Cyber security

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Course Plan

A. Course Handout (Version 1.0) | Last updated on 4th Dec, 2023

Institute/School Name Chitkara University Institute of Engineering and Technology


Department Name Department of Computer Science & Engineering
Programme Name Bachelor of Engineering (B.E.), Computer Science & Engineering
Course Name Cyber Security Session 2023-2024
Course Code 22GE004 Semester/Batch 4th /CSE 2022
L-T-P (Per Week) 2-0-0 Course Credits -
Course Coordinator Dr. Veeramanickam

CLO01 Acquire Information and risk models including confidentiality, integrity and availability.
Acquire knowledge about the Impact and consequences of a Security Breach, Attackers and
CLO02
Cybersecurity Professionals, Cyberwarfare.
CLO03 Acquire knowledge on Threats and attacks and exploit vulnerabilities.
CLO04 To gain knowledge on Cyber Security architecture and operations.
CLO05 To Know about Cybersecurity Legal and Ethical Issues.

1. Objectives of the Course

The evolution of Information Communication Technology (ICT) and growing security concerns demands flexible
and generally comprehensive approach to the issue of cyber security. The rapid growth of ICT has raised various
complex questions which need to be addressed. A need has been felt to address cyber security broadly, as also
in sufficient depth so that even students from non-technical streams will develop a more complete picture of
the cyber security issues. The main objectives of the course are:
• To create more aware, responsive and responsible digital citizens, thereby contributing
effectively to an overall healthy cyber security posture and ecosystem
• To Help students to feel justifiably confident of their ability to understand cyber security issues.
• Secure both clean and corrupted systems, protecting personal data, securing simple computer
networks, and safe Internet usage.

CLO01 Acquire Information and risk models including confidentiality, integrity and availability.
CLO02 Understand the cyber security and threat landscape.

CLO03 Develop a deeper understanding and familiarity with various types of cyberattacks, cyber crimes,
vulnerabilities and remedies thereto.
CLO04 Comprehend governance, regulatory, legal, economic, environmental, social and ethical contexts
of cyber security.

CLO05 Implement measures for self-cyber-protection as well as societal cyber-protection.

2. Course Learning Outcomes

After completion of the course, the student should be able to:

Sessio
Course Learning Outcome POs *CL **KC
ns
Acquire Information and risk models PO1, PO2, PO3, PO5, K1 Factual 5
CLO01 including confidentiality, integrity and PO9 Conceptual
availability.

Cyber Security /22GE004 Page 1 of 8


Course Plan

CLO02 Understand the cyber security and PO1, PO2, PO3, PO4, K2 Factual 8
threat landscape. PO5 Conceptual

CLO03 Develop a deeper understanding and PO1, PO2, PO3, PO4, K3 Conceptual 6
familiarity with various types of PO5, PO7, PO8, PO10 Procedural
cyberattacks, cyber crimes,
vulnerabilities and remedies thereto.
CLO04 Comprehend governance, regulatory, PO2, PO4, PO5, PO12 K4 Conceptual 6
legal, economic, environmental, Procedural
social and ethical contexts of cyber
security.
CLO05 Implement measures for self-cyber- PO4, PO5, PO11 K3 Factual 5
protection as well as societal cyber- Conceptual
protection.
Total Contact Hours 30
Revised Bloom’s Taxonomy Terminology
*Cognitive Level =CL
**Knowledge Categories = KC

Course PO PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
Learning 1
Outcomes
CLO01 M M M M M

CLO02 M M M M M

CLO03 M M M M M M M M

CLO04 M M M M

CLO05 H H M
H=High, M=Medium, L=Low

3. ERISE Grid Mapping


Feature Enablement Level (1-5, 5 being highest)
Entrepreneurship 1
Research 3
Innovation 2
Skills 5
Employability 4

4. Recommended Books:

Text Books:
B01: M. Merkow, J. Breithaupt, Information Security Principles and Practices, Pearson Education, 2005
B02: G.R.F. Snyder, T. Pardoe, Network Security, Cengage Learning, 2013

Cyber Security /22GE004 Page 2 of 8


Course Plan

Reference Books:
B03: A. Basta, W.Halton, Computer Security: Concepts, Issues and Implementation, Cengage Learning India,
2008
B04: Lexis, The Information Technology Act, 2000, Universal/LexisNexis, Jan 2021,
B05: Taxmann's Digital Personal Data Protection Act 2023, Taxmann Publications, August 2023.
E-Resources:
https://library.chitkara.edu.in/subscribed-books.php

