University School OF: Course Structure
University School OF: Course Structure
UNIVERSITY SCHOOL
OF
INFORMATION AND COMMUNICATION TECHNOLOGY
COURSE STRUCTURE
B. TECH
COMPUTER SCIENCE AND ENGINEERING
Specialization: Cyber Security
2022-2026
SEMESTER I
SEMESTER II
SEMESTER III
SEMESTER IV
SEMESTER V
SEMESTER VI
Sr.No Course Code Courses L-T-P Credits
● Industrial training will be done after the third year during the summer break and it will be of
minimum 4 weeks. It will be evaluated at the end of VII Semester.
SEMESTERVII
SEMESTER VIII
Sr.No Course Code Courses L-T-P Credits
1 CC490 Seminar 0-0-3 2
2 CS492 Major Project 0-0-16 8
3 CS494 Internship 0-0-30 15
4 GP General Proficiency Non Credit
Total Credits 25
Total Contact Hours 0-0-49=35
● In the Seminar, students need to study and present individually, on the latest research paper of their specialized area
and It will be evaluated as per University Examination Rules.
● The Internship in Industry will be done by candidates individually during the 8th semester and it will be for 4-6
months. It will be evaluated as per University Examination Rules.
Minor and Major Project will be in a group and It will be evaluated as per University Examination Rules. USICT
will provide a mentor/supervisor for industrial training, seminar, internship, minor and major projects.
ELECTIVES
Course
S.No. Course Name L T P Credits Types
Code
1 CC311 Security Information and Event Management 3 0 0 3 E1
2 CC313 Intrusion Detection and Prevention System 3 0 0 3 E1
3 CC315 Cryptography 3 0 0 3 E1
4 CC317 Biometric System and Security 3 0 0 3 E1
5 CC319 Ethical Hacking 3 0 0 3 E2
6 CC312 Mobile Security 3 0 0 3 E2
7 CC314 Cloud Architecture and Security 3 0 0 3 E2
SEMESTER-I
SEMESTER-II
COURSE OBJECTIVES
Students will be able to:
1. Provide students with understanding of programming essentials and to learn preprogramming
steps like writing algorithms, drawing flowcharts and pseudo codes.
2.Understand the structure, and learn the syntax and semantics of C programming
3.Know the variable declaration with different data types and learn using operators and different
control structures like decision control, loop control and special cases..
4. Recognize the concept of pointers, declarations, initialization, operations on pointers and their
usage
5.Analyse how to perform various FILE I/O.
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Able to implement the algorithms and draw flowcharts for solving Mathematical and
Engineering problems.
2.Students can write, compile and debug programs in C language and use different data types for
writing the programs
3.Able to design programs connecting decision structures, loops and functions..
4.Understand the dynamic behavior of memory by the use of pointers..
5.Develop confidence for self-education and ability for life-long learning needed for Computer
language.
comments, control flow statement :if, while, for, do-while, switch. bitwise operators, Pre defined
and User defined data types, arrays, declaration and opera- tions on arrays, searching and sorting on
arrays, types of sorting, 2D arrays, Passing 2D arrays to functions, structure, member accessing,
structure and union, array of structures, func- tions, declaration and use of functions, parameter
passing, recurssion .
UNIT IV FUNDAMENTALS OF POINTERS
Introduction to pointers, pointer notations in C, Declaration and usages of pointers, operations that
can be performed on computers, use of pointers in programming exercises, parameter passing in
pointers, call by value, call by references, array and characters using pointers, dynamic memory
allocation
UNIT V FILE HANDLING IN C AND ENUM
Introduction to file handling, file operations in C , defining and opening in file, reading a file,
closing a file, input output operations on file, counting: characters, tabs , spaces, file opening
modes, error handling in input/output operations, Enumerated data types, use of Enum, declaration
of Enum.
Text Books:
4. C Puzzle Book: Puzzles For The C. Programming Language by Alan R Feuer Prentice HallGale
5. Expert C Programming: Deep C Secrets (s) by Peter Van Der Linden Dorling Kindersley
COURSE OBJECTIVES
1. To prepare students with the technical knowledge and skills needed to protect and defend computer
systems and networks.
2. To develop graduates that can plan, implement, and monitor cyber security mechanisms to help
ensure the protection of information technology assets.
3. Analyze and resolve security issues in networks and computer systems to secure an IT
infrastructure
4. Evaluate and communicate the human role in security systems with an emphasis on ethics,
social engineering vulnerabilities and training
5. Interpret and forensically investigate security incident
COURSE OUTCOMES
At the end of the course the students should be able to:
1. Follow a structured model in Security Systems Development Life Cycle (SDLC)
2. Plan, implement and audit operating systems' security in a networked, multi-platform and cross
platform environment
3. Protect data and respond to threats that occur over the Internet
4. Design and implement risk analysis, security policies, and damage assessment
5. Detect attack methodology and combat hackers from intrusion or other suspicious attempts at
connection to gain unauthorized access to a computer and its resources
forensics; Objective of cyber security forensics investigators; How experts works; Stages of forensics
investigation; Techniques and tools used by forensics experts; Advantages of cyber forensics; Incident
handling;
UNIT-V SECURING WEB APPLICATIONS, SERVICES AND SERVER
Introduction; Basic security for HTTP applications and services; Basic security for SOAP (
Simple Object Access Protocol )services; Identify management and Web Services;
Authorization Patterns; Security Considerations and challenges;
Text Books:
1. Jon Friedman. Mark Bouchard, CISSP. Foreword by John P. Watters to. Cyber Threat
Intelligence. Definitive GuideTM. 2015.
5. Cyberspace and the Law: Your Rights and Duties in the On-Line World By Edward
Cavazos and Gavino Morin: MIT Press: 1994.
COURSE OBJECTIVES
1.Discuss the basic concepts and structure of computers.
2.Understand concepts of register transfer logic and arithmetic operations.
3.Explain different types of addressing modes and memory organization.
4.Learn the different types of serial communication techniques.
5.Summarize the Instruction execution stages.
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Define different number systems, binary addition and subtraction, 2’s complement representation and
operations with this representation.
2.Able to understand the theory and architecture of central processing unit
3.Analyze some of the design issues in terms of speed, technology, cost, performance.
4.Use appropriate tools to design verify and test the CPU architecture
5 .Learn the concepts of parallel processing, pipelining and interprocessor communication.
Text Books:
COURSE OBJECTIVES
1.Introduce students to the basic knowledge of programming fundamentals of C language.
2.Impart writing skill of C programming to the students and solving problems.
3.Impart the concepts like looping, array, functions, pointers, file, structure.
4.Write programs to print output on the screen as well as in the files..
5.Apply all the concepts that have been covered in the theory course.
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Recognize and understand the syntax and construction of C programming code
2.Able to design and develop Computer programs, analyzes, and interprets the concept of pointers,
declarations, initialization, operations on pointers and their usage.
3.Adequate to define data types and use them in simple data processing applications also he/she must
be able to use the concept of array of structures.
4.Student must be able to define union and enumeration user defined data types.
5.Develop confidence for self-education and ability for life-long learning needed for Computer
language.
