Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
19 views78 pages

Cyber Security Course File Aditi Goel

The document is a course file for the B.Tech program in Cyber Security at Bharat Institute of Technology, detailing the course structure, faculty information, and departmental missions. It includes sections on program outcomes, educational objectives, course outcomes, and strategies for identifying and supporting weak and bright students. The document also outlines the syllabus, evaluation schemes, and proposed course completion reports for the academic year 2024-25.

Uploaded by

Aditi Goel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views78 pages

Cyber Security Course File Aditi Goel

The document is a course file for the B.Tech program in Cyber Security at Bharat Institute of Technology, detailing the course structure, faculty information, and departmental missions. It includes sections on program outcomes, educational objectives, course outcomes, and strategies for identifying and supporting weak and bright students. The document also outlines the syllabus, evaluation schemes, and proposed course completion reports for the academic year 2024-25.

Uploaded by

Aditi Goel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 78

BHARAT INSTITUTE OF TECHNOLOGY

By Pass Road, Partapur, Meerut, U.P.


Course File
Department of CSE

Faculty Name : Aditi Goel Course Code : BCC-301


Course Name : B.Tech NBA Code :
Year/Sem/Sec : 3rd/3rd /C and D Academic Year : 2024-25
Email ID : [email protected] Mobile Number : 8791814860
Index
S. No. Content Page No.
1 Institute Vision and Mission
2 Department Vision and Mission
3 POs, PEOs, PSO, and COs
CO-POs and PSOs Mapping Matrices
4

5 Course Detail and Previous Year Status


6 Proposed Course Completion Report (Before start of semester)
Actual Course Completion Report (At end of semester) and Supplementary
7 provided

8 Syllabus and Evaluation Scheme


9 Institute Academic Calendar
10 Department Academic Calendar
11 Class Time Table
12 Faculty Time Table
13 List of Students
14 Process to Identification Weak and Bright Students
15 Weak Students List
16 Bright Students List
17 Action Taken for Weak Students
18 Analysis of Action Taken
Impact Analysis of Weak Students
19

20 Course Plan Unit Wise


21 Lessons Plan
22 Tutorial Sheets
23 Assignments
24 Sessional Question Papers
25 Last Five Years University End Semester Examination Question Papers
26 Sessional Question Papers
27 Lecture Notes
28 Question Banks
Innovative Teaching-Learning and NPTEL / Other Online Resource used
29

30 CO Attainment Process
31 Attainment Sheet
32 Indirect Attainment (Course Exit Survey)
Institute Vision and Mission
Institute Vision:

To produce quality Engineers, Pharmacists, Scholars and Technocrats useful for the society
and having problem solving abilities towards the society and humanities..

Institute Mission:

1. To provide quality education and enhance skills of the students to make them
useful for the society and industries.

2. To provide environment for Research & Development, innovation and incubation

3. To enhance values and ethics among the students to produce socially responsible
Scholars and Technocrats.
Department Vision and Mission

Department Vision: To be recognized as a Centre of Excellence imparting quality education and


creating new opportunities for students to meet the challenges of technological development
in Computer Applications.

Department Mission:
 To promote technical proficiency by adopting effective teaching learning processes.
 To provide environment & opportunity for students to bring out their inherent talents
for all round development.
 To promote the latest technologies in Computer Science & Applications and across
disciplines in order to serve the needs of Industry, Government, Society, and the
Scientific community.
 To educate students to be successful, ethical , effective problem-solvers and life-long
learners who will contribute positively to the society.
Program Outcomes (POs)

POs Statement
Engineering knowledge: Apply the knowledge of mathematics, science, engineering fundamentals, and an
PO1 engineering specialization to the solution of complex computer engineering problems.
Problem analysis: Identify, formulate, review research literature, and analyse complex computer engineering
PO2 problems reaching substantiated conclusions using first principles of mathematics, natural sciences, and
engineering sciences.
Design/development of solutions: Design solutions for complex computer engineering problems and design
PO3 system components or processes that meet the specific needs with appropriate considerations for the public
health and safety, and the cultural, societal, and environmental considerations.
Conduct investigations of complex problems: Use research-based knowledge and research methods including
PO4 design of experiments, analysis and interpretation of data, and synthesis of the information to provide
conclusions
Modern tool usage: Create, select, and apply appropriate techniques, resources, and modern engineering and IT
PO5 tools including prediction and modelling to complex engineering activities with an understanding of the
limitations
The engineer and society: Apply reasoning informed by the contextual knowledge to assess societal, health,
PO6 safety, legal and cultural issues and the consequent relevant to the professional engineering practices
Environment and sustainability: Understand the impact of the professional engineering solutions in societal
PO7 and environmental contexts, and demonstrate the knowledge of, and need for sustainable development

Ethics: Apply ethical principles and commit to professional ethics and responsibilities and norm of the
PO8 engineering practices
Individual and team work: Function effectively as an individual, and as a member or leader in diverse
PO9 teams, and in multidisciplinary settings
Communications: Communicate effectively on complex engineering activities with the engineering community
PO10 and with society at large, such as, being able to comprehend and write effective reports and design
documentation, make effective presentations, and give and receive clear instructions
Project management and finance: Demonstrate knowledge and understanding of the engineering and
PO11 management principles and apply these to one’s own work, as a member and leader in a team, to manage
projects and in multidisciplinary environments.
Life-long learning: Recognize the need for, and have the preparation and ability to engage in independent and
PO12 life learning in the broadest context of technological change.
Program Educational Objectives (PEOs)

PEO Engineering graduates will be able to:


To provide strong foundation in building technical knowledge, skills and problem solving attitude in
PEO 1 the field of computer applications.
PEO 2 To create a culture of innovation and research through applied learning.
To motivate and guide students to create projects that provide comprehensive solutions to benefit
PEO 3
society and increase employability.
PE0 4 To inculcate values and attitude of responsibility, courage, conviction and action.

Program Specific Outcomes (PSOs)


PSO Engineering graduates will be able to:

Design applications for any desired needs with appropriate considerations for any specific need on
PSO1
societal and environmental aspects.
The students can select the suitable data model, appropriate architecture and platform to implement a
PSO2 system with good performance.
The students can design and integrate various system based components to provide user interactive
PS03 solutions for various challenges.

Course Outcomes (COs)


Course Statement Knowledge
Outcome (On completion of this course, students will be able to) Level
CO1 Understand the basic concepts of cyber security and cybercrimes. K1,K2

CO2 Understand the security policies and cyber laws.


