Ethics and Law of Cyber Security
Admission Procedure: Admission to the course shall be made on merit prepared on the basis of
marks obtained in the qualifying examination as per the eligibility for the course.
Eligibility: All students studying in the college are eligible for the course. Interested can give
names to the coordinator after the announcement of the Course.
The Duration of Study: The curriculum of study for the Certified Course shall be 30 hours, and
shall be divided into two semesters for the examination purposes, called as First and Second .
Course of study: A candidate for the Diploma in Environmental Studies shall be required to:
(i) Study 3 theory papers in First Semester and 2 theory papers in Second Semester carrying 100
marks for each paper.
(ii) Attend lectures, submit written assignments, project reports and also attend and participate in
other activities including extension activities.
Objective:
To understand the basics of cyber law, its related issues and ethical laws of computer for
different countries.
Learning Outcomes:
The students of this course will be able to:
Understand key terms and concepts in cyber law, intellectual property and cyber crimes,
trademarks and domain theft.
Determine computer technologies, digital evidence collection, and evidentiary reporting
in forensic acquisition.
Secure both clean and corrupted systems, protecting personal data, securing simple
Computer networks and safe Internet usage.
Incorporate approaches for incident analysis and response.
Course Content
Module I Hrs: 15
Introduction-Cyber Security and its problem-Intervention Strategies: Redundancy, Diversity and
Autarchy. Introduction to the Legal Perspectives of Cybercrimes and Cyber security, Cybercrime
and the Legal Landscape around the World, Why Do We Need Cyber laws, The Indian IT Act,
Challenges to Indian Law and Cybercrime Scenario in India, Consequences of Not Addressing
the Weakness in Information Technology Act, Digital Signatures and the Indian IT Act,
Cybercrime and Punishment, Cyber law, Technology and Students: Indian Scenario.
Module II Hrs: 15
Private ordering solutions, Regulation and Jurisdiction for global Cyber security, Copy
Rightsource of risks, Pirates, Internet Infringement, Fair Use, postings, criminal liability, First
Amendments, Data Losing.Ethics, Legal Developments, Cyber security in Society, Security in
cyber laws case studies, General lawand Cyber Law-a Swift Analysis.