LIST OF EXPERIMENTS
2. Write a program to take marks of a student of 5 subjects as an input and print the grade. Also
create the same program using switch.
marks<40 = FAIL
marks>=40 and <=59 =GOOD
marks>=59 and <80
=EXCELLENT marks>=80 =
OUTSTANDING
3. Write a program to compute the length of a string using While Loop.
4. Write a program to print the following pattern: -
a) *
**
***
****
*****
b) *
**
***
****
c) 0
12
345
6 789
5. Write a program to compute and display the product of two matrices.
6. Write a program to illustrate the difference between call by value and call by reference.
10. Write a program to create a file, input data and display its content.
COURSE OBJECTIVES
1.Explain & Design computer science terminology related to coding, password protection, social
engineering, and network security
2.Learn & implement fundamentals of cryptography and its application to network security
3.Develop & Understand network security threats, security services, and countermeasures
4.Acquire & Design well known network security protocols such as IPSec, SSL, and WEP
5.Acquire & Develop background on hash functions; authentication; firewalls; intrusion
detection techniques.
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Develop and implement a java interface for encryption and decryption algorithms i.e., AES,
MD5 and RSA algorithm
2.Design and develop a security architecture for an organization.
3.Design operational and strategic cyber security strategies and policies
4.Implement cyber security solutions and use of cyber security, information assurance, and
cyber/computer forensics software/tools
5.Comprehend and execute risk management processes, risk treatment methods, and key risk and
performance indicators
List of Experiments:
1. Study of different wireless network components and features of any one of the Mobile
Security Apps.
2. Study of the features of firewall in providing network security and to set Firewall Security in
windows
3. Study of steps to ensure Security of any one web browser (Mozilla Firefox/Google Chrome)
4. Study of System threat attacks - Denial of Service and Sniffing and Spoofing attacks
5. Study of Techniques used for Web Based Password Capturing.
6. Implementation of S-DES algorithm for data encryption
7. Implementation of Asymmetric Encryption Scheme – RSA.
8. Study of IP based Authentication.
9. To implement the simple substitution technique named Caesar cipher using C language.
SEMESTER-III
INTERNET TECHNOLOGY
Course Code: CC201 Course Credits: 3
Course Category: CC Course (U / P) U
Course Year (U / P): 2U Course Semester (U / P): 3U
No. of Lectures + Tutorials 03 + 00 Mid Sem. Exam Hours: 1
(Hrs/Week):
Total No. of Lectures (L + T): 45 + 00 End Sem. Exam Hours: 3
COURSE OBJECTIVES
1.Present the basic web technology concepts for developing web applications.
2.Helps in computational thinking.
3.Understand of networking fundamentals.
4.Recognize the process of technology planning.
5.Interpret the paradigms of web page coding.
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Have basic knowledge and understanding of core Internet technologies.
2.Apply Internet technology techniques for Web page design.
3.Learn various Browsing systems.
4.Work in JavaScript to create web pages effectively.
5.Process page Coding & Planning
UNIT IV JAVASCRIPT
Introduction, Language elements, objects of JavaScript, other objects like data, math, string, regular
expressions, and arrays.
UNIT V ACTIVE SERVER PAGES
Creating interactive applications using active server pages : client and server side script in C#,
variables and constants, creating modules, creating objects from classes, ASP’s object model, arrays,
collections, control structures, using request and response objects, Integration with database.
Reference Books:
1. Raj Kamal, Internet and Web Technologies, TMH, 2005.
2. Monica D’Souza, Web publishing, TMH, 2001.
3. David Crowder and Rhonda Crowder, Web Design, IDG Books India, 2001.
4. Musciano C., HTML and XHTML the Definitive Guide, 6th edition, OReilly, 2006.
5. Deitel H., Deitel P., Internet and World Wide Web: How to Program, 4 edition, PHI.
OPERATING SYSTEM
COURSE OBJECTIVES
1.Understand how Operating System is Important for Computer System.
2.Make aware of different types of Operating System and their services.
3.Learn different process scheduling algorithms and synchronization techniques to achieve better
performance of a computer system
4.Know virtual memory concepts and secondary memory management
5.Understanding of Security & protection in Operating System
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Understand the different services provided by Operating System at different level
2.Learn real life applications of Operating System in every field.
3.Understands the use of different process scheduling algorithm and synchronization techniques to
avoid deadlock.
4.Learn different memory management techniques like paging, segmentation and demand paging
etc.
5.Perform implementation of protection mechanisms in operating system
Text Books:
[1]. Galvin, Wiley, Operating Systems Concepts, 8th edition, 2009.
21 29TH BOS| MAR 25, 2023
B.Tech CSE Effective from session 2022-23
Specialization- Cyber Security Annexure 29.1.4
[2]. James L Peterson, Operating Systems Concept, John Wiley & Sons Inc, the 6Rev edition, 2007.
Reference Books:
[3]. Deitel H. M., An Introduction to Operating Systems, Addison-Wesley,
1990. [4]. Stallings William, Operating Systems, PHI, New Delhi, 1997.
[5]. S. Tanenbaum Modern Operating Systems, Pearson Education, 3rd edition, 2007.
[6]. Nutt, Operating System, Pearson Education, 2009.
[7]. S. Tanenbaum, Distributed Operating Systems, Prentice Hall, 2nd edition, 2007.
Abstract data types, sequences as value definitions, data types in C, pointers in C, data structures and
C, arrays in C, array as ADT, one dimensional array, Implementing one dimensional array, array as
parameters, two dimensional array, structures in C, implementing structures, Unions in C,
implementation of unions, structure parameters, allocation of storage and scope of variables, recursive
definition and processes: factorial function, fibonacci sequence, recursion in C, efficiency of
recursion, hashing: hash function, open hashing, closed hashing: linear probing, quadratic probing,
double hashing, rehashing, extendible hashing.
Stack definition and examples, primitive operations, example -representing stacks in C, push and pop
operation implementation, queue as ADT, C Implementation of queues, insert operation, priority
queue, array implementation of priority queue, inserting and removing nodes from a list-linked
implementation of stack, queue and priority queue, other list structures, circular lists: stack and queue
as circular list - primitive operations on circular lists, header nodes, doubly linked lists, addition of
long positive integers on circular and doubly linked list.
Binary trees: operations on binary trees, applications of binary trees, binary tree representation, node
representation of binary trees, implicit array representation of binary tree, binary tree traversal in C,
threaded binary tree, representing list as binary tree, finding the Kth element, deleting an element,
trees and their applications: C representation of trees, tree traversals, evaluating an expression tree,
23 29TH BOS| MAR 25, 2023
B.Tech CSE Effective from session 2022-23
Specialization- Cyber Security Annexure 29.1.4
UNIT V GRAPHS
Text Books:
1. Aaron M. Tenenbaum, Yeedidyah Langsam, Moshe J. Augenstein, 'Data structures using C',
Pearson Education, 2004 / PHI.
3. Robert L. Kruse, Bruce P. Leung Clovis L.Tondo, 'Data Structures and Program Design in
C', Pearson Education, 2000 / PHI.
INTRODUCTION TO
PYTHON
Course Code: CC207 Course Credits: 3
Course Category: CC Course (U / P) U
Course Year (U / P): 2U Course Semester (U / P): 3U
No. of Lectures + Tutorials (Hrs/Week): 03 Mid Sem. Exam Hours: 1
Total No. of Lectures (L + T): 45 End Sem. Exam Hours: 3
COURSE OBJECTIVES
1.Master the fundamentals of writing Python scripts.
2.Learn core Python scripting elements such as variables and flow control structures.
3.Discover how to work with lists and sequence data.