K1,K2
CO3 Understand the tools and methods used in cyber crime. K2
CO4 Understand the concepts of cyber forensics. K1,K2

CO5 Understand the cyber security policies and cyber laws.


K2
CO-POs and PSOs Mapping Matrix
POs PSOs
Course P P P P P
P P P P P P P P P
O O O S S
Outcome O O O O O O O O O
1 1 1 O O
1 2 3 4 5 6 7 8 9
0 1 2 1 2
C01 3 1 - - - - - - - - - 1 - -
C02 3 2 - - - - - - - - - - 2 -
C03 3 2 - - 2 - - - - - - - 1 -
CO4 3 3 - - - - - - - - - - - 1
C05 3 2 - - - - - - - - - 3 - -
Average 3.00 2.00 - - 2.00 - - - - - - 2.00 1.50 1.00
Course Details and Previous Year Status

Name of the Programme: B.Tech Name of Department: B.Tech

Year: 2024-25 Semester: 3

Section: C and D No. of Students: 93


Title of the Subject: Cyber Security
Subject Code: BCC-301

Previous Year Status

Faculty Name: Aditi Goel Department: Computer Science and Engineering


Result % of pass student: 100% Result % of I division:
Attainment level achieved:

Target
Assumption of target
Percentage Pass: 100% Percentage I class: 100% Attainment level: ( 1 to 3)

Target achieved
Percentage Pass: Percentage I class: Attainment level: (1 to 3)

Signature of Signature of Signature of


Subject Teacher Class Coordinator Module Coordinator

Remarks:

Signature of
Date: HOD-CSE
Proposed Course Completion Report (Before start of semester)

Sr. Completion
Unit Title Start Date
No. Date

1 I Introduction To Cybercrime

2 II Cyber Crime

3 III Tools And Methods Used In Cybercrime

4 IV Understanding Computer Forensics

5 V Introduction To Security Policies And Cyber Laws

Actual Course Completion Report (At end of semester)


Sr. Completion
Unit Title Start Date
No. Date
I
1 Introduction To Cybercrime
II
2 Cyber Crime
III
3 Tools And Methods Used In Cybercrime
IV
4 Understanding Computer Forensics
V
5 Introduction To Security Policies And Cyber Laws

Supplementary Provided
Types Yes/No Number of sheets
Tutorials YES 5
Assignment YES 5
Question Bank YES 100
Others(Surprise Test/Unit
YES 5
Test)

Signature of Signature of Signature of


Subject Teacher Class Coordinator Module Coordinator

Remarks:

Signature of
Date: HOD-CSE
Syllabus

Topic Proposed
Unit Lecture

INTRODUCTION TO CYBER CRIME : Cybercrime- Definition


and Origins of the word Cybercrime and Information Security, Who
are Cybercriminals? Classifications of Cybercrimes, A Global
I Perspective on Cybercrimes, Cybercrime Era: Survival Mantra for 04
the Netizens. Cyber offenses: How Criminals Plan the Attacks,
Social Engineering, Cyber stalking, Cybercafe and Cybercrimes,
Botnets: The Fuel for Cybercrime, Attack Vector.

CYBER CRIME : Mobile and Wireless Devices-Introduction,


Proliferation of Mobile and Wireless Devices, Trends in Mobility,
Credit Card Frauds in Mobile and Wireless Computing Era, Security
II
Challenges Posed by Mobile Devices, Registry Settings for Mobile 04
Devices, Authentication Service Security, Attacks on Mobile/Cell
Phones, Mobile Devices: Security Implications for organizations,
Organizational Measures for Handling Mobile, Organizational
Security Policies and Measures in Mobile Computing Era.
TOOLS AND METHODS USED IN CYBERCRIME :
Introduction, Proxy Servers and Anonymizers, Phishing, Password
Cracking, Keyloggers and Spywares, Virus and Worms, Trojan-
III horses and Backdoors, Steganography, DoS and DDoS At-tacks, 04
SQL Injection, Buffer Overflow, Attacks on Wireless Networks.
Phishing and Identity Theft: Introduction to Phishing, Identity Theft
(ID Theft).
UNDERSTANDING COMPUTER FORENSICS: Introduction,
Digital Forensics Science, The Need for Computer Forensics,
Cyber forensics and Digital Evidence, Forensics Analysis of E-
IV Mail, Digital Forensics Life Cycle, Chain of Custody Concept, 04
Network Forensics, Approaching a Computer Forensics
Investigation. Forensics and Social Networking Sites: The
Security/Privacy Threats, Challenges in Computer Forensics.

INTRODUCTION TO SECURITY POLICIES AND CYBER


LAWS : Need for An Information Security Policy, Introduction to
Indian Cyber Law, Objective and Scope of the Digital Personal
V 04
Data Protection Act 2023, Intellectual Property Issues, Overview of
Intellectual Property Related Legislation in India, Patent,
Copyright, Trademarks.
Evaluation Scheme
Institute Academic Calendar
Department Calendar
Class Time Table
Faculty Time Table
List of Students
Process to Identify Weak and Bright Students

1. Weak students are identified based on previous semester result and all lateral
students added
2. This list further modified based on followings.
a. Class performance observed by faculty
b. Sessional performance CT-1
c. Sessional performance CT-II
3. The final weak students list created

6. Motivate to participate in Technical Events


Beginning of the semester
7. Support to get internship/ Industrial Summer Training
8. Participation in value added Courses/ Certification courses that support students for self learning
9. Placement Training & Guidelines

Identify students
learning capability
based on previous
Semester Results,
Sessional Examinations,
and Laboratory
Performance

Mentor Counselling Encourage to get University Rank


Remedial Classes before Sessional, PUT, Selected Students teach weak students
and University Examination Work with faculty in R & D
Weak Student List
S.No Roll No. Name
1.
2
3
4
5
6
7
8
9
10
11
12
13
14
Bright Student List
S.No Roll No. Name
1
2
3
4
5
6
7
8
8
Action Taken for Weak Students

1. There are zero hour classes.


2. Remedial classes at the end of the session.
3. Additional tutorial sheets for weak students.
4. Evaluation of Continuous improvement.

Extra classes
Remedial Classes

S.N
Roll No. Name
o.

1
2
3

Signature of Faculty Signature of Module Co-ordinator Signature of


HOD
Analysis of Action Taken

External Marks
S. No. Roll No Name CGPA
(out of 100)
1
2
3
Impact Analysis of Weak Students
Write in detail about the marks scored by the students.
Course Plan (Unit-I)

1. Name of the Faculty: Aditi Goel


2. Subject : Cyber Security Subject Code: BCC-301
3. Branch : B.Tech

Sl. No. of Mapping with


Date Topics / Sub- Topics References
No. Periods Outcomes.

