Cyber Law and Professional ethics - Syllabus
Embark on a profound academic exploration as you delve into the Cyber Law and Professional ethics course () within the distinguished Tribhuvan university's BCA department. Aligned with the BCA Curriculum, this course (CACS401) seamlessly merges theoretical frameworks with practical sessions, ensuring a comprehensive understanding of the subject. Rigorous assessment based on a 60 marks system, coupled with a challenging passing threshold of , propels students to strive for excellence, fostering a deeper grasp of the course content.
This 4 credit-hour journey unfolds as a holistic learning experience, bridging theory and application. Beyond theoretical comprehension, students actively engage in practical sessions, acquiring valuable skills for real-world scenarios. Immerse yourself in this well-structured course, where each element, from the course description to interactive sessions, is meticulously crafted to shape a well-rounded and insightful academic experience.
Course Description:
This course presents concepts of cyber law, cybersecurity, and ethics for IT professionals and IT Organizations. This course also presents different concepts related to intellectual properties and their protections, privacy, and social networking issues.
Course Objectives:
The primary objective of this course is to provide knowledge of cyber law, cybersecurity,privacy protection, intellectual property protection, and ethics for IT professionals and ITorganizations.
Units
Key Topics
-
Ethics
AN-01Introduction to ethics and its importance in various aspects of life. Understanding the basics of ethics and its relevance in the business world.
-
Ethics in the Business World
AN-02The role of ethics in business, its impact on decision making and the importance of corporate social responsibility.
-
Corporate Social Responsibility
AN-03Understanding corporate social responsibility, its benefits and how it can be fostered in an organization.
-
Fostering Corporate Social Responsibility and Good Business Ethics
AN-04Strategies and practices to promote corporate social responsibility and good business ethics in an organization.
-
Improving Business Ethics
AN-05Ways to improve business ethics, including ethical considerations in decision making and promoting a culture of ethics.
-
Ethical Considerations in Decision Making
AN-06The importance of considering ethical implications in decision making and how it affects business outcomes.
-
Ethics in Information Technology
AN-07The role of ethics in information technology, including managing IT worker relationships and encouraging professionalism.
-
Managing IT Worker Relationships
AN-08Best practices for managing relationships with IT workers, including encouraging professionalism and ethical behavior.
-
Encouraging Professionalism of IT Workers
AN-09The importance of professionalism in IT workers, including professional codes of ethics, organizations, certifications, and licensing.
-
Encouraging Ethical Use of IT Resources among Users
AN-10Strategies to promote ethical use of IT resources among users, including responsible behavior and digital citizenship.
Key Topics
-
Threat Landscape
CY-01Understanding the types of cyber threats and computer incidents, including types of exploits.
-
CIA Security Triad
CY-02Confidentiality, Integrity, and Availability (CIA) principles and their implementation at organizational, network, application, and end-user levels.
-
Response to Cyber Attack
CY-03Incident notification, protection of evidence, activity logs, incident containment, eradication, and follow-up procedures.
-
Using an MSSP
CY-04Managed Security Service Providers (MSSPs) and their role in incident response and cybersecurity.
-
Computer Forensics
CY-05The process of collecting, analyzing, and preserving digital evidence in the event of a cyber attack.
-
Cyber Law
CY-06Overview of cyber law and its provisions, including the Electronic Transaction Act of Nepal.
Key Topics
-
Project Management Techniques
PR-1This topic covers various project management techniques used to plan, organize, and control projects. It includes developing project management plans and implementing, monitoring, and controlling projects.
-
Collaborative Development Environment
PR-2This topic focuses on creating an environment that fosters collaboration and teamwork. It includes communications planning, organizing and conducting effective meetings, and other collaborative development strategies.
-
Inter Process Communication
PR-3Methods of communication between processes, including race conditions and critical sections.
-
Implementing Mutual Exclusion
PR-4Techniques for achieving mutual exclusion, including busy waiting, sleep and wakeup, semaphores, monitors, and message passing.
-
Classical IPC Problems
PR-5Solutions to classic inter-process communication problems, including producer-consumer, sleeping barber, and dining philosopher problems.
Key Topics
-
Introduction to E-commerce
IN-1Overview of E-commerce and its significance in the digital age.
-
E-business vs E-commerce
IN-2Understanding the differences between E-business and E-commerce.
-
Features of E-commerce
IN-3Key characteristics and benefits of E-commerce.
-
Pure vs Partial E-commerce
IN-4Types of E-commerce models and their applications.
-
History of E-commerce
IN-5Evolution and development of E-commerce over time.
-
E-commerce Framework
IN-6Understanding the components of E-commerce framework including People, Public Policy, Marketing and Advertisement, Support Services, and Business Partnerships.
-
Types of E-commerce
IN-7Overview of different types of E-commerce including B2C, B2B, C2B, C2C, M-Commerce, U-commerce, Social-Ecommerce, and Local E-commerce.
-
Challenges in E-commerce
IN-8Common obstacles and difficulties faced in E-commerce.
-
Status of E-commerce in Nepal
IN-9Current state and trends of E-commerce in Nepal.
-
Overview of Electronic Transaction Act of Nepal
IN-10Understanding the legal framework governing E-commerce in Nepal.
Key Topics
-
Software Quality and its Importance
ET-1Understanding the significance of software quality and its impact on software development. This topic covers the importance of quality software and its benefits.
-
Strategies for Developing Quality Software
ET-2Exploring various strategies and approaches to develop high-quality software. This topic covers best practices and techniques for software development.
-
Use of Contingent Workers
ET-3Understanding the role and implications of contingent workers in software development. This topic covers the benefits and drawbacks of using contingent workers.
-
H-IB Workers
ET-4Examining the role and implications of H-IB workers in software development. This topic covers the benefits and drawbacks of using H-IB workers.
-
Outsourcing
ET-5Understanding the concept of outsourcing in software development. This topic covers the benefits and drawbacks of outsourcing and its implications on software development.
-
Whistle-Blowing
ET-6Exploring the concept of whistle-blowing in the context of software development. This topic covers the importance of whistle-blowing and its implications on ethical decision-making.
-
Green Computing
ET-7Understanding the concept of green computing and its importance in software development. This topic covers the benefits and implications of green computing on the environment.