Cyber Security
Cyber Security
Cyber Security
CLO01 Acquire Information and risk models including confidentiality, integrity and availability.
Acquire knowledge about the Impact and consequences of a Security Breach, Attackers and
CLO02
Cybersecurity Professionals, Cyberwarfare.
CLO03 Acquire knowledge on Threats and attacks and exploit vulnerabilities.
CLO04 To gain knowledge on Cyber Security architecture and operations.
CLO05 To Know about Cybersecurity Legal and Ethical Issues.
The evolution of Information Communication Technology (ICT) and growing security concerns demands flexible
and generally comprehensive approach to the issue of cyber security. The rapid growth of ICT has raised various
complex questions which need to be addressed. A need has been felt to address cyber security broadly, as also
in sufficient depth so that even students from non-technical streams will develop a more complete picture of
the cyber security issues. The main objectives of the course are:
• To create more aware, responsive and responsible digital citizens, thereby contributing
effectively to an overall healthy cyber security posture and ecosystem
• To Help students to feel justifiably confident of their ability to understand cyber security issues.
• Secure both clean and corrupted systems, protecting personal data, securing simple computer
networks, and safe Internet usage.
CLO01 Acquire Information and risk models including confidentiality, integrity and availability.
CLO02 Understand the cyber security and threat landscape.
CLO03 Develop a deeper understanding and familiarity with various types of cyberattacks, cyber crimes,
vulnerabilities and remedies thereto.
CLO04 Comprehend governance, regulatory, legal, economic, environmental, social and ethical contexts
of cyber security.
Sessio
Course Learning Outcome POs *CL **KC
ns
Acquire Information and risk models PO1, PO2, PO3, PO5, K1 Factual 5
CLO01 including confidentiality, integrity and PO9 Conceptual
availability.
CLO02 Understand the cyber security and PO1, PO2, PO3, PO4, K2 Factual 8
threat landscape. PO5 Conceptual
CLO03 Develop a deeper understanding and PO1, PO2, PO3, PO4, K3 Conceptual 6
familiarity with various types of PO5, PO7, PO8, PO10 Procedural
cyberattacks, cyber crimes,
vulnerabilities and remedies thereto.
CLO04 Comprehend governance, regulatory, PO2, PO4, PO5, PO12 K4 Conceptual 6
legal, economic, environmental, Procedural
social and ethical contexts of cyber
security.
CLO05 Implement measures for self-cyber- PO4, PO5, PO11 K3 Factual 5
protection as well as societal cyber- Conceptual
protection.
Total Contact Hours 30
Revised Bloom’s Taxonomy Terminology
*Cognitive Level =CL
**Knowledge Categories = KC
Course PO PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
Learning 1
Outcomes
CLO01 M M M M M
CLO02 M M M M M
CLO03 M M M M M M M M
CLO04 M M M M
CLO05 H H M
H=High, M=Medium, L=Low
4. Recommended Books:
Text Books:
B01: M. Merkow, J. Breithaupt, Information Security Principles and Practices, Pearson Education, 2005
B02: G.R.F. Snyder, T. Pardoe, Network Security, Cengage Learning, 2013
Reference Books:
B03: A. Basta, W.Halton, Computer Security: Concepts, Issues and Implementation, Cengage Learning India,
2008
B04: Lexis, The Information Technology Act, 2000, Universal/LexisNexis, Jan 2021,
B05: Taxmann's Digital Personal Data Protection Act 2023, Taxmann Publications, August 2023.
E-Resources:
https://library.chitkara.edu.in/subscribed-books.php
6. Course Plan:
7. Delivery/Instructional Resources
Lecture
Topics Web References Audio-Video
No.
1-2 The Need for Cybersecurity, Online
https://www.netacad.com/c
and Offline Identity, Organizational https://www.youtube.com/w
ourses/cybersecurity/introd
Data and its types, Confidentiality, atch?v=EqNe55IzjAw
uction-cybersecurity
Integrity, and Availability.
3-5 The Impact and consequences of a https://www.netacad.com/c https://www.youtube.com/w
Security Breach, Attackers and ourses/cybersecurity/introd atch?v=fUeJtM1bgGo
Cybersecurity Professionals, uction-cybersecurity
Cyberwarfare, Attacks, Concepts and https://www.youtube.com/w
Techniques atch?v=Dk-ZqQ-bfy4
https://www.youtube.com/w
atch?v=XLvPpirlmEs&t=73s
8. Action plan for different types of learners
Slow Learners Average Learners Fast Learners
• Provide alternative methods of • Provide constructive • Offer enrichment activities like
instruction and varied materials feedback that highlights involvement in research papers that
to accommodate diverse achievements and suggests challenge and stimulate fast learners.
learning preferences. areas for growth. • Foster an environment that values
• Create small group settings to • E-notes and E-exercises to intellectual curiosity and encourages
provide targeted instruction read ahead of the pedagogic students to explore beyond their
and individualized support. material. current level.
• Encourage a growth mindset,
emphasizing the importance of
effort and perseverance in the
learning process.
9. Evaluation Scheme & Components:
No. of
S.No. Topic (s) Weightage %
Sessions
1 The Need for Cybersecurity, Online and Offline Identity, 14 44%
Organizational Data and its types, Confidentiality,
Integrity, and Availability, The Impact and
consequences of a Security Breach, Attackers and
Cybersecurity Professionals, Cyberwarfare, Attacks,
Concepts and Techniques, Analysing a Cyber-attack,
Blended Attack, Introduction to cybercrime, cybercrime
and information security, Classifications of
cybercrimes, Cybercrime and the Indian ITA 2000, 2008,
2021 Amendments, IT Act 2021, DPDP Act 2023 Digital
Personal Data Protection Act.