All Computer/IT related notes with Syllabus...

Call Me: +9779812837886,+9779847871010

Pages

Cyber security and social ethic


Cyber Security and Professional Ethics
                                                                        EG 3115 CT 

Total: 2 hour /week
Year:        III
Lecture: 2 hours/week 
Semester:  V
Practical:    hours/week

Course Description:
This course is designed to provide the knowledge of fundamental aspects of Cyber Security and professional ethics in cyber world. Security is also an essential part of e-Enable Services, in the enterprise and over networks has become the primary concern. The course will provide skill to the students to how information can be protected throughout application, organization and computer networks and understanding of the social and professional cultural, social, legal, and ethical issues as well. The student will be discussion on different types of cyber security issues, secure techniques, security and cryptography, legal issues in cybercrime, incidents and cyber forensic, ethical issues in cyber world, Professional ethics and Risk and liability in the computer based System. 
Course Objectives:
On completion of this course the students will be enabled to:
       Identify the type's cyber threats and issues in computer application, organization and networks. 
       Familiarize with prevalent application, network and distributed system attacks, defenses against them, and forensics to investigate. 
       Develop a basic understanding of cryptography
       Develop an understanding of security policies such as authentication, integrity and confidentiality as well as protocols to implement. 
       Identify their own limitations as well as the limitations of their tools all practitioners must make a long-term commitment to remaining current in their chosen specialties and in the discipline of computing as a whole. 

Course Contents:
Unit
Topics
Contents
Hours
Methods/ Media
Marks
1
Introduction to Cyber Security:
1.1 Concept of Cyber Security 
1.2 Cyber Crimes
1.3 Types of Attacks in cyber 
1.4 Hacker Techniques
3hrs



2
Security
Technologies:
2.1 Firewalls
2.2 Virtual Private Networks
2.3 Encryption
2.4 Intrusion Detection
5hrs




Unit
Topics
Contents
Hours
Methods/ Media
Marks


2.5 Anti-Malicious Software 
2.6 Secure Software & Browser Security
2.7 SSL and IPSec




3
Information Security and
Cryptography:   
3.1 Classical Encryption Methods
3.2 Asymmetric Key Cryptography
3.3 Confidentiality, Integrity,
Authentication and Non-Repudiation
3.4 Digital Signature 
4hrs



4
Legal Issues in Cyber Crime:
4.1 Legal Issues in Information Security
4.2 Cyber Law in Nepal
4.3 Security Policy
4.4 Managing Risk
4.5 Information Security Process
4.6 Information Security Best Practices
5hrs



5
Forensics and
Incident Analysis
5.1 Forensic Technologies
5.2 Digital Evidence Collection
5.3 Evidentiary Reporting
5.4 Incident Preparation
5.5 Incident Detection and Analysis
5.6 Containment, Eradication, and Recovery
5.7 Proactive and Post Incident Cyber Services
5hrs



6
Ethics in Cyber
security & Cyber
Law
6.1 Privacy
6.2 Intellectual Property
6.3 Professional Ethics
6.4 Freedom of Speech
6.5 Fair User and Ethical Hacking
6.6 Trademarks
6.7 Internet Fraud
6.8 Electronic Evidence
3hrs



7
Professional and
Ethical
Responsibilities:
7.1 Community values and the laws by which we live 
7.2 The nature of professionalism in IT 
7.3 Various forms of professional credentialing  
3hrs



Unit
Topics
Contents
Hours
Methods/ Media
Marks


7.4 The role of the professional in public policy 
7.5 Maintaining awareness of consequences 
7.6 Ethical dissent and whistle-blowing 
7.7 Codes of ethics, conduct, and practice (IEEE, ACM, SE, AITP, and so forth) 
7.8 Dealing with harassment and discrimination 



8
Risks and
Liabilities of
Computer-Based Systems:
8.1 Software risks 
8.2 Safety and the engineers
8.3 Implications of software complexity 
8.4 Risk assessment and management 
2hrs




Recommended books:
1.     Eric Maiwald, Fundamentals of Network Security, McGraw-Hill Education

2.     Patel, D. R. (2008). Information security: theory and practices. New Delhi: Prentice-Hall of India.

3.     NIIT (Organization). (2003). Ethics and security management on the Web. New Delhi: Prentice-Hall of India.

4.     Social, Legal and Ethical Issues for Computers and the Internet by Sara Baase.

5.     Ethics of Computing: Codes, spaces for discussion and law by Jacques Berleur and Klaus Brunnstein Chapman & Hall. 

6.     Joseph Migga Kizza, Ethical and Social Issues in the Information Age






1 comment:

  1. Cyber Security Institute in Delhi
    https://www.click4r.com/posts/g/4858148/best-cyber-security-institute-in-delhi
    APTRON is the best Cyber Security Institute in Delhi offers placement opportunities as an add-on to every student / professional who completed our classroom or online training. Our trainers are industry-experts and subject specialists who have mastered running applications providing Best Cyber Security training to the students.

    ReplyDelete

Clock

Total Pageviews

Popular Posts

Keep Visiting Us For More Latest updates||Thank You||