3

Ethics and Law of Cyber Security - Amal Collegeamalcollege.ac.in/Uploads/Documents/Human valur...Ethics and Law of Cyber Security ... Understand key terms and concepts in cyber law,

  • Upload
    others

  • View
    21

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Ethics and Law of Cyber Security - Amal Collegeamalcollege.ac.in/Uploads/Documents/Human valur...Ethics and Law of Cyber Security ... Understand key terms and concepts in cyber law,
Page 2: Ethics and Law of Cyber Security - Amal Collegeamalcollege.ac.in/Uploads/Documents/Human valur...Ethics and Law of Cyber Security ... Understand key terms and concepts in cyber law,

Ethics and Law of Cyber Security

Admission Procedure: Admission to the course shall be made on merit prepared on the basis of

marks obtained in the qualifying examination as per the eligibility for the course.

Eligibility: All students studying in the college are eligible for the course. Interested can give

names to the coordinator after the announcement of the Course.

The Duration of Study: The curriculum of study for the Certified Course shall be 30 hours, and

shall be divided into two semesters for the examination purposes, called as First and Second .

Course of study: A candidate for the Diploma in Environmental Studies shall be required to:

(i) Study 3 theory papers in First Semester and 2 theory papers in Second Semester carrying 100

marks for each paper.

(ii) Attend lectures, submit written assignments, project reports and also attend and participate in

other activities including extension activities.

Objective:

To understand the basics of cyber law, its related issues and ethical laws of computer for

different countries.

Learning Outcomes:

The students of this course will be able to:

Understand key terms and concepts in cyber law, intellectual property and cyber crimes,

trademarks and domain theft.

Determine computer technologies, digital evidence collection, and evidentiary reporting

in forensic acquisition.

Secure both clean and corrupted systems, protecting personal data, securing simple

Computer networks and safe Internet usage.

Incorporate approaches for incident analysis and response.

Page 3: Ethics and Law of Cyber Security - Amal Collegeamalcollege.ac.in/Uploads/Documents/Human valur...Ethics and Law of Cyber Security ... Understand key terms and concepts in cyber law,

Course Content

Module I Hrs: 15

Introduction-Cyber Security and its problem-Intervention Strategies: Redundancy, Diversity and

Autarchy. Introduction to the Legal Perspectives of Cybercrimes and Cyber security, Cybercrime

and the Legal Landscape around the World, Why Do We Need Cyber laws, The Indian IT Act,

Challenges to Indian Law and Cybercrime Scenario in India, Consequences of Not Addressing

the Weakness in Information Technology Act, Digital Signatures and the Indian IT Act,

Cybercrime and Punishment, Cyber law, Technology and Students: Indian Scenario.

Module II Hrs: 15

Private ordering solutions, Regulation and Jurisdiction for global Cyber security, Copy

Rightsource of risks, Pirates, Internet Infringement, Fair Use, postings, criminal liability, First

Amendments, Data Losing.Ethics, Legal Developments, Cyber security in Society, Security in

cyber laws case studies, General lawand Cyber Law-a Swift Analysis.