MCA-20-34(ii): Cyber Security
Type: Elective
Contact Hours: 4 hours/week
Examination Duration: 3 Hours
Mode: Lecture
External Maximum Marks: 75
External Pass Marks: 30(i.e. 40%)
Internal Maximum Marks: 25
Total Maximum Marks: 100
Total Pass Marks: 40(i.e. 40%)
Instructions to paper setter for End semester examination:
Total number of questions shall be nine. Question number one will be compulsory and will be consisting of short/objective type questions from complete syllabus. In addition to compulsory first question there shall be four units in the question paper each consisting of two questions. Student will attempt one question from each unit in addition to compulsory question. All questions will carry equal marks.
Course Objectives: The course has been designed to give students an extensive overview of cyber security issues, tools and techniques that are critical in solving problems in cyber security domains.
Course Outcomes (COs) At the end of this course, the student will be able to:
MCA-20-34(ii).1 learn various challenges and constraints in cyber security;
MCA-20-34(ii).2 learn IT ACT (Cyber law) to the given case/problem and analyze it;
MCA-20-34(ii).3 understand the need for Computer Cyber forensics;
MCA-20-34(ii).4 demonstrate the network defence tools to provide security of information.
Unit- I
Introduction to Cyber Security: Overview of Cyber Security, Internet Governance: Challenges and Constraints, Cyber Threats, Cyber Warfare, Cyber Crime, Cyber terrorism, Cyber Espionage, Need for a Comprehensive Cyber Security Policy, Need for a Nodal Authority, International convention on Cyberspace.
Unit – II
Introduction to Cybercrime and Laws: Origins of Cybercrime, Classifications of Cybercrimes, information Security, Cybercriminals, Criminals Plan for Attacks, Cybercafe, Botnets, Attack Vector, The Indian IT ACT 2000 and amendments.
Tools and Methods used in Cybercrime: Introduction, Proxy Server and Anonymizers, Password Cracking, Keyloggers and Spyware, Virus and Warms, Trojan and backdoors, DOS and DDOS attack, SQLinjection.
Unit – III
Phishing and Identity Theft: Introduction to Phishing, Methods of Phishing, Phishing Techniques, Phishing Toolkits and Spy Phishing. Identity Theft: PII, Types of Identity Theft, Techniques of ID Theft. Digital Forensics Science, Need for Computer Cyber forensics and Digital Evidence, Digital Forensics Life Cycle.
Introduction to Intellectual Property Law – The Evolutionary Past – The IPR Tool Kit- Para -Legal Tasks in Intellectual Property Law – Ethical obligations in Para Legal Tasks in Intellectual Property Law –types of intellectual property rights.
Unit – IV
Network Defence tools: Firewalls and Packet Filters: Firewall Basics, Packet Filter Vs Firewall, Packet Characteristic to Filter, Stateless Vs Stateful Firewalls, Network Address Translation (NAT) and Port Forwarding, Virtual Private Networks, Linux Firewall, Windows Firewall, Snort Detection System, Introduction to block chain technology and its applications.
Text Books:
⦁ Mike Shema, Anti-Hacker Tool Kit (Indian Edition), Publication McGraw Hill.
⦁ Nina Godbole and SunitBelpure, Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives, Publication Wiley.
Reference Books:
⦁ Marjie T. Britz, Computer Forensics and Cyber Crime: An Introduction, Pearson Education
⦁ Chwan-Hwa (John) Wu,J. David Irwin, Introduction to Computer Networks and Cyber security, CRC Press
⦁ Bill Nelson, Amelia Phillips, Christopher Steuart, Guide to Computer Forensics and Investigations, Cengage Learning
⦁ Debirag E.Bouchoux, Intellectual Property, Cengage Learning.