5. Other readings and relevant websites:

Serial No Link of Journals, Magazines, websites and Research Papers


1. https://www.netacad.com/courses/cybersecurity/introduction-cybersecurity
2. http://www.sophos.com/en-us/security-news-trends/security-trends/tips-to-reduce-web-
threats.aspx
3. http://is.jrc.ec.europa.eu/pages/documents/091112SCintro.pdf
4. http://computer.howstuffworks.com/computer-forensic.htm
5. http://www.cybersecurity180.com/440/
6. https://www.meity.gov.in/content/information-technology-act
7. https://www.meity.gov.in/writereaddata/files/Digital%20Personal%20Data%20Protection%20
Act%202023.pdf

6. Course Plan:

Lecture Number Topics Text Book


1-2 The Need for Cybersecurity, Online and Offline Identity, B01
Organizational Data and its types, Confidentiality, Integrity,
and Availability.
3-5 The Impact and consequences of a Security Breach, Attackers B01, B02
and Cybersecurity Professionals, Cyberwarfare & Attacks,
Concepts and Techniques
6-7 Analysing a Cyber-attack, Blended Attack B02
8-9 Introduction to cybercrime, cybercrime and information B02
security
10-12 Classifications of cybercrimes, Cybercrime and the Indian ITA B02, B04
2000, 2008, 2021 Amendments
13-14 IT Act 2021, DPDP Act 2023 Digital Personal Data Protection B05
Act
15-17 Protecting Your Data and Privacy, Safeguarding Your Online B01
Privacy, Strong & Two Factor Authentication, OAuth 2.0, Email
and Web Browser Privacy
18-19 Protecting the Organization, Firewalls, Port Scanning, Security B01
Appliances
20-21 Detecting Attacks in Real Time, Detecting Malware, Protecting B01
Against Malware
Behaviour Approach to Cybersecurity, Botnet, Kill Chain, The B02
22-23 Kill Chain in Cyber defence Behaviour-Based Security
24-25 NetFlow and Cyber-attacks, Approach to Cyber security, IDS B02
and IPS
26-30 IPR, Ethical hacking basics, Cybersecurity Legal and Ethical B01, B02
Issues, Education and Careers
ETE (Syllabus = (Lecture number 1-30)

Cyber Security /22GE004 Page 3 of 8


Course Plan

7. Delivery/Instructional Resources

Lecture
Topics Web References Audio-Video
No.
1-2 The Need for Cybersecurity, Online
https://www.netacad.com/c
and Offline Identity, Organizational https://www.youtube.com/w
ourses/cybersecurity/introd
Data and its types, Confidentiality, atch?v=EqNe55IzjAw
uction-cybersecurity
Integrity, and Availability.
3-5 The Impact and consequences of a https://www.netacad.com/c https://www.youtube.com/w
Security Breach, Attackers and ourses/cybersecurity/introd atch?v=fUeJtM1bgGo
Cybersecurity Professionals, uction-cybersecurity
Cyberwarfare, Attacks, Concepts and https://www.youtube.com/w
Techniques atch?v=Dk-ZqQ-bfy4

6-7 Analysing a Cyber-attack, Blended http://www.cybersecurity18 https://www.youtube.com/w


Attack 0.com/440/ atch?v=Dk-ZqQ-bfy4

8-9 Introduction to cybercrime, http://www.cybersecurity1 https://www.youtube.com/w


cybercrime and information security 80.com/440/ atch?v=qS4ViqnjkC8

10-12 Classifications of cybercrimes, https://www.netacad.com/c https://www.youtube.com/w


Cybercrime and the Indian ITA 2000, ourses/cybersecurity/introd atch?v=cQYACLLAPOw
2008, 2021 Amendments. uction-cybersecurity
https://www.youtube.com/w
atch?v=l-nlymnlbiQ
13-14 IT Act 2021, DPDP Act 2023 Digital https://www.meity.gov.in/c https://www.youtube.com/w
Personal Data Protection Act ontent/information- atch?v=FmG0fPE-yUw
technology-act
https://www.youtube.com/w
atch?v=lQOYoEir-Z4
15-17 Protecting Your Data and Privacy, http://computer.howstuffw https://www.youtube.com/w
Safeguarding Your Online Privacy, orks.com/computer- atch?v=sdpxddDzXfE
Strong and Two Factor forensic.htm
Authentication, OAuth 2.0, Email https://www.youtube.com/w
and Web Browser Privacy atch?v=HtJKUQXmtok