4.Write Python functions to facilitate code reuse.
5.Use Python to read and write files.
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Problem solving and programming capability.
2.Explain basic principles of Python programming language
3.Implement database and GUI applications.
4.Implement object oriented concepts
5.Define and demonstrate the use of built-in data structures “lists” and “dictionary”
Creating, inserting and retrieving Table, Updating and deleting the data. Data
Ananlysis-Numpy variable, Numpy manipulation, Scipy, Pandas intro. Descriptive analysis,
Pandas Input-output, Pandas manipulation, Pandas groupby
Text Books:
COURSE OBJECTIVES
1.To understand the theoretical basis behind the standard models of IR (Boolean, Vector-space,
Probabilistic and Logical models)
2. To understand the difficulty of representing and retrieving documents, images, speech, etc.
3.To understand the standard methods for Web indexing and retrieval
4.To understand how techniques from natural language processing, artificial intelligence, human- computer
interaction, and visualization integrate with IR
5.To be familiar with various algorithms and systems
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Learn the theories and techniques behind Web search engines, E-commerce recommendation systems,
etc.
2.Get hands on project experience by developing real-world applications, such as intelligent tools for
improving search accuracy from user feedback, email spam detection, recommendation system, or
scientific literature organization and mining.
3.Learn tools and techniques to do cutting-edge research in the area of information retrieval or text mining.
Information retrieval using the Boolean model, dictionary and postings, dictionary-based approaches
of information retrieval, list, adhoc information retrieval method, indexing, Scoring and term
weighting, random vs sequential search methods, the content-based information retrieval system,
consistency of retrieved information, accuracy, and precision of retrieved information.
Vector space retrieval, relevance feedback and query expansion, XML retrieval probabilistic
information retrieval, language model for information retrieval, text classification and naïve bayes,
web search basics, web crawling and indexes, evaluating information retrieval methods, concept of
Ontology based web agents, search for information in unstructured knowledge domains, intelligent
adaptive information agents, designing of agent for information retrieval, incorporation of AI concepts
for design of intelligent agent.Document and Term Clustering, Document Categorization, IR Systems
and the WWW, PageRank and Hyperlink Analysis,
Search PersonalizationIR Systems and the WWW, Heterogeneous Information Sources, Intelligent
Web Agents, Web Mining, and Its Applications, Intelligent Systems for finding Genes in DNA, using
information content to evaluate semantic similarity in information taxonomy.
Textbook:
1. D. Grossman and O. Frieder,"Information Retrieval: Algorithms and Heuristics", Kluwer
Academic Press.
2. Richard K. Belew, "Finding Out About: A Cognitive Perspective on Search Engine
Technology and the WWW", Cambridge University Press, 2001.
3. C. J. van Rijsbergen , "Information Retrieval".
INTERNET TECHNOLOGY
LAB
Course Code: CC281 Course Credits: 2
Course Category: CC-P Course (U / P) U
Course Year (U / P):U 2U Course Semester (U / P): 3U
No. of Labs 1(3 hrs)
Total No. of Lab(L + T):10 10+ 00 End Sem. Exam Hours: 3
COURSE OBJECTIVES
1.To design interactive web pages using Scripting languages.
2.To learn server side programming using servlets and JSP.
3.To develop web pages using XML/XSLT
4.To develop dynamic web pages using different patforms
5.Learn how to use XAMP Server
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Design simple web pages using markup languages like HTML and XHTML.
2.Create dynamic web pages using DHTML and java script that is easy to navigate and use.
3.Program server side web pages that have to process request from client side web pages.
4.Represent web data using XML and develop web pages using JSP.
5.Understand various web services and how these web services interact.
List of Programs
1. Create a web page with the following using HTML.
0. To embed an image map in a web page.
1. To fix the hot spots.
2. Show all the related information when the hot spots are clicked
2. Create a web page with all types of Cascading style sheets.
3. Client Side Scripts for Validating Web Form Controls using DHTML.
4. Installation of Apache Tomcat web server.
5. Write programs in Java using Servlets:
0. To invoke servlets from HTML forms.
1. Session Tracking.
6. Write programs in Java to create three-tier applications using JSP and Databases
0. For conducting on-line examination.
1. For displaying student mark list. Assume that student information is available in a
database which has been stored in a database server.
7. Programs Using Xml – Schema – Xslt/Xsl.
8. Programs using DOM and SAX parsers.
9. Programs using AJAX.
10. Consider a case where we have two web Services- an airline service and a travel agent and
the travel agent is searching for an airline. Implement this scenario using Web Services and
Data base.
Software Required:
List of Experiments:
1. Run time analysis of Fibonacci Series
2. Study and Application of various data Structure
3. Study and Implementation of Array Based Program
a. Searching (Linear Search, Binary Search)
b. Sorting (Bubble, Insertion, Selection, Quick, Merge etc)
c. Merging
4. Implementation of Link List
a. Creation of Singly link list, Doubly Linked list
b. Concatenation of Link list
c. Insertion and Deletion of node in link list
d. Splitting the link list into two link list
5. Implementation of STACK and QUEUE with the help of
a. Array
b. Link List
6. Implementation of Binary Tree
7. Implementation of Binary Search Tree.
8. Write a program to simulate various traversing Technique
9. Representation and Implementation of Graph
a. breadth First Search
b. Prims Algorithm
c. Kruskal’s Algorithms
10. Implementation of Hash Table
COURSE OBJECTIVES
1.To introduce students to use of Python programming to solve data analytics problems
2.To elaborate students to statistical analysis using Python programming
3.To describe various libraries required for data analytics
4.To elaborate statistical analysis using Python
5.To study special libraries in Python such as Numpy and Scipy
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Improve problem solving and programming capability
2.Learn data analytics through python programming
3.Underline the use of package
4.Write simple Python programs for solving problems.
5.Decompose a Python program into functions, lists etc.
List of Experiments:
SEMESTER-IV
SOFTWARE ENGINEERING
Course Code: CC202 Course Credits: 3
Course Category:CC CC Course (U / P) U
Course Year (U / P):U 2U Course Semester (U / P): 4U
No. of Lectures + 03 + 00 Mid Sem. Exam Hours: 1
Tutorials (Hrs/Week):3
Total No. of Lectures (L + T):45 45 + 00 End Sem. Exam Hours: 3
COURSE OBJECTIVES
1. Help students to develop skills that will enable them to construct high quality software that is
reliable, and that is reasonably easy to understand, modify and maintain.
2. Foster an understanding of why these skills are important
3.Provide an understanding of the working knowledge of the techniques for estimation, design,
testing and quality management of large software development projects
4.Study process models, software requirements, software design, software testing
5.Help to study Software process/product metrics, risk management, quality management and UML
diagrams
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Identify and apply appropriate software architectures and patterns to carry out high level design
of a system and be able to critically compare alternative choices.
2. Expertise and/or awareness of testing problems and will be able to develop a simple testing
report
3.Translate end-user requirements into system and software requirements, using e.g. UML, and
structure the requirements in a Software Requirements Document (SRD).
