• Welcome to your new Gnomio site

    Now, you are in control!

    Moodle is an open-source Learning Management System (LMS) that provides educators with the tools and features to create and manage online courses. It allows educators to organize course materials, create quizzes and assignments, host discussion forums, and track student progress. Moodle is highly flexible and can be customized to meet the specific needs of different institutions and learning environments.

    Moodle supports both synchronous and asynchronous learning environments, enabling educators to host live webinars, video conferences, and chat sessions, as well as providing a variety of tools that support self-paced learning, including videos, interactive quizzes, and discussion forums. The platform also integrates with other tools and systems, such as Google Apps and plagiarism detection software, to provide a seamless learning experience.

    Moodle is widely used in educational institutions, including universities, K-12 schools, and corporate training programs. It is well-suited to online and blended learning environments and distance education programs. Additionally, Moodle's accessibility features make it a popular choice for learners with disabilities, ensuring that courses are inclusive and accessible to all learners.

    The Moodle community is an active group of users, developers, and educators who contribute to the platform's development and improvement. The community provides support, resources, and documentation for users, as well as a forum for sharing ideas and best practices. Moodle releases regular updates and improvements, ensuring that the platform remains up-to-date with the latest technologies and best practices.

    Links of interest:

    (You can edit or remove this text)

Available courses

About The Course

                                                 Contents

Module-I. Introduction to Cyber security: Defining Cyberspace and Overview of Computer and Web-technology. Architecture of cyberspace, Communication and web technology, Internet, World wide web, Advent of internet, Internet infrastructure for data transfer and governance, Internet society, Regulation of cyberspace, Concept of cyber security. Issues and challenges of cyber security.

Module-II. Cyber-crime and Cyber law: Classification of cyber-crimes, Common cyber-crimes- cyber-crime targeting computers and mobiles, cyber-crime against women and children, financial frauds, social engineering attacks, malware and ransom ware attacks, zero day and zero click attacks, Cybercriminals modus-operandi, Reporting of cyber-crimes, Remedial and mitigation measures, Legal perspective of cyber-crime, IT Act 2000 and its amendments, Cyber-crime and offences, Organizations' dealing with Cyber-crime and Cyber security in India.

Module III. Social Media Overview and Security: Introduction to Social networks. Types of Social media, Social media platforms, Social media monitoring, Hash tag, Viral content. Social media marketing, Social media privacy, Challenges, opportunities and pitfalls in online social network, Security issues related to social media, Flagging and reporting of inappropriate content, Laws regarding posting of inappropriate content, Best practices for the use of Social media.

Cyber security module-1

MODULE - 1

Introduction to cyber security:

What is Cyber Security?

 Cyber Security is a process that’s designed to protect networks and devices from external

threats.

 Businesses typically employ Cyber Security professionals to protect their confidential

information, maintain employee productivity, and enhance customer confidence in

products and services.

 The technique of protecting internet-connected systems such as computers, servers,

mobile devices, electronic systems, networks, and data from malicious attacks is known

as cybersecurity.

 We can divide cybersecurity into two parts one is cyber, and the other is security.

 Cyber refers to the technology that includes systems, networks, programs, and data.

 And security is concerned with the protection of systems, networks, applications, and

information.

 In some cases, it is also called electronic information security or information

technology security.

What Does Cyberspace Mean?

 Cyberspace refers to the virtual computer world, and more specifically, an electronic

medium that is used to facilitate online communication.

 Cyberspace typically involves a large computer network made up of many worldwide

computer subnetworks that employ TCP/IP protocol to aid in communication and data

exchange activities.

Overview of Computer and Web Technology:

Computer Security – Overview:

 Computer security refers to protecting and securing computers and their related data,

networks, software, hardware from unauthorized access, misuse, theft, information loss,

and other security issues.

 The Internet has made our lives easier and has provided us with lots of advantages but

it has also put our system’s security at risk of being infected by a virus, of being

hacked, information theft, damage to the system, and much m

Types of computer security:

Computer security can be classified into four types:

1. Cyber Security:

 Cyber security means securing our computers, electronic devices, networks , programs,

systems from cyber attacks.

 Cyber attacks are those attacks that happen when our system is connected to the

Internet.

2. Information Security:

 Information security means protecting our system’s information from theft, illegal use

and piracy from unauthorized use.

 Information security has mainly three objectives: confidentiality, integrity, and

availability of information.

3. Application Security:

 Application security means securing our applications and data so that they don’t get

hacked and also the databases of the applications remain safe and private to the owner

itself so that user’s data remains confidential.

4. Network Security:

 Network security means securing a network and protecting the user’s information about

who is connected through that network.

 Over the network hackers steal, the packets of data through sniffing and spoofing

attacks, man in the middle attack, war driving, etc, and misuse the data for their

benefits.

Web Technology:

 Web Technology refers to the various tools and techniques that are utilized in the process

of communication between different types of devices over the Internet.

 Web Technology can be classified into the following sections:

 World Wide Web (WWW): The World Wide Web is based on several different

technologies: Web browsers, Hypertext Markup Language (HTML), and Hypertext Transfer

Protocol (HTTP).

 Web Browser: The web browser is an application software to explore www (World Wide

Web). It provides an interface between the server and the client and requests to the server for

web documents and services.

 Web Server: Web server is a program which processes the network requests of the users and

serves them with files that create web pages. This exchange takes place using Hypertext

Transfer Protocol (HTTP).

 Web Pages: A webpage is a digital document that is linked to the World Wide Web and

viewable by anyone connected to the internet has a web browser.

CS Working