Page 245 - IT_Bulletin
P. 245
INFORMATION SECURITY & CYBER LAW

RGPV (DIPLOMA OBE CURRICULUM FOR FORMAT-3 Sheet

WING) BHOPAL THE No. 1/5

COURSE

Branch Information Technology Semester VI

Course Course Information Security and Cyber Law
Code Name

Course Outcome Identify Information Security within the Teach Mark

- 1 system Hrs s

Learning Outcome Outline Information Security 6 10
1

Contents ● Definition, Need of Security, Types of Security
● Security Principles, CIA Triad
● Security Terminologies: Threat, Exploit, Vulnerability,

Risk, Attacks

Method of Internal: Mid semester theory examination (Pen paper test).
Assessment

Learning Outcome Explain threats, attacks & vulnerabilities 9 10
2

Contents ● Attack: Active & Passive (DoS attack, Backdoor, Man In
Middle Attack, Brute force attack, Dictionary attack)

● Malware threat : Virus, worms, Trojan horse, logic bomb
● Vulnerabilities: Overview, classification, identification

Method of External: End semester theory examination (Pen paper test).
Assessment

Learning Outcome Experiment with attacks and vulnerability 4 10
3

Contents ● Perform Vulnerabilities like creating Backdoor to access file

Method and folders in computer system
Assessment
● Perform Security Scan after creating vulnerability like
backdoor

of External: Laboratory observation and viva voce.

RGPV (DIPLOMA OBE CURRICULUM FOR FORMAT-3 Sheet
THE No. 2/5
WING) BHOPAL
COURSE

INFORMATION SECURITY & CYBER LAW 245
   240   241   242   243   244   245   246   247   248   249   250