Cyber Sequrityy

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

MAULANA ABUL KALAM AZAD UNIVERSITY OF TECHNOLOGY, WB

Syllabus of BCA
(Effective for 2020-2021 Admission Session)
Choice Based Credit System
Name of the Course: BCA
Subject: Cyber Security
Course Code: BCAC602 Semester: 6
Duration: 48 Hrs. Maximum Marks: 100
Teaching Scheme Examination Scheme
Theory: 5 End Semester Exam: 70
Tutorial: 1 Attendance : 5
Practical: 0 Continuous Assessment: 25
Credit: 5+1 Practical Sessional internal continuous evaluation: 0
Practical Sessional external examination: 0
Aim:
Sl. No.
1 This course is aimed at giving basic understanding about the Cyber Security
2 This course is aimed at providing knowledge about cyber threats, attacks and cyber
laws.
3 This course is aimed at familiarizing the concepts of malware, hacking and ways to
safeguard your system.
Objective:
Sl. No.
1 Develop an overall understanding of defending data in cyberspace
2 Develop an understanding of different protocols, cyber crimes, cyber laws and
vulnerabilities in digital world.
3 Develop an understanding of how to stay secure amidst cyber threats and malware
attacks.
Pre-Requisite:
Sl. No.
1. None
Contents
Chapter Name of the Topic Hours Marks
Fundamentals
Fundamentals of data communication and networking, Network
Reference Models: OSI and TCP/IP Models, 3 way handshake
and TCP flags, Network address translation (NAT) concept,
01 8 10
Network Transmission media and network devices Information
Security definition, Information security goals (Confidentiality,
Integrity and availability), Basic concepts of Cryptography and
Steganography
Hacking Concepts
Hacking, Types of Hacking/Hackers, what is Cybercrime, Types
02 of cybercrime, Classifications of Security attacks (Passive Attacks 10 15
and Active Attacks) Essential Terminology (Threat, Vulnerability,
Target of Evaluation, Attack, Exploit). Concept of ethical hacking,
MAULANA ABUL KALAM AZAD UNIVERSITY OF TECHNOLOGY, WB
Syllabus of BCA
(Effective for 2020-2021 Admission Session)
Choice Based Credit System
Phase of Ethical Hacking, Hacktivism

Cyber Law
Cyber terrorism, Cyber laws, What offences are covered under
these laws (Hacking, Data theft, Identity theft (including
Password Theft), Email spoofing, Sending offensive messages,
Voyeurism, Cyber terrorism) Punishment for cyber crime in India
Malware
About Malware, Types of Malware (Virus, worm, Trojan horse,
spyware, adware, ransomware), Type of Computer Viruses( File
Virus, Boot sector virus, Macro virus, Electronic mail (email)
virus, Multi-variant virus) some indications of a malware attacks,
Popular Antivirus programs, basic idea of how antivirus
identifies a virus (Signature-based detection, Heuristics-based
detection , Cloud based detection) about Virus Total website
DOS, IDS, IPS
03 12 20
Denial of service attack, Distributed Denial of service attack,
Intrusion Detection System, Intrusion Prevention System,
snooping, Eavesdropping, Key loggers and Firewall,
BOTs/BOTNETS (Zombies).

Web Application Based Threats


Cross-site scripting, SQL injection, Command injection, Buffer
overload, Directory traversal, Phishing scams, Drive by
downloads
Wireless Networking
Concept of wireless networking, Wireless standards, Common
term used in wireless networking (WLAN, Wireless, Wireless
Access point, cellular, Attenuation, Antenna, Microwave,
Jamming, SSID, Bluetooth, Wi-Fi hotspots) What is Wi-Fi,
Wireless attacks(War Driving, War Walking: War Flying, War
04 12 15
Chalking, Blue Jacking) , How to secure wireless networks

Protocols & Proxy


TOPICS: Some protocols (HTTP, HTTPS, FTP, SSH, TELNET, SMTP,
DNS, POP3, and related ports), proxy concept, different types of
proxy ( forward and reverse proxy concept), proxy chain
Stay Secure in digital World
Usage of Password, Different types of password (Biometric,
Pattern based Graphical password, Strong Password technique,
05 2 10
Types of Password attacks
Steps to stay secure in digital World, have strong password,
encrypt your data, security suit software, firewall setup, update
MAULANA ABUL KALAM AZAD UNIVERSITY OF TECHNOLOGY, WB
Syllabus of BCA
(Effective for 2020-2021 Admission Session)
Choice Based Credit System
OS
Sub Total: 44 70
Internal Assessment Examination & Preparation of Semester
4 30
Examination
Total: 48 100
Assignments:
Based on the curriculum as covered by the subject teacher.

List of Books
Text Books:
Name of Author Title of the Book Edition/ISSN/IS Name of the
BN Publisher
Mayank Bhusan Fundamentals of Cyber BPB Publications
Rajkumar Singh Security (Principle, Theory
Rathore and Practices)
Aatif Jamshed
Behrouz A. Data communication and McGraw Hill
Forouzan Networking Education (India) Pvt.
Ltd.
Reference Books:
William Manning Certified Ethical Hacker Emereo
Certification Exam
Nina Godbole Cyber Security : Wiley India
Sunit Belapure Understanding cyber crimes,
computer forensics and legal
perspective

End Semester Examination Scheme. Maximum Marks-70. Time allotted-3hrs.


Group Unit Objective Questions
(MCQ only with the Subjective Questions
correct answer)
No of Total No of To Marks Total
question Marks question answer per Marks
to be set to be set question
A 1 to 5 10 10

B 1 to 5 5 3 5 70

C 1 to 5 5 3 15
Only multiple choice type question (MCQ) with one correct answer are to be set in the
objective part.
MAULANA ABUL KALAM AZAD UNIVERSITY OF TECHNOLOGY, WB
Syllabus of BCA
(Effective for 2020-2021 Admission Session)
Choice Based Credit System
Specific instruction to the students to maintain the order in answering objective questions
should be given on top of the question paper.

Examination Scheme for end semester examination:


Group Marks of each Question to be Question to be
Chapter
question set answered
A All 1 10 10
B All 5 5 3
C All 15 5 3

You might also like