Cybercrime- Definition and CO-1,2,3,4,5,6 Thomas J. Mowbray,


1 1 “Cybersecurity:
Origins of the word Cybercrime PO-1, PO-2, PO-3, PO-4,
and Information Security, Who Managing Systems,
PO-12, PSO-1 & PSO-2
Conducting Testing
are Cybercriminals?
Classifications of Cybercrimes, CO-1,2,3,4,5,6 Thomas J. Mowbray,
2 1 “Cybersecurity:
A Global Perspective on PO-1, PO-2, PO-3, PO-4,
Cybercrimes, Cybercrime Era: Managing Systems,
PO-12, PSO-1 & PSO-2 Conducting Testing
Survival Mantra for the Netizens.
Cyber offenses: How Criminals CO-1,2,3,4,5,6 Thomas J. Mowbray,
3 1 Plan the Attacks, Social “Cybersecurity:
PO-1, PO-2, PO-3, PO-4,
Engineering, Cyber stalking, Managing Systems,
PO-12, PSO-1 & PSO-2
Cybercafe and Cybercrimes Conducting Testing
CO-1,2,3,4,5,6 Thomas J. Mowbray,
4 1 Botnets: The Fuel for Cybercrime, “Cybersecurity:
PO-1, PO-2, PO-3, PO-4,
Attack Vector. Managing Systems,
PO-12, PSO-1 & PSO-2
Conducting Testing
Course Plan (Unit-II)

Name of the Faculty: Aditi Goel


Subject : Cyber Security Subject Code: BCC-
301 Branch : B.TECH

Sl. No. of Mapping with


Date Topics / Sub- Topics References
No. Periods Outcomes.
CO-1,2,3,4,5,6 Thomas J. Mowbray,
1 1 Mobile and Wireless Devices- PO-1, PO-2, PO-3, PO-4, “Cybersecurity:
Introduction, Proliferation of PO-12, PSO-1 & PSO-2 Managing Systems,
Mobile and Wireless Devices, Conducting Testing
Trends in Mobility
CO-1,2,3,4,5,6 Thomas J. Mowbray,
2 1 Credit Card Frauds in Mobile and PO-1, PO-2, PO-3, PO-4, “Cybersecurity:
Wireless Computing Era, PO-12, PSO-1 & PSO-2 Managing Systems,
Security Challenges Posed by Conducting Testing
Mobile Devices
Registry Settings for Mobile CO-1,2,3,4,5,6 Thomas J. Mowbray,
3 1 Devices, Authentication Service PO-1, PO-2, PO-3, PO-4, “Cybersecurity:
Security, Attacks on Mobile/Cell PO-12, PSO-1 & PSO-2 Managing Systems,
Conducting Testing
Phones
Mobile Devices: Security CO-1,2,3,4,5,6 Thomas J. Mowbray,
4 1 Implications for organizations, PO-1, PO-2, PO-3, PO-4, “Cybersecurity:
Organizational Measures for PO-12, PSO-1 & PSO-2 Managing Systems,
Conducting Testing
Handling Mobile, Organizational
Security Policies and Measures in
Mobile Computing Era.
Course Plan (Unit-III)
Name of the Faculty : Aditi Goel
Subject : Cyber Security Subject Code: BCC-
301 Branch : B.TECH

Sl. No. of Mapping with


Date Topics / Sub- Topics References
No. Periods Outcomes.
CO-1,2,3,4,5,6 Thomas J. Mowbray,
1 1 Introduction, Proxy Servers and “Cybersecurity:
PO-1, PO-2, PO-3, PO-4,
Anonymizers, Phishing, Password Managing Systems,
Cracking PO-12, PSO-1 & PSO-2 Conducting Testing
Keyloggers and Spywares, Virus CO-1,2,3,4,5,6 Thomas J. Mowbray,
2 1 “Cybersecurity:
and Worms, Trojan-horses and PO-1, PO-2, PO-3, PO-4,
Managing Systems,
Backdoors, Steganography PO-12, PSO-1 & PSO-2 Conducting Testing
CO-1,2,3,4,5,6 Thomas J. Mowbray,
3 1 DoS and DDoS At-tacks, SQL “Cybersecurity:
PO-1, PO-2, PO-3, PO-4,
Injection, Buffer Overflow, Attacks Managing Systems,
PO-12, PSO-1 & PSO-2 Conducting Testing
on Wireless Networks
Phishing and Identity Theft: CO-1,2,3,4,5,6 Thomas J. Mowbray,
4 1 “Cybersecurity:
Introduction to Phishing, Identity PO-1, PO-2, PO-3, PO-4,
Managing Systems,
Theft (ID Theft). PO-12, PSO-1 & PSO-2 Conducting Testing
Course Plan (Unit-IV)
Name of the Faculty: Aditi Goel
Subject : Cyber Security Subject Code: BCC-
301 Branch : B.TECH

Sl. No. of Mapping with


Date Topics / Sub- Topics References
No. Periods Outcomes.
CO-1,2,3,4,5,6 Thomas J. Mowbray,
1 1 Introduction, Digital Forensics PO-1, PO-2, PO-3, PO-4, “Cybersecurity:
Science, The Need for Computer PO-12, PSO-1 & PSO-2 Managing Systems,
Forensics Conducting Testing
CO-1,2,3,4,5,6 Thomas J. Mowbray,
2 1 Cyber forensics and Digital PO-1, PO-2, PO-3, PO-4, “Cybersecurity:
Evidence, Forensics Analysis of PO-12, PSO-1 & PSO-2 Managing Systems,
E-Mail, Digital Forensics Life Conducting Testing
Cycle
Chain of Custody Concept, CO-1,2,3,4,5,6 Thomas J. Mowbray,
3 1 Network Forensics, Approaching PO-1, PO-2, PO-3, PO-4, “Cybersecurity:
a Computer Forensics PO-12, PSO-1 & PSO-2 Managing Systems,
Conducting Testing
Investigation.
Forensics and Social Networking CO-1,2,3,4,5,6 Thomas J. Mowbray,
4 1 Sites: The Security/Privacy PO-1, PO-2, PO-3, PO-4, “Cybersecurity:
Threats, Challenges in Computer PO-12, PSO-1 & PSO-2 Managing Systems,
Conducting Testing
Forensics.
Course Plan (Unit-V)
Name of the Faculty: Aditi Goel
Subject : Cyber Security Subject Code: BCC-301
Branch : B.TECH

Sl. No. of Mapping with


Date Topics / Sub- Topics References
No. Periods Outcomes.
CO-1,2,3,4,5,6 Thomas J. Mowbray,
1 1 Need for An Information “Cybersecurity:
PO-1, PO-2, PO-3, PO-4,
Security Policy, Introduction to Managing Systems,
Indian Cyber Law PO-12, PSO-1 & PSO-2
Conducting Testing
CO-1,2,3,4,5,6 Thomas J. Mowbray,
2 1 Objective and Scope of the “Cybersecurity:
PO-1, PO-2, PO-3, PO-4,
Digital Personal Data Protection Managing Systems,
Act 2023 PO-12, PSO-1 & PSO-2 Conducting Testing
Intellectual Property Issues, CO-1,2,3,4,5,6 Thomas J. Mowbray,
3 1
Overview of Intellectual Property PO-1, PO-2, PO-3, PO-4,
“Cybersecurity:
Managing Systems,
Related Legislation in India PO-12, PSO-1 & PSO-2
Conducting Testing
CO-1,2,3,4,5,6 Thomas J. Mowbray,
4 1
Patent, Copyright, Trademarks PO-1, PO-2, PO-3, PO-4,
“Cybersecurity:
Managing Systems,
PO-12, PSO-1 & PSO-2
Conducting Testing
Lesson Plan
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 1 Lecture No. : 1
Date : Title : Introduction

Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
 Cybercrime- Definition
 Origins of the word Cybercrime
 Information Security
 Who are Cybercriminals?
Teaching Aids: White Board, LCD

TEACHING POINTS:
 Cybercrime- Definition
 Origins of the word Cybercrime
 Information Security
 Who are Cybercriminals?

Assignment / Questions
1. Define cybercrime. How did the term originate?
2. How is cybercrime different from traditional crime?
3. Explain the importance of information security in the digital age.
4. What are the key goals of information security (CIA Triad)?
5. How does cybercrime impact individuals, organizations, and nations?
6. Who can be considered a cybercriminal?
7. Explain the motivations behind cybercriminal activities.
8. Differentiate between hackers, crackers, and ethical hackers.
9. What roles do insiders and outsiders play in cybercrime?

Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 1 Lecture No. : 2
Date : Title : Introduction
Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
 Classifications of Cybercrimes
 A Global Perspective on Cybercrimes
 Cybercrime Era: Survival Mantra for the Netizens.
Teaching Aids: White Board, LCD

TEACHING POINTS:
 Classifications of Cybercrimes
 A Global Perspective on Cybercrimes
 Cybercrime Era: Survival Mantra for the Netizens.

Assignment / Questions
1. Classify cybercrimes based on the target of the crime.
2. What is the difference between cyber-dependent and cyber-enabled crimes?
3. Explain the major categories of cybercrime with examples.
4. Write short notes on:
 Cyber fraud
 Identity theft
 Cyberterrorism
 Online defamation
5. Discuss how cybercrime is a global issue.
6. Explain how different countries are addressing cybercrime legislations.
7. What are some major international organizations fighting cybercrime?
8. Describe the challenges in cross-border cybercrime investigation.
9. What precautions should netizens take to avoid being victims of cybercrime?
10. Explain the concept of “digital hygiene” and its importance.
11. What is the role of awareness and education in combating cybercrime?
12. Suggest 5 practices every internet user should follow to stay safe online.

Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 1 Lecture No. : 3
Date : Title : Introduction

Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
 Cyber offenses: How Criminals Plan the Attacks
 Social Engineering
 Cyber stalking
 Cybercafe
 Cybercrimes
Teaching Aids: White Board, LCD

TEACHING POINTS:
 Cyber offenses: How Criminals Plan the Attacks
 Social Engineering
 Cyber stalking
 Cybercafe
 Cybercrimes

Assignment / Questions
1. Describe the typical stages of a cyberattack.
2. What tools and techniques are used by cybercriminals to plan attacks?
3. Explain the role of reconnaissance in cyber offenses.
4. How does a criminal exploit vulnerabilities in systems?
5. What is social engineering? Provide real-life examples.
6. How do attackers use psychology in social engineering attacks?
7. Compare phishing, pretexting, baiting, and tailgating.
8. How can organizations defend against social engineering?
9. Define cyberstalking and its types.
10. What are the legal implications of cyberstalking?
11. What are the signs of being a victim of cyberstalking?
12. Discuss preventive and defensive measures against cyberstalking.
13. Why are cybercafés considered vulnerable spots for cybercrimes?
14. What regulations exist (or should exist) for cybercafés?
15. Give examples of crimes committed using cybercafés.
16. What steps can cybercafé owners take to prevent criminal misuse?

Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 1 Lecture No. : 4
Date : Title : Introduction

Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
 Botnets: The Fuel for Cybercrime
 Attack Vector.

Teaching Aids: White Board, LCD

TEACHING POINTS:
 Botnets: The Fuel for Cybercrime
 Attack Vector.

Assignment / Questions
1. What is a botnet? How is it formed?
2. Explain how botnets are used in cyberattacks.
3. What are some famous botnet attacks in history?
4. How can systems be protected from becoming part of a botnet?
5. Define the term "attack vector."
6. Differentiate between threat, vulnerability, and attack vector.
7. What are common attack vectors used by cybercriminals?
8. How can attack vectors be identified and minimized?

Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 2 Lecture No. : 5
Date : Title : Cyber crime

Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
 Mobile and Wireless Devices-Introduction
 Proliferation of Mobile
 Wireless Devices
 Trends in Mobility

Teaching Aids: White Board, LCD

TEACHING POINTS:
 Mobile and Wireless Devices-Introduction
 Proliferation of Mobile
 Wireless Devices
 Trends in Mobility

Assignment / Questions
1. What are mobile and wireless devices? Give examples.
2. Differentiate between mobile computing and wireless communication.
3. Explain the role of mobile devices in modern computing environments.
4. What are the reasons behind the rapid proliferation of mobile and wireless devices?
5. Discuss the impact of widespread mobile device adoption on personal and business communication.
6. How has the proliferation of mobile devices changed the way organizations function?
7. What are the current and emerging trends in mobility and mobile computing?
8. Explain the concept of BYOD (Bring Your Own Device) and its implications.
9. How is the Internet of Things (IoT) influencing trends in mobile computing?

Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 2 Lecture No. : 6
Date : Title : Cyber Crime

Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
 Credit Card Frauds in Mobile
 Wireless Computing Era
 Security Challenges Posed by Mobile Devices

Teaching Aids: White Board, LCD

TEACHING POINTS:
 Credit Card Frauds in Mobile
 Wireless Computing Era
 Security Challenges Posed by Mobile Devices

Assignment / Questions
1. How are credit card frauds conducted using mobile and wireless platforms?
2. What are the common methods used by attackers to commit credit card fraud through mobile devices?
3. Discuss preventive measures against credit card fraud in mobile transactions.
4. What are the key security challenges associated with mobile devices?
5. How do mobile devices increase the attack surface for organizations?
6. Discuss the challenges in securing data on lost or stolen mobile devices.

Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 2 Lecture No. : 7
Date : Title : Cyber Crime

Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
 Registry Settings for Mobile Devices
 Authentication Service Security
 Attacks on Mobile/Cell Phones

Teaching Aids: White Board, LCD

TEACHING POINTS:
 Registry Settings for Mobile Devices
 Authentication Service Security
 Attacks on Mobile/Cell Phones
Assignment / Questions
1. What are registry settings in mobile devices, and how do they impact security?
2. Explain how unauthorized modification of registry settings can be a security threat.
3. How can proper registry configurations enhance device security?
4. What are the different types of authentication methods used in mobile devices?
5. How does multi-factor authentication enhance mobile device security?
6. What are the limitations of biometric authentication in mobile environments?
7. What are the common types of attacks on mobile phones?
8. Explain how mobile malware and spyware function.
9. What is SIM swapping, and how does it compromise mobile security?

Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 2 Lecture No. : 8
Date : Title : Cyber Crime

Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
 Mobile Devices: Security Implications for organizations
 Organizational Measures for Handling Mobile
 Organizational Security Policies
 Measures in Mobile Computing Era.

Teaching Aids: White Board, LCD

TEACHING POINTS:
 Mobile Devices: Security Implications for organizations
 Organizational Measures for Handling Mobile
 Organizational Security Policies
 Measures in Mobile Computing Era.

Assignment / Questions
1. How do mobile devices pose a risk to organizational information systems?
2. Discuss the security implications of employees accessing company data on personal mobile devices.
3. How can mobile devices be exploited to conduct corporate espionage?
4. What measures can organizations take to manage mobile device usage securely?
5. Explain the role of Mobile Device Management (MDM) systems.
6. How can organizations educate employees about secure mobile usage?
7. What should be included in an organizational mobile security policy?
8. How do mobile usage policies help prevent data breaches?
9. Discuss best practices for implementing a secure mobile computing strategy in an organization.

Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 3 Lecture No. : 9
Date : Title : Cyber Crime

Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.

 Introduction, Proxy Servers and Anonymizers


 Phishing
 Password Cracking

Teaching Aids: White Board, LCD

TEACHING POINTS:
Requirement Engineering Process:
 Introduction, Proxy Servers and Anonymizers
 Phishing
 Password Cracking

Assignment / Questions
1. What are the commonly used tools and methods in cybercrime?
2. How do cybercriminals exploit system vulnerabilities?
3. Why is it important to understand cybercrime tools for information security?
4. What is a proxy server? How is it used in cybercrime?
5. Explain the role of anonymizers in hiding cybercriminal identities.
6. How do proxy chains and VPNs aid in anonymous attacks?
7. What is phishing? Describe its working mechanism.
8. What are the types of phishing attacks (e.g., spear phishing, whaling)?
9. How can phishing attacks be identified and prevented?
10. What are the different password cracking techniques?
11. Compare dictionary attack vs brute-force attack.
12. What tools are commonly used for password cracking?

Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 3 Lecture No. : 10
Date : Title : Cyber Crime

Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.

 Keyloggers and Spywares


 Virus and Worms
 Trojan-horses and Backdoors
 Steganography

Teaching Aids: White Board, LCD

TEACHING POINTS:
Requirement Engineering Process:
 Keyloggers and Spywares
 Virus and Worms
 Trojan-horses and Backdoors
 Steganography

Assignment / Questions
1. What is a keylogger and how does it operate?
2. How does spyware affect system confidentiality and integrity?
3. What are the methods for detecting and removing keyloggers?
4. Differentiate between a computer virus and a worm.
5. How do viruses spread across systems and networks?
6. What are the preventive strategies against worms and viruses?
7. What is a Trojan horse in cybercrime?
8. How do backdoors provide unauthorized access?
9. Explain with examples how Trojan horses are used in cyberattacks.
10. What is steganography and how is it different from cryptography?
11. How can images or audio files be used to hide data?
12. How is steganography used maliciously in cybercrime?

Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 3 Lecture No. : 11
Date : Title : Cyber Crime

Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
 DoS and DDoS At-tacks
 SQL Injection
 Buffer Overflow
 Attacks on Wireless Networks

Teaching Aids: White Board, LCD

TEACHING POINTS:
 DoS and DDoS At-tacks
 SQL Injection
 Buffer Overflow
 Attacks on Wireless Networks

Assignment / Questions
1. What is the difference between DoS and DDoS attacks?
2. What are the symptoms of a DoS/DDoS attack on a server?
3. How can organizations mitigate the impact of DDoS attacks?
4. What is SQL injection? How does it compromise databases?
5. Provide examples of SQL injection statements.
6. What are the preventive measures against SQL injection?
7. What is a buffer overflow attack? Explain with an example.
8. How can buffer overflow lead to privilege escalation?
9. What programming practices help prevent buffer overflows?
10. What are the common threats to wireless networks (e.g., eavesdropping, MITM)?
11. Explain the concept of wardriving and WEP/WPA cracking.
12. How can wireless network security be enhanced?

Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 3 Lecture No. : 12
Date : Title : Cyber Crime

Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
 Phishing and Identity Theft
 Introduction to Phishing
 Identity Theft (ID Theft).

Teaching Aids: White Board, LCD

TEACHING POINTS:
 Phishing and Identity Theft
 Introduction to Phishing
 Identity Theft (ID Theft).

Assignment / Questions
1. What are the psychological techniques used in phishing?
2. Why is phishing considered a social engineering attack?
3. How has phishing evolved in the mobile computing era?
4. What is identity theft and how does it occur?
5. What are the types of identity theft (e.g., financial, medical, criminal)?
6. How can individuals and organizations protect against identity theft?
7. How do tools like Trojans and keyloggers contribute to identity theft?
8. Compare phishing and spoofing in terms of technique and impact.
9. Why is user awareness important in preventing phishing and spyware attacks?

Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 4 Lecture No. : 13
Date : Title : Cyber Crime

Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
 Introduction
 Digital Forensics Science
 The Need for Computer Forensics

Teaching Aids: White Board, LCD

TEACHING POINTS:
 Introduction
 Digital Forensics Science
 The Need for Computer Forensics

Assignment / Questions
1. What is digital forensics? How is it different from traditional forensics?
2. Explain the objectives and scope of digital forensics.
3. Why has digital forensics become essential in the modern era?
4. Define digital forensic science and its relevance in criminal investigations.
5. What are the branches or subfields of digital forensics?
6. Explain the scientific principles applied in digital forensics.
7. Why is computer forensics important in cybersecurity and legal investigations?
8. List and explain scenarios where computer forensics is required.
9. How does computer forensics help in incident response and threat analysis?

Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 4 Lecture No. : 14
Date : Title : Cyber Crime

Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
 Cyber forensics and Digital Evidence
 Forensics Analysis of E-Mail
 Digital Forensics Life Cycle

Teaching Aids: White Board, LCD

TEACHING POINTS:
 Cyber forensics and Digital Evidence
 Forensics Analysis of E-Mail
 Digital Forensics Life Cycle

Assignment / Questions
1. What is cyber forensics, and how does it relate to digital evidence?
2. Define digital evidence. What are its types and sources?
3. What are the legal considerations and admissibility of digital evidence?
4. What is email forensics? What kind of crimes involve email as evidence?
5. Describe the process of analyzing email headers and metadata.
6. How can forged or spoofed emails be detected in forensics?
7. What are the phases of the digital forensics lifecycle?
8. Explain each phase: identification, acquisition, preservation, examination, analysis, reporting.
9. Why is proper documentation important at every stage?

Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 4 Lecture No. : 15
Date : Title : Cyber Crime

Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.

 Chain of Custody Concept

 Network Forensics

 Approaching a Computer Forensics Investigation.

Teaching Aids: White Board, LCD

TEACHING POINTS:
 Chain of Custody Concept

 Network Forensics

 Approaching a Computer Forensics Investigation.

Assignment / Questions
1. What is the chain of custody in digital forensics?
2. Why is maintaining a proper chain of custody crucial for legal admissibility?
3. List the steps to maintain the integrity of evidence during its transfer.
4. Define network forensics and its applications.
5. What are the common tools and techniques used in network forensics?
6. How can network forensics help in detecting intrusions and malware activity?
7. What is the general approach to conducting a computer forensics investigation?
8. What steps are taken to preserve, examine, and analyze digital data?
9. What precautions must be taken to ensure evidence is not altered or destroyed?

Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 4 Lecture No. : 16
Date : Title : Cyber Crime

Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
 Forensics and Social Networking Sites
 The Security/Privacy Threats
 Challenges in Computer Forensics.

Teaching Aids: White Board, LCD

TEACHING POINTS:
 Forensics and Social Networking Sites
 The Security/Privacy Threats
 Challenges in Computer Forensics.

Assignment / Questions
1. How do social networking sites pose challenges in digital forensics?
2. What types of digital evidence can be extracted from social media platforms?
3. Explain the privacy issues and legal implications of collecting data from social networks.
4. What are the technical challenges in modern computer forensics?
5. Discuss the legal and ethical issues involved in digital evidence collection.
6. How do encryption, cloud storage, and anti-forensics techniques complicate forensic investigations?

Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 5 Lecture No. : 17
Date : Title : Cyber Crime

Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
 Need for An Information Security Policy
 Introduction to Indian Cyber Law

Teaching Aids: White Board, LCD

TEACHING POINTS:
 Need for An Information Security Policy
 Introduction to Indian Cyber Law
Assignment / Questions
1. Why is an Information Security Policy necessary in an organization?
2. What are the main components of a good information security policy?
3. Explain how a security policy helps prevent internal and external threats.
4. What are the challenges in implementing a security policy in large organizations?
5. What is cyber law and why is it important in the digital age?
6. Explain the origin and evolution of Indian Cyber Law.
7. What is the role of the Information Technology (IT) Act, 2000 in Indian cyber law?
8. List and explain the key provisions of the IT Act, 2000.

Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 5 Lecture No. : 18
Date : Title : Cyber Crime

Instructional Objectives:
 Objective and Scope of the Digital Personal Data Protection Act 2023

Teaching Aids: White Board, LCD

TEACHING POINTS:
 Objective and Scope of the Digital Personal Data Protection Act 2023

Assignment / Questions
1. What is the main objective of the Digital Personal Data Protection (DPDP) Act, 2023?

2. Explain the scope and applicability of the DPDP Act.

3. Who are Data Principals and Data Fiduciaries under this Act?

4. What rights are given to individuals under the DPDP Act, 2023?

5. How does the DPDP Act align with global data protection standards like GDPR?

Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 5 Lecture No. : 19
Date : Title : Cyber Crime

Instructional Objectives:
 Intellectual Property Issues
 Overview of Intellectual Property Related Legislation in India

Teaching Aids: White Board, LCD

TEACHING POINTS:
 Intellectual Property Issues
 Overview of Intellectual Property Related Legislation in India

Assignment / Questions
1. What is Intellectual Property (IP) and why is it important in the digital world?
2. Discuss the major challenges of IP protection in cyberspace.
3. How does digital piracy affect intellectual property rights?
4. Explain how cybercrime relates to IP theft and software piracy.
5. What are the key IPR-related laws in India?
6. Provide a brief overview of the following:

 The Patents Act, 1970

 The Copyright Act, 1957

 The Trademarks Act, 1999

7. How is IPR enforcement handled in India?

Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 5 Lecture No. : 20
Date : Title : Cyber Crime

Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
 Patent
 Copyright
 Trademarks

Teaching Aids: White Board, LCD

TEACHING POINTS:
 Patent
 Copyright
 Trademarks

Assignment / Questions
1. What is a patent and what are the criteria for patentability?
2. What is the procedure to file a patent in India?
3. Give examples of software or technology patents (if applicable).
4. How long does a patent remain valid in India?
5. Define copyright. What types of works are protected?
6. What is the duration of copyright protection in India?
7. What are the exceptions to copyright, such as fair use?
8. What remedies are available for copyright infringement?
9. What is a trademark? How is it different from a patent or copyright?
10. What is the registration process for a trademark in India?
11. What are infringement and passing off in the context of trademarks?
12. Explain with examples how brands protect their trademarks digitally.

Signature of Faculty
Tutorial Sheets
Tutorial Sheet No.1
Subject Name: Cyber Security Subject Code:BCC-301
Semester: 3 Maximum Marks:
Given Date: Submission Date:

Attempt all questions and each question carries equal marks based on Course Outcome number......

Question

1
Define cybercrime. How did the term originate?
.
2
Explain the relationship between cybercrime and information security.
.
3
What are the key differences between traditional crime and cybercrime?
.
4 Why is information security critical in today’s digital world?
.
5
Who can be classified as a cybercriminal? Explain with examples.
.
6 Explain the different types of cybercriminals based on intent and skill level (e.g., script kiddies,
. hacktivists, insiders).
7
What are the major categories of cybercrime? Give examples of each category of cybercrime.
.
8 How is cybercrime evolving globally? Discuss cybercrime trends in developed vs. developing
. countries.
9
What are some international efforts to combat cybercrime?
.
What is meant by "Survival Mantra for the Netizens" in the cybercrime era?

Suggest some preventive measures and safety tips for internet users.

Describe the general process followed by cybercriminals in planning attacks. What are the common
tools and techniques used to gather information for attacks?
Explain the concept of attack lifecycle in cybercrime.
What is social engineering? Why is it effective?
Describe the different types of social engineering attacks (e.g., phishing, pretexting).

What is cyberstalking and how does it differ from physical stalking? What are the
legal implications and penalties for cyberstalking in India or globally? Suggest ways
to detect and report cyberstalking.
Why are cybercafés considered vulnerable spots for cybercrime? What precautions should be taken
by cybercafé owners and users?
Explain with a case study or example where a cybercafé was used for criminal activity.

What is a botnet? How is it created? How do cybercriminals use botnets for large-scale attacks?
Explain the role of botnets in DDoS and spam attacks.
Tutorial Sheet No.1
What is an attack vector in cybersecurity? List and explain common attack vectors
(e.g., email, network, USB drives).
Tutorial Sheet No.2
Subject Name: Cyber Security Subject Code: BCC-301
Semester: 3 Maximum Marks:
Given Date: Submission Date:

Attempt all questions and each question carries equal marks based on Course Outcome number......

Q. No. Question

Define mobile and wireless devices with suitable examples. What are the key differences
1.
between mobile computing and traditional computing?
2. What factors have led to the proliferation of mobile and wireless devices in recent years?
3. How does this proliferation impact cybersecurity?
Explain the major trends in mobile and wireless technology (e.g., 5G, IoT, BYOD). How
4.
do these trends create new opportunities and challenges for organizations?
What are the common techniques used to commit credit card fraud through mobile
5. platforms? How can users and businesses protect themselves from mobile-based payment
fraud?
6. List and explain at least four major security threats faced by mobile devices.

7. How do such policies help in reducing the risk of data breaches and misuse?

8. What are registry settings in mobile devices and how can they affect security?
9. How can registry manipulation be used in mobile cyberattacks?

10. What are the different types of authentication methods used in mobile devices?
11. Explain the role of multi-factor authentication (MFA) in securing mobile services.
Describe at least three common mobile-specific attacks (e.g., smishing, SIM swapping,
12.
mobile malware). What are the consequences of these attacks on individual users?
How do mobile devices create security risks for organizations? Explain how data leakage
13.
can occur through mobile use in companies.
14. What are Mobile Device Management (MDM) tools and how do they enhance security?
15. How can organizations control and monitor mobile device usage within the workplace?
16. What are the key elements of an organizational mobile security policy?
17. How do such policies help in reducing the risk of data breaches and misuse?
Tutorial Sheet No.3
Subject Name: Cyber Security Subject Code: BCC 301
Semester: 3 Maximum Marks:
Given Date: Submission Date:

Attempt all questions and each question carries equal marks based on Course Outcome number......

Q. No. Question

1. What is phishing? Describe how it works with an example.

2. Differentiate between a virus and a worm. How do they spread?

3. What is SQL Injection? How is it performed and what damage can it cause?

4. What is identity theft? Explain its types with examples.

5. Explain how password cracking is done using brute-force and dictionary attacks.

6. What is a Trojan horse? How does it compromise a system?

7. What are keyloggers? How do they operate and what information do they steal?

8. What is a DoS attack? How is it different from a DDoS attack?

9. What are proxy servers and anonymizers? How do cybercriminals misuse them?

10. What are the common types of phishing attacks? (e.g., spear phishing, vishing, whaling)

11. What is buffer overflow? How can attackers exploit this vulnerability?

12. Explain the role of spyware in cyberattacks. How does it differ from viruses?

13. What is steganography? How is it used for hiding malicious content?

14. How can email be used as a tool for identity theft or phishing?
15. What are the methods to prevent SQL injection attacks in web applications?
16. List and explain common attacks on wireless networks.

17. What is a backdoor? How do attackers use it to gain unauthorized access?

18. What are the security threats associated with phishing emails and fake websites?

19. What are the legal consequences of committing identity theft?

20. How can individuals and organizations protect themselves from phishing and identity theft?
Tutorial Sheet No.4
Subject Name: Subject Code:
Semester: Maximum Marks:
Given Date: Submission Date:

Attempt all questions and each question carries equal marks based on Course Outcome number......

Q. No. Question

1. What do you understand by cyber forensic /digital forensics/ computer forensic .

2. What is the need for computer forensics?

3. What do you understand by forensic analysis of e-mail?

4. What do you understand by digital evidence? Compare physical evidence and digital
evidence.
5. Explain Digital forensics life cycle. What is the need of Information Security policy?

6. What are the various activities involved in the life cycle of a forensic investigation process?

7. Write short note on :-


(1) Network forensics
(2) Chain of custody concept.
(3) Rules of evidence
(4) Social networking site
8. What are the legal challenges associated with computer forensics.
Tutorial Sheet No.5
Subject Name: Subject Code:
Semester: Maximum Marks:
Given Date: Submission Date:

Attempt all questions and each question carries equal marks based on Course Outcome number......

Q. No. Question

1. What is an information security policy? Why is an information security policy important?

2. What is Indian cyber law and what is its primary objective.

3. Why do India need cyber laws?

4. What is digital personal data protection act 2023 what are its main objectives?
5. What is intellectual property what are the different type of intellectual property?

6. What is copyright? What are the requirement for obtaining copyright?

7. What is a patent? What are the requirements for obtaining a patent?

8. What are the rights of a copyright holder?


Assignments
Assignment No.1
Subject Name: Cyber Security Subject Code: BCC-301
Semester: 3 Maximum Marks: 50
Given Date: Submission Date:

Attempt all questions and each question carries equal marks based on Course Outcome number......