4. Analyze various software engineering models and apply methods for design and development of
software projects
5 .Proficiently apply standards, CASE tools and techniques for engineering software projects
UNIT I SOFTWAREENGINEERING
Introduction to software engineering: definitions, role of software engineering, planning a software
project, defining the problem, developing a solution strategy, planning the development process,
software engineering process paradigms, principles of software engineering, software engineering
activities, Software Development Life Cycle (SDLC) Models: Water Fall Model, Prototype Model,
Spiral Model, Evolutionary Development Models, Iterative Enhancement Models, Software Quality
Frameworks, ISO 9000 Models, SEI-CMM Model
UNIT II REQUIREMENT ANALYSIS AND DESIGN
Software Requirement Specification (SRS): Introduction, need of SRS, significance, characteristics of
SRS, Structure of SRS, IEEE standards for SRS design, functional and non-functional requirements,
Requirement gathering and analysis, requirement engineering and management, Decision Tables.
Software Quality Assurance (SQA): Verification and Validation, SQA Plans, Software Quality
Frameworks, ISO 9000 Models, SEI-CMM Model.
UNIT III SOFTWARE DESIGN PROCESS
Software Design: Introduction, design process activities: architectural design, Abstract specification,
Interface design, component design, data structure design, algorithm design modular approach, top-
down design, bottom-up design, design methods: data-flow model: data flow diagram, entity-relation-
attribute model: E-R diagram, structural model: structure charts, context diagrams, object models: use
33 29TH BOS| MAR 25, 2023
B.Tech CSE Effective from session 2022-23
Specialization- Cyber Security Annexure 29.1.4
end Metrics: Various Size Oriented Measures: Halestead’s Software Science, Function Point (FP)
Based Measures, Cyclomatic Complexity Measures: Control Flow Graphs.
UNIT IV SOFTWARE TESTING
Testing Objectives, Unit Testing, Integration Testing, 8 Acceptance Testing, Regression Testing,
Testing for Functionality and Testing for Performance, Top-Down and Bottom-Up Testing Strategies:
Test Drivers and Test Stubs, Structural Testing (White Box Testing), Functional Testing (Black Box
Testing), Test Data Suit Preparation, Alpha and Beta Testing of Products.Static Testing Strategies:
Formal Technical Reviews (Peer Reviews), Walk Through, Code Inspection, Compliance with Design
and Coding Standards.
UNIT V SOFTWARE MAINTENANCE
Need for Maintenance, Categories of Maintenance: Preventive, Corrective and Perfective
Maintenance, Cost of Maintenance, Software Re-Engineering, Reverse Engineering. Software
Configuration Management Activities, Change Control Process, Software Version Control, An
Overview of CASE Tools. Estimation of Various Parameters such as Cost, Efforts, Schedule/Duration,
Constructive Cost Models (COCOMO), Resource Allocation Models, Software Risk Analysis and
Management.problem resolution, software maintenance from customers‟ perspective, maintenance
standard: IEEE-1219, ISO-12207, Software Risk Analysis and Management.
Text Books:
1. Pankaj Jalote, An Integrated Approach to Software Engineering, Narosa Publishing
House, New Delhi 1997.
2. Ian Sommerville, Software Engineering, Pearson Education, 2009.
3. Pressman Roger S., Software Engineering: Practitioner's Approach, McGraw-Hill Inc., 2004.
4. Software Engineering: Software Reliability, Testing and Quality Assurance, Nasib S.
Gill, Khanna Book Publishing Co (P) Ltd., New Delhi, 2002.
COURSE OBJECTIVES
1.Describe the fundamental elements of relational database management systems
2.Explain the basic concepts of relational data model, entity-relationship model, relational database
design, relational algebra and SQL.
3.Design ER-models to represent simple database application scenarios
4.Convert the ER-model to relational tables, populate relational database and formulate SQL queries
on data.
5.Improve the database design by normalization.
COURSE OUTCOMES
At the end of the course the students should be able to:
1. Understanding of database concepts and thorough knowledge of database software’s.
UNIT V OVERVIEW OF
TRANSACTION MANAGEMENT
ACID properties, transactions and schedules, concurrent execution of transaction, lock based
concurrency control, performance locking, and transaction support in SQL, crash recovery,
concurrency control, Serializability and recoverability, lock management, lock conversions, dealing
with deadlocks, specialized locking techniques, concurrency without locking, crash recovery:
ARIES, log, other recovery related structures, the write, ahead log protocol, check pointing,
recovering from a system crash, media recovery, other approaches and interaction with concurrency
control.
References Books:
1. Elmasri Navrate, Database Management System, Pearson Education, 2008.
2. Raghurama Krishnan, Johannes Gehrke, Database Management Systems, TMH, 3rd
edition, 2008.
3. C. J. Date, Introduction to Database Systems, Pearson Education, 2009.
th
4. Silberschatz, Korth, Database System Concepts, McGraw hill, 5 edition, 2005.
5. Rob, Coronel & Thomson, Database Systems Design: Implementation and Management,
2009.
JAVA PROGRAMMING
Course Code: CC206 Course Credits: 3
Course Category: CC Course (U / P) U
Course Year (U / P): 2U Course Semester (U / P): 4U
No. of Lectures + Tutorials 03 + 00 Mid Sem. Exam Hours: 1
(Hrs/Week):
Total No. of Lectures (L + T): 45 + 00 End Sem. Exam Hours: 3
COURSE OBJECTIVES
1.Teach principles of object-oriented programming paradigm including abstraction, encapsulation,
inheritance, and polymorphism.
2.Impart fundamentals of object-oriented programming in Java, including defining classes, invoking
methods, using class libraries, etc.
3.Familiarize the concepts of packages and interfaces
4.Facilitate students in handling exceptions.
5.Demonstrate the concept of event handling used in GUI.
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Analyze the necessity for Object Oriented Programming paradigm over structured programming
and become familiar with the fundamental concepts in OOP like encapsulation, Inheritance and
Polymorphism
2.Design and develop java programs, analyze, and interpret object-oriented data and report results
3.Design an object-oriented system, AWT components and multithreaded processes as per needs and
specifications.
4.Participate and succeed in competitive examinations like GATE, Engineering services, recruitment
interviews etc.
5.Plan their career in java-based technologies like HADOOP etc.
ARTIFICIAL INTELLIGENCE
Course Code: CC208 Course Credits: 2
Course Category: CC Course (U / P) U
Course Year (U / P): 2U Course Semester (U / P): 4U
No. of Lectures + Tutorials 03 + 00 Mid Sem. Exam Hours: 1
(Hrs/Week):
Total No. of Lectures (L + T): 45 + 00 End Sem. Exam Hours: 3
COURSE OBJECTIVES
1.Provide a strong foundation of fundamental concepts in Artificial Intelligence
2.Enable the student to apply these techniques in applications which involve perception, reasoning and
learning
3.Provide a basic exposition to the goals and methods of Artificial Intelligence
4.Explain the role of agents and how it is related to environment and the way of evaluating it and how
agents can act by establishing goals.
5.Learn the different machine learning techniques to design AI machine and enveloping applications
for real world problems.
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Understand the various searching techniques, constraint satisfaction problem and example
problems- game playing techniques.
2. Apply these techniques in applications which involve perception, reasoning and learning
3.Acquire the knowledge of real world Knowledge representation
4.Analyze and design a real world problem for implementation and understand the dynamic behavior
of a system.
5.To enable the student to apply these techniques in applications which involve perception, reasoning
and learning
UNIT 1 Introduction
Introduction to AI, Components of AI, Goals of AI, Types of AI, History of AI, Turing Test in AI,
Advantages and Disadvantages of AI, Intelligence, Intelligent System, Role of IS, Comparison of
various IS, Weak AI and Strong AI, Mind Body Problem in AI, Chinese Room Experiment in AI,
Parallel and Distributed AI.
