the student will be able to:
CO1 Explain the cybercrime terminologies
CO2 Describe Cyber offenses and Botnets
CO3 Illustrate Tools and Methods used on Cybercrime
CO4 Explain Phishing and Identity Theft
CO5 Justify the need of computer forensics

2
11.12.2022

Assessment Details (both CIE and SEE)


The weightage of Continuous Internal Evaluation (CIE) is 50% and for Semester End Exam (SEE) is 50%. The
minimum passing mark for the CIE is 40% of the maximum marks (20 marks out of 50). The minimum passing
mark for the SEE is 35% of the maximum marks (18 marks out of 50). A student shall be deemed to have satisfied
the academic requirements and earned the credits allotted to each subject/ course if the student secures not less
than 35% (18 Marks out of 50) in the semester-end examination (SEE), and a minimum of 40% (40 marks out of
100) in the sum total of the CIE (Continuous Internal Evaluation) and SEE (Semester End Examination) taken
together.
Continuous Internal Evaluation(CIE):
Three Tests each of 20 Marks;
 1st, 2nd, and 3rd tests shall be conducted after completion of the syllabus of 30-35%,
70-75%, and 90-100% of the course/s respectively.
 Assignments/Seminar/quiz/group discussion /field survey & report presentation/ course
project/Skill development activities, suitably planned to attain the COs and POs for a total of
40 Marks.
If the nature of the courses requires assignments/Seminars/Quizzes/group discussion two
evaluation components shall be conducted. If course project/field survey/skill development
activities etc then the evaluation method shall be one.

Total CIE marks (out of 100 marks) shall be scaled down to 50 marks

Semester End Examination (SEE):


Theory SEE will be conducted by University as per the scheduled timetable, with common question papers for the
subject (duration 03 hours)
 The question paper shall be set for 100 marks. The medium of the question paper shall be English). The
duration of SEE is 03 hours.
 The question paper will have 10 questions. Two questions per module. Each question is set for 20 marks.
The students have to answer 5 full questions, selecting one full question from each module. The student
has to answer for 100 marks and marks scored out of 100 shall be proportionally reduced to 50
marks.
 There will be 2 questions from each module. Each of the two questions under a module (with a maximum
of 3 sub-questions), should have a mix of topics under that module.
Suggested Learning Resources:
Books (Title of the Book/Name of the author/Name of the publisher/Edition and Year)
1. Sunit Belapure and Nina Godbole, “Cyber Security: Understanding Cyber Crimes, Computer Forensics And
Legal Perspectives”, Wiley India Pvt Ltd, ISBN: 978-81- 265-21791, 2011, First Edition (Reprinted 2018)

Web links and Video Lectures (e-Resources):


 https://www.youtube.com/watch?v=yC_hFm0BX28&list=PLxApjaSnQGi6Jm7LLSxvmNQjS_rt9swsu
 https://www.youtube.com/watch?v=nzZkKoREEGo&list=PL9ooVrP1hQOGPQVeapGsJCktzIO4DtI4_
 https://www.youtube.com/watch?v=6wi5DI6du-4&list=PL_uaeekrhGzJlB8XQBxU3z__hDwT95xlk
 https://www.youtube.com/watch?v=KqSqyKwVuA8

3
11.12.2022

Activity Based Learning (Suggested Activities in Class)/ Practical Based learning


 Illustration of standard case study of cyber crime
 Setup a cyber court at Institute level

COs and POs Mapping (Individual teacher has to fill up)


COs POs
1 2 3 4 5 6 7 8 9 10 11 12
CO1
CO2
CO3
CO4
CO5
Level 3- Highly Mapped, Level 2-Moderately Mapped, Level 1-Low Mapped, Level 0- Not Mapped

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy