Cyber Security and
Professional Ethics
EG 3115 CT
|
Total: 2 hour /week
|
Year: III
|
Lecture: 2 hours/week
|
Semester: V
|
Practical: hours/week
|
Course Description:
This course is designed to provide the knowledge of
fundamental aspects of Cyber Security and professional ethics in cyber world.
Security is also an essential part of e-Enable Services, in the enterprise and
over networks has become the primary concern. The course will provide skill to
the students to how information can be protected throughout application,
organization and computer networks and understanding of the social and
professional cultural, social, legal, and ethical issues as well. The student will
be discussion on different types of cyber security issues, secure techniques,
security and cryptography, legal issues in cybercrime, incidents and cyber
forensic, ethical issues in cyber world, Professional ethics and Risk and
liability in the computer based System.
Course Objectives:
On
completion of this course the students will be enabled to:
• Identify the
type's cyber threats and issues in computer application, organization and
networks.
• Familiarize
with prevalent application, network and distributed system attacks, defenses
against them, and forensics to investigate.
• Develop a
basic understanding of cryptography
• Develop an
understanding of security policies such as authentication, integrity and
confidentiality as well as protocols to implement.
• Identify
their own limitations as well as the limitations of their tools all
practitioners must make a long-term commitment to remaining current in their
chosen specialties and in the discipline of computing as a whole.
Course Contents:
Unit
|
Topics
|
Contents
|
Hours
|
Methods/
Media
|
Marks
|
1
|
Introduction to Cyber Security:
|
1.1 Concept
of Cyber Security
1.2 Cyber
Crimes
1.3 Types
of Attacks in cyber
1.4 Hacker Techniques
|
3hrs
|
|
|
2
|
Security
Technologies:
|
2.1 Firewalls
2.2 Virtual
Private Networks
2.3 Encryption
2.4 Intrusion Detection
|
5hrs
|
|
|
Unit
|
Topics
|
Contents
|
Hours
|
Methods/
Media
|
Marks
|
|
|
2.5 Anti-Malicious
Software
2.6 Secure
Software & Browser Security
2.7 SSL
and IPSec
|
|
|
|
3
|
Information Security and
Cryptography:
|
3.1 Classical
Encryption Methods
3.2 Asymmetric
Key Cryptography
3.3 Confidentiality,
Integrity,
Authentication and Non-Repudiation
3.4 Digital Signature
|
4hrs
|
|
|
4
|
Legal Issues in Cyber Crime:
|
4.1 Legal
Issues in Information Security
4.2 Cyber
Law in Nepal
4.3 Security
Policy
4.4 Managing
Risk
4.5 Information
Security Process
4.6 Information Security Best Practices
|
5hrs
|
|
|
5
|
Forensics and
Incident Analysis
|
5.1 Forensic
Technologies
5.2 Digital
Evidence Collection
5.3 Evidentiary
Reporting
5.4 Incident
Preparation
5.5 Incident
Detection and Analysis
5.6 Containment,
Eradication, and Recovery
5.7 Proactive and Post Incident Cyber Services
|
5hrs
|
|
|
6
|
Ethics in Cyber
security & Cyber
Law
|
6.1 Privacy
6.2 Intellectual
Property
6.3 Professional
Ethics
6.4 Freedom
of Speech
6.5 Fair
User and Ethical Hacking
6.6 Trademarks
6.7 Internet
Fraud
6.8 Electronic Evidence
|
3hrs
|
|
|
7
|
Professional and
Ethical
Responsibilities:
|
7.1 Community
values and the laws by which we live
7.2 The nature of professionalism in
IT
7.3 Various forms of professional credentialing
|
3hrs
|
|
|
Unit
|
Topics
|
Contents
|
Hours
|
Methods/
Media
|
Marks
|
|
|
7.4 The
role of the professional in public policy
7.5 Maintaining
awareness of consequences
7.6 Ethical dissent and
whistle-blowing
7.7 Codes
of ethics, conduct, and practice (IEEE, ACM, SE, AITP, and so forth)
7.8 Dealing with harassment and discrimination
|
|
|
|
8
|
Risks and
Liabilities of
Computer-Based Systems:
|
8.1 Software risks
8.2 Safety and the engineers
8.3 Implications of software
complexity
8.4 Risk
assessment and management
|
2hrs
|
|
|
Recommended books:
2. Patel, D. R.
(2008). Information security: theory and
practices. New Delhi: Prentice-Hall of India.
3. NIIT
(Organization). (2003). Ethics and
security management on the Web. New Delhi: Prentice-Hall of India.
4. Social,
Legal and Ethical Issues for Computers and the Internet by Sara Baase.
5. Ethics of
Computing: Codes, spaces for discussion and law by Jacques Berleur and Klaus
Brunnstein Chapman & Hall.
6. Joseph Migga
Kizza, Ethical and Social Issues in the Information Age
Cyber Security Institute in Delhi
ReplyDeletehttps://www.click4r.com/posts/g/4858148/best-cyber-security-institute-in-delhi
APTRON is the best Cyber Security Institute in Delhi offers placement opportunities as an add-on to every student / professional who completed our classroom or online training. Our trainers are industry-experts and subject specialists who have mastered running applications providing Best Cyber Security training to the students.