UNIT 2 Agents in AI
Intelligent Agents, Types of AI Agents, Simple Reflex Agent,Model-based reflex agent, Goal-based
agents, Utility-based agent, Learning agent, Structure of an AI Agent, Agent Environment in AI,
Examples of Agents, Knowledge Engineering, Knowledge Based System, Knowledge Engineering
Techniques, Knowledge Engineering Principles, Knowledge Engineering Methodology.
UNIT 3 Searching Techniques and AI problems
Searching in AI, Search Algorithm Terminologies, Properties of Search Algorithms, Breadth-first
search, Depth-first search, Best First Search, Tic-Tac Toe Problem, Water Jug problem, Chess
Problem, Tower of Hanoi problem, Travelling Salesman problem, Monkey and Banana Problem,
Magic Square.
UNIT 4 Knowledge Representation
Knowledge Representation Definition, Declarative Knowledge, Procedural knowledge, Meta
Knowledge, Heuristic Knowledge, Structural Knowledge, Inheritable Knowledge, Inferential
Knowledge, Relational Knowledge, Explicit Knowledge, Tacit Knowledge, Uncertain Knowledge,
Knowledge Storage, Relation between Knowledge and Intelligence, AI knowledge cycle.
UNIT 5 AI Techniques and applications
Introduction to Machine Learning, Introduction to Deep Learning, Introduction to Expert system,
Introduction to Natural Language Processing, AI in future, AI in social Media, AI in Entertainment
and education, AI in drones, AI in Automated Computer support, AI in personalized shopping
Reference Books:
1. Artificial Intelligence, Elaine Reich: Tata Mcgraw Hill publishing house, 2008.
2. Artificial Intelligence, Ela Kumar, IK Publishing.
3. Artificial Intelligence, Peterson, TataMcGraw Hill, 2008.
4. Artificial Intelligence, Russel and Norvig, Pearson Printice Hall Publication, 2006.
5. Artificial Intelligence, Winston, PHI publication, 2006.
6. Artificial Intelligence- A modern approach (3rd Edition) By Stuart Russell & Peter Norvig.
7. Artificial Intelligence: The Basics By Kevin Warwick
COURSE OBJECTIVES
1.Understand the differences between dependent and independent sources.
2.Understand different source coding techniques.
3.Understand information channels like joint probability matrix, binary symmetric channel, etc.
4.Learn error control coding.
5.Learn convolutional codes.
COURSE OUTCOMES
At the end of the course the students should be able to:
1. Explain concept of Dependent & Independent Source, measure of information, Entropy, Rate of
information and Order of a source
2. Represent the information using Shannon Encoding, Shannon Fano, Prefix and Huffman Encoding
Algorithms
3. Model the continuous and discrete communication channels using input, output and joint probabilities
4. Determine a codeword comprising of the check bits computed using Linear Block codes, cyclic codes
& convolutional codes
5. Design the encoding and decoding circuits for Linear Block codes, cyclic codes, convolutional codes,
BCH and Golay codes.
Source Coding: Encoding of the Source Output, Shannon's Encoding Algorithm, Shannon Fano
Encoding Algorithm, Source coding theorem, Prefix Codes, Kraft McMillan Inequality property•
KMI, Huffinan codes
Error Control Coding: Introduction, Examples of Error control coding, methods of Controlling Errors,
Types of Errors, types of Codes, Linear Block Codes: matrix description of Linear Block Codes, Error
detection & Correction capabilities ofLinear Block Codes, Single error correction Hamming code,
Table lookup Decoding using Standard Array.
Binary Cyclic Codes: Algebraic Structure of Cyclic Codes, Encoding using an (n-k) Bit Shift
register, Syndrome Calculation, Error Detection and Correction
Convolution Codes: Convolution Encoder, Time domain approach, Transform domain approach,
Code Tree, Trellis and State Diagram, The Viterbi Algorithm
TextBook:
1. Digital andAnalog Communication Systems, K. Sam Shanmugam, John Wtley India Pvt Ltd,
1996. 2 Digital Communication, Simon Haykin, John Wtley India Pvt Ltd, 2008.
Reference Books:
THEORY OF
AUTOMATA
Course Code: CC212 Course Credits: 4
Course Category: CC Course (U / P) U
Course Year (U / P): 2U Course Semester (U / P): 4U
No. of Lectures + Tutorials 03 + 15 Mid Sem. Exam Hours: 1
(Hrs/Week):
Total No. of Lectures (L + T): 45 + 15 End Sem. Exam Hours: 3
COURSE OBJECTIVES
1.Determine the various categories of automata (deterministic and nondeterministic finite state
automata, and variants of Turing machines)
2.Understand the various categories of languages and grammars in the Chomsky hierarchy
3.Define the notions of computability and decidability
4.Recognize to which class in the Chomsky hierarchy the language described (by a grammar or
machine)
5. Discover the problems reducible to/from well-known decidable/undecidable problems
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Model, compare and analyze different computational models using combinatorial methods.
2.Apply rigorously formal mathematical methods to prove properties of languages, grammars and
automata.
3.Construct algorithms for different problems and argue formally about correctness on different
restricted machine models of computation.
4.Identify limitations of some computational models and possible methods of proving them.
5.Have an overview of how the theoretical study in this course is applicable to and engineering
application like designing the compilers.
UNIT I
Introduction: Alphabets, Strings and Languages, Automata and Grammars, Deterministic finite
Automata (DFA)-Formal Definition, Simplified notation: State transition graph, Transition table,
Language of DFA, Nondeterministic finite Automata (NFA), NFA with epsilon transition, Language
of NFA, Equivalence of NFA and DFA, Minimization of Finite Automata, Quotient Construction,
Myhill- Nerode Theorem.
UNIT II
Regular expression (RE), Definition, Operators of regular expression and their precedence, Algebraic
laws for Regular expressions, Kleen’s Theorem, Regular expression to FA, DFA to Regular
expression, Arden Theorem, Non Regular Languages, Pumping Lemma for regular Languages .
Application of Pumping Lemma, Closure properties of Regular Languages, Decision properties of
Regular Languages, FA with output: Moore and Mealy machine, Equivalence of Moore and Mealy
Machine, Applications and Limitation of FA.
UNIT III
Context free grammar (CFG) and Context Free Languages (CFL): Definition, Examples, Derivation ,
Derivation trees, Ambiguity in Grammar, Inherent ambiguity, Ambiguous to Unambiguous CFG,
Useless symbols, Simplification of CFGs, Normal forms for CFGs: CNF and GNF, Closure proper
ties of CFLs, Decision Properties of CFLs: Emptiness, Finiteness and Membership, Pumping lemma
for CFLs Cock-Younger-Kasami Algorithm, Application to Parsing.
UNIT IV
Push Down Automata (PDA): Description and definition, Instantaneous Description, Language of
PDA, Acceptance by Final state, Acceptance by empty stack, Deterministic PDA, Equivalence of
PDA and CFG, CFG to PDA and PDA to CFG, Two stack PDA
UNIT V
Turing machines (TM): Basic model, definition and representation, Instantaneous Description, Language acceptance
by TM, Variants of Turing Machine, TM as Computer of Integer functions, Universal TM, Church’s Thesis,
Recursive and recursively enumerable languages, Halting vs Looping, Introduction to Undecidability, Undecidable
problems about TMs. Post correspondence problem (PCP), Modified PCP, Introduction to recursive function theory .