Question

Explain the concept of cybercrime.

Who are cybercriminals?

Discuss the global impact of cybercrime.

What is social engineering in the context of cyber offenses?

Write a detailed report on the role of botnets in modern cybercrime.


Assignment No.2
Subject Name: Cyber Security Subject Code: BCC-301
Semester: 3 Maximum Marks: 50
Given Date: Submission Date:

Attempt all questions and each question carries equal marks based on Course Outcome number......

Q. No. Question

1 Discuss the proliferation of mobile and wireless devices in recent years.

2 Explain the different types of credit card frauds prevalent in the mobile and wireless
computing era.

3 Identify and explain the major security challenges posed by mobile devices.

4 What are the common types of attacks on mobile and cell phones?

5 Evaluate the security implications of mobile devices for organizations.


Assignment No.3
Subject Name: Cyber Security Subject Code: BCA-601
Semester: 3 Maximum Marks: 50
Given Date: Submission Date:

Attempt all questions and each question carries equal marks based on Course Outcome number......

Q. No. Question

1. Explain the role of proxy servers and anonymizers in cyber activities.

2. What is phishing and identity theft?

3. Compare and contrast viruses, worms, Trojan horses, and backdoors.

4. What is SQL Injection and Buffer Overflow?

5. Describe the concept of DoS and DDoS attacks.


Assignment No.4
Subject Name: Cyber Security Subject Code: BCC-301
Semester: 3 Maximum Marks: 50
Given Date: Submission Date:

Attempt all questions and each question carries equal marks based on Course Outcome number......

Q. Question
No.

What is digital forensics and why is it important in today’s cybercrime investigations?


1

Explain the digital forensics life cycle.


2
Discuss the concept of the chain of custody.
3

4 How is e-mail analyzed during a digital forensic investigation?

5 Evaluate the privacy and security threats posed by social networking sites.
Assignment No.5
Subject Name: Cyber Security Subject Code: BCC-301
Semester: 3 Maximum Marks: 50
Given Date: Submission Date:

Attempt all questions and each question carries equal marks based on Course Outcome number......

Q. Question
No.

1 Why is there a need for an Information Security Policy in organizations?

2 What is Indian Cyber Law and how does it address modern digital threats?

3 Explain the objectives and scope of the Digital Personal Data Protection Act (DPDP),
2023.
Discuss the major intellectual property issues in cyberspace.
4

5 Give an overview of intellectual property rights (IPR) legislation in India.


Sessional Question Paper
Last Five Years
University End Semester Examination
Question Papers
Sessional Question Papers
Lecture / Unit wise Class Notes
Question Bank Unit Wise
Innovative Teaching-Learning and NPTEL/Other online resource used

The innovative teaching methods followed are –


1. Think-pair-share
2. Quiz
3. Group Discussion
4. Peer-Instruction

Video Link

S.N. Unit Name Link of Video (URL)


https://archive.nptel.ac.in/courses/106/101/1061010
1 Introduction 61/

https://archive.nptel.ac.in/courses/106/101/1061010
2 SRS 61/

https://archive.nptel.ac.in/courses/106/101/1061010
3 Software Design 61/

https://archive.nptel.ac.in/courses/106/101/1061010
4 Software Testing 61/

Software Maintenance https://archive.nptel.ac.in/courses/106/101/1061010


5 and Software Project 61/
Management
CO Attainment Process
Tools for CO Assessment

1. Class Tests (CT-I & CT-II)


2. Assignments
3. Tutorials
4. Quiz
5. Term End Examination
6. Others

Assessment Procedure Table: Basic

Course
Assessment % Total Result
Outcomes
CO1 CAE-I, CAE-II, Univ. Exam, Assignment, attendance A
CO2 CAE-I & CAE-II, Univ. Exam, Assignment, attendance B
CO3 CAE-I & CAE-II, Univ. Exam, Assignment, attendance C
CO4 CAE-I & CAE-II, Univ. Exam, Assignment, attendance D
CO5 CAE-I & CAE-II, Univ. Exam, Assignment, attendance E

Assessment Procedure Table: Details

CO Internal Assessment (20%) External


CO
Outcome CAE-I / Marks
PUT Assignment Attendance Total Achieved
s CAE-II (80%)
CO1 %ATT A

CO2 A1 %ATT B Total


Part A Part A
A2 percentage Z = 0.20
Part B Part B
CO3 A3 %ATT C of student *X+
Part C Part C
A4 having 0.80 * Y
CO4 A5 %ATT D more than p
marks
CO5 %ATT E

Total achieved level X Y Z


1. Marks collected separately for each CO; where A, B, C, D, E achieved internal
attainment of CO-1 to CO-5 respectively.
2. Internal attainment(X) = (A+ B+C+D+E) / 5
3. External attainment(Y)
4. Final attainment (Z) = 0.2 * X + 0.8 * Y
5. Weightage for external assessment is 0.8 whereas for internal assessment, weightage
is 0.2
6. Data collection process for internal assessment (50 marks) is as follows.
a) CAE I / CAE II (12 marks)
b) PUT (18 marks)
c) Teacher assessment (10 marks)
d) Attendance (10 marks)

7. Data collection process for external assessment (100 marks) is as follows.


a) Marks obtained in university marks

Record the attainment of CO of this course

Course attainment levels for internal assessment of all courses are as follows.

1. Level-1 50 % student scoring more than 50 % marks (≥50% to 60%)


2. Level-2 60 % student scoring more than 50 % marks (≥60% to 70%)
3. Level-3 70 % student scoring more than 50 % marks (≥70%)

Course attainment levels for external assessment (Univ. exam) of all courses are as follows.

1. Level-1 30-50 % student scoring more than p % marks (≥30% to 50%)


2. Level-2 50-60 % student scoring more than p % marks (≥50% to 60%)
3. Level-3 60 % student scoring more than p % marks

(≥60%) The value of p based on module of subject

Subject Buckets Module(p)


1.Computer System (CS) √ ≥ 45
2.Network & Information System (NIS) X ≥ 50
3.Software System (SS) X ≥ 55
4.Cognitive Science (CG) X ≥ 50
Criteria for assignments marks
1. Based on Assignments, Unit Test, Tutorials, Viva/Presentation students are evaluated.
2. Criteria for attendance marks.

Percentage of Attendance Marks


less than 60 % Detained
>=60 <70 70 %
>=70 <80 = 80 %
>=80 <90 90 %
>=90 100 %
Complete process flow
Attainment Sheet
Indirect Attainment (Course Exit Survey)

You might also like