Cyber Law and Professional ethics - Syllabus

Course Overview and Structure

Embark on a profound academic exploration as you delve into the Cyber Law and Professional ethics course () within the distinguished Tribhuvan university's BCA department. Aligned with the BCA Curriculum, this course (CACS401) seamlessly merges theoretical frameworks with practical sessions, ensuring a comprehensive understanding of the subject. Rigorous assessment based on a 60 marks system, coupled with a challenging passing threshold of , propels students to strive for excellence, fostering a deeper grasp of the course content.

This 4 credit-hour journey unfolds as a holistic learning experience, bridging theory and application. Beyond theoretical comprehension, students actively engage in practical sessions, acquiring valuable skills for real-world scenarios. Immerse yourself in this well-structured course, where each element, from the course description to interactive sessions, is meticulously crafted to shape a well-rounded and insightful academic experience.


Course Description:

This course presents  concepts of cyber law, cybersecurity, and ethics for IT professionals and IT Organizations. This course also presents different concepts related to intellectual properties and their protections, privacy, and social networking issues.

Course Objectives:
The primary objective of this course is to provide knowledge of cyber law, cybersecurity,privacy protection, intellectual property protection, and ethics for IT professionals and ITorganizations.

Units

Key Topics

  • Ethics
    AN-01

    Introduction to ethics and its importance in various aspects of life. Understanding the basics of ethics and its relevance in the business world.

  • Ethics in the Business World
    AN-02

    The role of ethics in business, its impact on decision making and the importance of corporate social responsibility.

  • Corporate Social Responsibility
    AN-03

    Understanding corporate social responsibility, its benefits and how it can be fostered in an organization.

  • Fostering Corporate Social Responsibility and Good Business Ethics
    AN-04

    Strategies and practices to promote corporate social responsibility and good business ethics in an organization.

  • Improving Business Ethics
    AN-05

    Ways to improve business ethics, including ethical considerations in decision making and promoting a culture of ethics.

  • Ethical Considerations in Decision Making
    AN-06

    The importance of considering ethical implications in decision making and how it affects business outcomes.

  • Ethics in Information Technology
    AN-07

    The role of ethics in information technology, including managing IT worker relationships and encouraging professionalism.

  • Managing IT Worker Relationships
    AN-08

    Best practices for managing relationships with IT workers, including encouraging professionalism and ethical behavior.

  • Encouraging Professionalism of IT Workers
    AN-09

    The importance of professionalism in IT workers, including professional codes of ethics, organizations, certifications, and licensing.

  • Encouraging Ethical Use of IT Resources among Users
    AN-10

    Strategies to promote ethical use of IT resources among users, including responsible behavior and digital citizenship.

Key Topics

  • Threat Landscape
    CY-01

    Understanding the types of cyber threats and computer incidents, including types of exploits.

  • CIA Security Triad
    CY-02

    Confidentiality, Integrity, and Availability (CIA) principles and their implementation at organizational, network, application, and end-user levels.

  • Response to Cyber Attack
    CY-03

    Incident notification, protection of evidence, activity logs, incident containment, eradication, and follow-up procedures.

  • Using an MSSP
    CY-04

    Managed Security Service Providers (MSSPs) and their role in incident response and cybersecurity.

  • Computer Forensics
    CY-05

    The process of collecting, analyzing, and preserving digital evidence in the event of a cyber attack.

  • Cyber Law
    CY-06

    Overview of cyber law and its provisions, including the Electronic Transaction Act of Nepal.

Key Topics

  • Project Management Techniques
    PR-1

    This topic covers various project management techniques used to plan, organize, and control projects. It includes developing project management plans and implementing, monitoring, and controlling projects.

  • Collaborative Development Environment
    PR-2

    This topic focuses on creating an environment that fosters collaboration and teamwork. It includes communications planning, organizing and conducting effective meetings, and other collaborative development strategies.

  • Inter Process Communication
    PR-3

    Methods of communication between processes, including race conditions and critical sections.

  • Implementing Mutual Exclusion
    PR-4

    Techniques for achieving mutual exclusion, including busy waiting, sleep and wakeup, semaphores, monitors, and message passing.

  • Classical IPC Problems
    PR-5

    Solutions to classic inter-process communication problems, including producer-consumer, sleeping barber, and dining philosopher problems.

Key Topics

  • Introduction to E-commerce
    IN-1

    Overview of E-commerce and its significance in the digital age.

  • E-business vs E-commerce
    IN-2

    Understanding the differences between E-business and E-commerce.

  • Features of E-commerce
    IN-3

    Key characteristics and benefits of E-commerce.

  • Pure vs Partial E-commerce
    IN-4

    Types of E-commerce models and their applications.

  • History of E-commerce
    IN-5

    Evolution and development of E-commerce over time.

  • E-commerce Framework
    IN-6

    Understanding the components of E-commerce framework including People, Public Policy, Marketing and Advertisement, Support Services, and Business Partnerships.

  • Types of E-commerce
    IN-7

    Overview of different types of E-commerce including B2C, B2B, C2B, C2C, M-Commerce, U-commerce, Social-Ecommerce, and Local E-commerce.

  • Challenges in E-commerce
    IN-8

    Common obstacles and difficulties faced in E-commerce.

  • Status of E-commerce in Nepal
    IN-9

    Current state and trends of E-commerce in Nepal.

  • Overview of Electronic Transaction Act of Nepal
    IN-10

    Understanding the legal framework governing E-commerce in Nepal.

Key Topics

  • Software Quality and its Importance
    ET-1

    Understanding the significance of software quality and its impact on software development. This topic covers the importance of quality software and its benefits.

  • Strategies for Developing Quality Software
    ET-2

    Exploring various strategies and approaches to develop high-quality software. This topic covers best practices and techniques for software development.

  • Use of Contingent Workers
    ET-3

    Understanding the role and implications of contingent workers in software development. This topic covers the benefits and drawbacks of using contingent workers.

  • H-IB Workers
    ET-4

    Examining the role and implications of H-IB workers in software development. This topic covers the benefits and drawbacks of using H-IB workers.

  • Outsourcing
    ET-5

    Understanding the concept of outsourcing in software development. This topic covers the benefits and drawbacks of outsourcing and its implications on software development.

  • Whistle-Blowing
    ET-6

    Exploring the concept of whistle-blowing in the context of software development. This topic covers the importance of whistle-blowing and its implications on ethical decision-making.

  • Green Computing
    ET-7

    Understanding the concept of green computing and its importance in software development. This topic covers the benefits and implications of green computing on the environment.