Text Books
Reference Books
2.Understand various advanced queries execution such as relational constraints, joins, set
operations, aggregate functions, trigger, views and embedded SQL.
3.Design a commercial relational database system (Oracle, MySQL) by writing SQL using the
system
4.Use the basics of SQL and construct queries using SQL in database creation and interaction.
5.Analyze and Select storage and recovery techniques of database system.
List of Experiments:
1. Introduction to MySQL, an exercise of data types in MySQL & Data Definition Language Commands
2. Exercise on Data Manipulation Language and Transaction Control Commands
9. Procedures
JAVA
PROGRAMMING LAB
Course Code: CC284 Course Credits: 2
Course Category: CC-P Course (U / P) U
Course Year (U / P): 2U Course Semester (U / P): 4U
No. of Labs (Hrs/Week): 02(3 hrs)
Total No. of Labs: 10 End Sem. Exam Hours: 3
COURSE OBJECTIVES
1. Prepare students to excel in Object Oriented programming and to succeed as a Java
Developer through global rigorous education
2. Students learn an object-oriented way of solving problems using java.
3. Make the students write programs using multithreading concepts and handle exceptions.
4.Demonstrate the students to write programs that connect to a database and be able to perform
various operations.
5.Make the students to create the Graphical User Interface using Applets, AWT Components &
Swing Components.
COURSE OUTCOMES
At the end of the course the students should be able to:
1.To Understand OOP concepts and basics of Java programming.
2.Design and develop java programs, analyze, and interpret object-oriented data and report results.
Arithmetic operator, Relational operator, Logical operator, Assignment operator, Increment &
Decrement operator, Conditional operator, Bitwise operator, ?: operator
4. Write a separate Java Code to implement each of the following control statements: Decision
statement, Loops statement and Branch statements
5. Write a separate Java Code to implement each of the following sorting: Bubble Sort,
Selection Sort, Insertion Sort, Merge Sort
Final variable, final class, final method, abstract class, abstract method and concrete method
8. Write a separate Java Code to implement each of the following OOPs concepts: Abstraction,
Polymorphism, Encapsulation, Inheritance
9. Write a separate Java Code to implement each of the following: Exception handling with Try,
Catch, Throw, Throws, Finally Multiple catch statement with the following exceptions :
ArithmeticException, ArrayOutOfBoundsException and ArrayStoreException
a) Interface
COURSE OBJECTIVES
1.To study Fourier perspective; and extensions to wavelets,complexity, compression, and efficient
coding of audio-visual information
2. To study Fourier perspective; and extensions to wavelets,complexity, compression, and efficient
coding of audio-visual information
3. To implement to calculate the capacity of a communication channel, with and without noise; coding
schemes, including error correcting and codes
4. To understand how discrete channels and measures of information generalise to their continuous
forms
5. To study Fourier perspective; and extensions to wavelets,complexity, compression, and efficient
coding of audio-visual information
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Understands the fundamentals of coding theory
2.Understands concept of source coding
3. Understands channel coding theorem.
4. Students will demonstrate the error control coding
5. Students will demonstrate various codes
List of Experiments:
1. To revise and write programs for understanding variable scope, swapping integers by
reference and checking the number even or odd using ternary operators in C/C++.
2. To revise and write a program for sorting integers numbers, and factorial using recursion,
function overloading and inline function.
3. Develop a program to implement The algorithm of Encoding of messages.
4. Develop a program to Compute the Entropy in case of Discrete Algorithm.
5. Develop a program to Compute Entropy of 4 Parts of Message
6. To write a program to Find the Entropy of certain message.in C++
7. Develop and Implement Program to Compute the Capacity of Noiseless Binary Channel.
8. Can computing Binary Entropy Function (Channel Capacity) as follow:
C = 1 – H(p)
Write Program for BSC when px=0.1 find the Hp= 0.468 ~ 0.47 and Capacity=
0.53~0.531.
9. Can Computing BSC (Channel Capacity) in Private Case Study As Follow:
I(X;Y) = H(Y) – H(Y|X)
Write Program For BSC of Private Case Study To Compute Capacity.
10. Use an example to illustrate Shannon Fano algorithm.
SEMESTER-V
COMPILER DESIGN
Course Code: CC301 Course Credits: 4
Course Category: CC Course (U / P) U
Course Year (U / P): 3U Course Semester (U / P): 5U
No. of Lectures + Tutorials 03 + 01 Mid Sem. Exam Hours: 1
(Hrs/Week):
Total No. of Lectures (L + T): 45 + 15 End Sem. Exam Hours: 3
COURSE OBJECTIVES
1.Understand the basic principles of compiler design, its various constituent parts, algorithms and
data structures required to be used in the compiler.
2.Find Out the relations between computer architecture and how its understanding is useful in
design of a compiler.
3. Construct efficient algorithms for compilers.
4.Provide an understanding of the fundamental principles in compiler design.
5.Learn the process of translating a modern high-level-language to executable code required for
compiler construction.
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Acquire knowledge of different phases and passes of the compiler and also able to use the
compiler tools like LEX, YACC, etc. Students will also be able to design different types of
compiler tools to meet the requirements of the realistic constraints of compilers.
2.Understand the parser and its types i.e. Top-Down and Bottom-up parsers and construction of
LL, SLR, CLR, and LALR parsing table.
3.Implement the compiler using syntax-directed translation method and get knowledge about the
synthesized and inherited attributes.
4.Acquire knowledge about run time data structure like symbol table organization and different
techniques used in that.
5.Analyse the target machine’s run time environment, its instruction set for code generation and
techniques used for code optimization.
translation, translation with a top down parser, more about translation: array references in arithmetic
expressions, procedures call, declarations and case statements.
UNIT IV SYMBOL TABLES
Data structure for symbols tables, representing scope information, run-time administration:
implementation of simple stack allocation scheme, storage allocation in block structured language,
Error detection & recovery: lexical phase errors, syntactic phase errors, semantic errors.
UNIT V CODE GENERATION
Design issues, the target language. addresses in the target code, basic blocks and flow graphs,
optimization of basic blocks, code generator. code optimization: machine-independent optimizations,
loop optimization, DAG representation of basic blocks, value numbers and algebraic laws, global
data-flow analysis
Text Books:
1. Aho, Sethi & Ullman, "Compilers: Principles, Techniques and Tools”, Pearson Education
SOFT COMPUTING
TECHNIQUES
Course Code: CC203 Course Credits: 3
Course Category: CC Course (U / P) U
Course Year (U / P): 4U Course Semester (U / P): 5U
No. of Lectures + Tutorials 03 + 00 Mid Sem. Exam Hours: 1
(Hrs/Week):
Total No. of Lectures (L + T): 45 + 00 End Sem. Exam Hours: 3
COURSE OBJECTIVES
1.Primary objective of this course is to provide an introduction to the basic principles, techniques,
and applications of soft computing.
2. Understanding of the basic areas of Soft Computing including Artificial Neural Networks, Fuzzy
Logic and Genetic Algorithms.
3.Provide the mathematical background for carrying out the optimization associated with neural
network learning.
4.Aim of this course is to develop some familiarity with current research problems and research
methods in Soft Computing by working on a research or design project.
5. Genetic algorithms, its applications and advances.
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Apply basics of Fuzzy logic and neural networks..
2.Discuss the ideas of fuzzy sets, fuzzy logic and use of heuristics based on human
3. Describe with genetic algorithms and other random search procedures useful while seeking
global optimum in self-learning situations
4. Develop some familiarity with current research problems and research methods in Soft
Computing Techniques
5. experience Relate with neural networks that can learn from available examples and generalize
to form appropriate rules for inference systems
UNIT I INTRODUCTION
Introduction to Soft Computing; Definition, requirement, necessity and adequacy; various dialects of
soft computing – Evolutionary Algorithms, Fuzzy Sets and Fuzzy Logic, Artificial Neural Networks -
their suitability in Searching, optimization, decision matching and pattern related problems; potential
areas of applications.
UNIT II FUZZY SETS AND FUZZY LOGIC
Introduction to fuzzy sets and fuzzy logic; difference between classical and fuzzy sets; chance vs
fuzziness; limitations of fuzzy systems; typical shapes of membership functions and their usage;
operations on fuzzy sets: compliment, intersection, union; combinations on operations, aggregation
operation.
UNIT III FUZZY RELATIONS AND FUZZY SYSTEMS
Cartesian Product; Classical Relations and Fuzzy Relations; Cardinality, operations and properties of
crisp and fuzzy relations; Composition of operations, Fuzzy cartesian product; The linguistic
variables, Reasoning in fuzzy logic, Fuzzification and defuzzification; Mamdani and Sugano Fuzzy
Inference Systems.
UNIT IV NEURAL NETWORK
Overview of biological neurons; McCulloch-Pitts model, Rosenblatt’s Perceptron model, difference,
capabilities and limitations; Model of generic computational neuron; Basic activation functions;
Basic Learning laws of neurons; Single layer and multilayer architectures; Feedforward and feedback
networks.
Learning paradigms, supervised and unsupervised learning, reinforced learning; back propagation
algorithm; Radial basis neurons, Generalized Regression Neural network, Probabilistic Neural
Networks; Competitive learning; Self Organizing Features Map, Hopfield networks, associative
memories, applications of artificial neural networks. Elasticity vs plasticity dilemma, preprocessing,
post processing, early stopping.
Problems suitable and not suitable for applying evolutionary algorithms; Various dialects of
evolutionary Algorithms; Terminology of Genetic Algorithms; Canonical Genetic Algorithm;
Common representations and related reproduction operators; premature convergence, schema
theorem, minimal deceptive problem and Royal Road function; fitness function, Roulette wheel
selection, Rank selection, Tournament Selection; termination criteria, survivor selection, population
models; parallel implementations.
Text Books:
1. Artificial Neural Networks: An introduction to ANN Theory and Practice, Peteus J.
Braspenning,
COURSE OBJECTIVES
1.Analyze the asymptotic performance of algorithms.
2.Write rigorous correctness proofs for algorithms.
3.Demonstrate a familiarity with major algorithms and data structures.
4.Apply important algorithmic design paradigms and methods of analysis.
5.Synthesize efficient algorithms in common engineering design situations.
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Argue the correctness of algorithms using inductive proofs and invariant
2.Explain the major graph algorithms and their analyses. Employ graphs to model engineering
problems, when appropriate. Synthesize new graph algorithms and algorithms that employ graph
computations as key components, and analyze them.
3.Describe the divide-and-conquer paradigm and explain when an algorithmic design situation
calls for it. Recite algorithms that employ this paradigm. Synthesize divide-and-conquer
algorithms. Derive and solve recurrences describing the performance of divide-and-conquer
algorithms.
4.Define the dynamic-programming paradigm and explain when an algorithmic design situation
calls for it. Recite algorithms that employ this paradigm. Synthesize dynamic-programming
algorithms, and analyze them.
5.Analyze worst-case running times of algorithms using asymptotic analysis.
References Books:
2. T.H. Cormen, C.E. Leiserson, R. L. Rivest and C. Stein, "Introduction to Algorithm",
PHI Pvt. Ltd., 2001
4. A. V. Aho, J.E. Hopcroft and J.D. Ullman, "the Design and Analysis of Computer
Algorithms", Pearson Education Asia, 2003.
COURSE OBJECTIVES
1.To understand the mathematics behind Cryptography.
2.To understand the security concerns and vulnerabilities
3. To familiarize with different types of cryptosystems
4. To create an awareness for the design of various cryptographic primitives
5.To analyze different types of attacks on various cryptosystems.
COURSE OUTCOMES
At the end of the course the students should be able to:
1.To learn the importance of number theory in designing crypto systems;
2.To design public and private key cryptosystems;
3.To do cryptanalysis of various cryptosystems.
4. To implement cryptographic algorithms
5. To structure Privacy issues and able to resolve them.
UNIT I
UNIT V
Text Books:
2. Douglas R. Stinson, “Cryptography: Theory and Practice”, Third Edition, CRC Press.
Reference Books:
1. Atul Kahate, “Cryptography and Network Security”, 2nd Edition, Tata
Code in C”, Second Edition, John Wiley and Sons Inc, 2001.
5. Wenbo Mao, “ Modern Cryptography- Theory & Practice”, Pearson Education, 2006.
MACHINE LEARNING
Course Code: CC309 Course Credits: 3
Course Category: CC Course (U / P) U
Course Year (U / P): 4U Course Semester (U / P): 5U
No. of Lectures + Tutorials 03 + 00 Mid Sem. Exam Hours: 1
(Hrs/Week):
Total No. of Lectures (L + T): 45 + 00 End Sem. Exam Hours: 3
COURSE OBJECTIVES
1. Explain Machine Learning concepts, classifications of Machine Learning and write simple
programs using python.
2.Describe Supervised Learning concepts.
3.Describe unsupervised learning concepts and dimensionality reduction techniques
4.Discuss simple Machine Learning applications in a range of real-world applications using
Python programming
5.To develop skills of using recent machine learning software for solving practical problems.
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Recognize the characteristics of machine learning that make it useful to real-world problems.
2.Characterize machine learning algorithms as supervised, semi-supervised, and unsupervised.
3.Effectively use machine learning toolboxes.
4.Understand the concept behind neural networks for learning non-linear functions.
5.Figure out the algorithms for learning Bayesian networks
Unit 1: Introduction – Well defined learning problems, Designing a Learning System, Issues in
Machine Learning; THE CONCEPT LEARNING TASK - General-to-specific ordering of
hypotheses, Find-S, List then eliminate algorithm, Candidate elimination algorithm, Inductive bias
Unit 2: Decision Tree Learning - Decision tree learning algorithm-Inductive bias- Issues in Decision
tree learning; ARTIFICIAL NEURAL NETWORKS – Perceptrons, Gradient descent and the Delta
rule,
Adaline,Multilayer networks, Derivation of backpropagation rule Backpropagation Algorithm
Convergence, Generalization
Unit 4: Computational Learning Theory: Sample Complexity for Finite Hypothesis spaces, Sample
Complexity for Infinite Hypothesis spaces, The Mistake Bound Model of Learning;
INSTANCE-BASED LEARNING – k-Nearest Neighbour Learning, Locally Weighted
Regression, Radial basis function networks, Case-based learning
Text Books:
1. Tom M. Mitchell, ―Machine Learning, McGraw-Hill Education (India)
Private Limited, 2013.