18-19 Protecting the Organization, https://www.netacad.com/c


https://www.youtube.com/w
Firewalls, Port Scanning, Security ourses/cybersecurity/introd
atch?v=9GZlVOafYTg
Appliances uction-cybersecurity
20-21 Detecting Attacks in Real Time, http://computer.howstuffw
https://www.youtube.com/w
Detecting Malware, Protecting orks.com/computer-
atch?v=Bvqyg51Czdk
Against Malware forensic.htm
Behaviour Approach to https://www.netacad.com/c https://www.youtube.com/w
22-23 Cybersecurity, Botnet, Kill Chain, The ourses/cybersecurity/introd atch?v=oCUrkc_0tmw
Kill Chain in Cyber defence uction-cybersecurity
Behaviour-Based Security
24-25 NetFlow and Cyber-attacks, https://www.netacad.com/c
https://www.youtube.com/w
Approach to Cyber security, IDS and ourses/cybersecurity/introd
atch?v=uL5UY8jGUcw
IPS uction-cybersecurity
26-30 IPR, Ethical hacking basics, https://www.youtube.com/w
Cybersecurity Legal and Ethical atch?v=XLvPpirlmEs
https://www.netacad.com/c
Issues, Education and Careers
ourses/cybersecurity/introd
https://www.youtube.com/w
uction-cybersecurity
atch?v=rn_4PZRV85Q

Cyber Security /22GE004 Page 4 of 8


Course Plan

https://www.youtube.com/w
atch?v=XLvPpirlmEs&t=73s
8. Action plan for different types of learners
Slow Learners Average Learners Fast Learners
• Provide alternative methods of • Provide constructive • Offer enrichment activities like
instruction and varied materials feedback that highlights involvement in research papers that
to accommodate diverse achievements and suggests challenge and stimulate fast learners.
learning preferences. areas for growth. • Foster an environment that values
• Create small group settings to • E-notes and E-exercises to intellectual curiosity and encourages
provide targeted instruction read ahead of the pedagogic students to explore beyond their
and individualized support. material. current level.
• Encourage a growth mindset,
emphasizing the importance of
effort and perseverance in the
learning process.
9. Evaluation Scheme & Components:

Evaluation No. of Weightage of Mode of


Type of Component
Component Assessments Component Assessment
Component 2 Certificate 01 40% Offline
Component 3 End Term Examinations 01 60% Online
Total 100%
* Course certificate submission is essential to take 40% marks.

10. Syllabus of the Course:

No. of
S.No. Topic (s) Weightage %
Sessions
1 The Need for Cybersecurity, Online and Offline Identity, 14 44%
Organizational Data and its types, Confidentiality,
Integrity, and Availability, The Impact and
consequences of a Security Breach, Attackers and
Cybersecurity Professionals, Cyberwarfare, Attacks,
Concepts and Techniques, Analysing a Cyber-attack,
Blended Attack, Introduction to cybercrime, cybercrime
and information security, Classifications of
cybercrimes, Cybercrime and the Indian ITA 2000, 2008,
2021 Amendments, IT Act 2021, DPDP Act 2023 Digital
Personal Data Protection Act.

2 Protecting Your Data and Privacy, Safeguarding Your 8 28%


Online Privacy, Strong Authentication, Two Factor
Authentication, OAuth 2.0, Email and Web Browser
Privacy, Protecting the Organization, Firewalls, Port
Scanning, Security Appliances, Detecting Attacks in Real
Time, Detecting Malware, Protecting Against Malware.
3 Behaviour Approach to Cybersecurity, Botnet, Kill 8 28%
Chain, The Kill Chain in Cyber defence Behaviour-Based
Security, NetFlow and Cyber-attacks, Approach to
Cyber security, IDS and IPS, IPR, Ethical hacking basics,
Cybersecurity Legal and Ethical Issues, Education and
Careers.

Cyber Security /22GE004 Page 5 of 8


Course Plan

End Term (Covering (44%+ 28%+ 28%=)100% syllabus)

This Document is approved by:

Designation Name Signature


Course Coordinator Dr. Veeramanickam
Head-Academic Delivery Dr. Ravi Kumar Sachdeva
Dean Dr. Raj Gaurang Tiwari
Dean Academics Dr. Monit Kapoor

Date (DD/MM/YYYY) Dec 04, 2023

Cyber Security /22GE004 Page 6 of 8

You might also like