2. Ethem Alpaydin, ―Introduction to Machine Learning Press 2004.
3. Stephen Marsland, ―Machine Learning: An Algorithmic Perspective, CRC Press,
2009.Bishop, C., Pattern Recognition and Machine Learning. Berlin:
Springer-Verlag.
ELECTIVE 1
COURSE OBJECTIVES
1. Understand when, where, how, and why to apply Intrusion Detection tools and
techniques in order to improve the security posture of an enterprise.
2. Apply knowledge of the fundamentals and history of Intrusion Detection in order to avoid
common pitfalls in the creation and evaluation of new Intrusion Detection Systems
3. Analyze intrusion detection alerts and logs to distinguish attack types from false alarms
COURSE OUTCOMES
At the end of the course the students should be able to:
1. Build and design multi-tenancy SIEM Architecture.
2. Collect data / logs from any data sources (Cloud, Hybrid, On-Prem).
3. Leverage AI & ML (Machines Learning Models) for detection.
4. Build custom detection & analytics rules.
5. Build automation rules and playbooks for custom integration and/or response and remediation.
COURSE CONTENTS:
Unit 1: Introduction and Overview of SIEM: Overview and Key Aspects of SIEM Solutions
Architectural Design & RBAC: SIEM Solutions Models, Architecture Design (Single/Multi-tenancy) & RBAC,
features of SIEM.
Unit 2:
Onboarding and Deployment Process, Data Collection, Normalization, Hunting & Analysis
Splunk- a SIEM software, alert status- types, IDS vs IPS, snort as an IPS, The history of Wi-Fi - the WLAN standard,
Wireless vulnerability, Wireless vulnerabilities,
Unit 3: Detection Rules & Visualization, Threat Intelligence, Threat Intelligence vs. Threat Hunting
Threat Intelligence Lifecycle, Types of Threat Intelligence
Unit 4: Threat Detection: Detecting compromised user credentials, Tracking system changes, Detecting unusual
behavior on privileged accounts, Secure cloud-based applications, Phishing detection, Monitoring loads and uptimes,
Automation & SOAR, Query-based SIEM
Unit 5: Introduction, Risk Management, Communication, InfoSec Governance, InfoSec Policy Management,
Decision making, Security & Usability, Security Culture, Compliance, Changing the Culture, Case Study
Text Books:
2. Information Security Policies, Procedures, and Standards - A Practitioner's Reference by Douglas Landoll. CRC
Press, 2016 ISBN: 1482-24589-2
3. The Corporate Culture Survival Guide by Edgar H. Schein. Jossey-Bass Press, 2009 ISBN: 0470-29371-3.
Reference Books:
COURSE OBJECTIVES
1. Understand when, where, how, and why to apply Intrusion Detection tools and techniques in order to
improve the security posture of an enterprise.
2. Apply knowledge of the fundamentals and history of Intrusion Detection in order to avoid common pitfalls
in the creation and evaluation of new Intrusion Detection Systems
3. Analyze intrusion detection alerts and logs to distinguish attack types from false alarms
COURSE OUTCOMES
At the end of the course the students should be able to:
1. Explain the fundamental concepts of Network Protocol Analysis and demonstrate the skill to capture and
analyze network packets.
2. Use various protocol analyzers and Network Intrusion Detection Systems as security tools to detect
network attacks and troubleshoot network problems.
3. To know the intrusion detection and prevention policies
UNIT-I
History of Intrusion detection, Audit, Concept and definition , Internal and external threats to data, attacks, Need and types
of IDS, Information sources Host based information sources, Network based information sources.
UNIT-II
Intrusion Prevention Systems, Network IDs protocol based IDs ,Hybrid IDs, Analysis schemes, thinking about intrusion.
A model for intrusion analysis , techniques Responses requirement of responses, types of responses mapping responses to
policy Vulnerability analysis, credential analysis non credential analysis
UNIT-III
Introduction to Snort, Snort Installation Scenarios, Installing Snort, Running Snort on Multiple Network Interfaces,Snort
Command Line Options. Step-By-Step Procedure to Compile and Install Snort Location of Snort Files,
Snort Modes Snort Alert Modes
UNIT-IV
Working with Snort Rules, Rule Headers, Rule Options, The Snort Configuration File etc. Plugins, Preprocessors and
Output Modules, Using Snort with MySQL
UNIT-V
Using ACID and Snort Snarf with Snort, Agent development for intrusion detection, Architecture
models of IDs and IPs.
TEXT BOOKS:
1. Rafeeq Rehman : “ Intrusion Detection with SNORT, Apache, MySQL, PHP and ACID,” 1 Edition, Prentice Hall ,
st
2003.
REFERENCES:
1.Christopher Kruegel,Fredrik Valeur, Giovanni Vigna: “Intrusion Detection and Correlation Challenges and Solutions”,
1 Edition, Springer, 2005.
st
2.Carl Endorf, Eugene Schultz and Jim Mellander “ Intrusion Detection & Prevention”, 1 Edition, Tata McGraw-Hill,
st
2004.
3.Stephen Northcutt, Judy Novak : “Network Intrusion Detection”, 3 Edition, New Riders Publishing, 2002.
rd
4.T. Fahringer, R. Prodan, “A Text book on Grid Application Development and Computing Environment”. 6 Edition, th
KhannaPublihsers, 2012.
CRYPTOGRAPHY
63 29TH BOS| MAR 25, 2023
B.Tech CSE Effective from session 2022-23
Specialization- Cyber Security Annexure 29.1.4
COURSE OBJECTIVES
1. Explain the objectives of information security
2. Explain the importance and application of each of confidentiality, integrity, authentication and availability
3. Understand various cries and understand the current legal issues towards information security.
4. Cryptographic algorithms.
5. Understand the basic categories of threats to computers and networks
6. Describe the public-key cryptosystem.
COURSE OUTCOMES
At the end of the course the students should be able to:
1. Students will be able to understand basic cryptographic algorithms, message and web authentication and security
issues.
2. Ability to identify information system requirements for both of them such as client and server.
UNIT –I Attacks on Computers and Computer Security: Introduction, The need for security, Security approaches,
Principles of security, Types of Security attacks, Security services, Security Mechanisms, A model for Network Security
Cryptography: Concepts and Techniques: Introduction, plain text and cipher text, substitution techniques, transposition
techniques, encryption and decryption, symmetric and asymmetric key cryptography, stenography, key range and key size,
possible types of attacks.
UNIT – II Symmetric key Ciphers: Block Cipher principles & Algorithms(DES, AES, Blowfish), Differential and Linear
Crypt analysis, Block cipher modes of operation, Stream ciphers, RC4,Location and placement of encryption function,
Key distribution
Asymmetric key Ciphers: Principles of public key cryp to systems, Algorithms(RSA, Diffie-Hellman, ECC), Key
Distribution.
UNIT – III Message Authentication Algorithms and Hash Functions: Authentication requirements, Functions, Message
authentication codes, Hash Functions, Secure hash algorithm, Whirlpool, HMAC, CMAC, Digital signatures, knapsack
algorithm
Authentication Applications: Kerberos, X.509 Authentication Service, Public – Key Infrastructure, Biometric
Authentication.
UNIT – IV EMail Security: Pretty Good Privacy, S/MIME IP Security: IP security overview, IP Security architecture,
Authentication Header, Encapsulating security payload, Combining security associations, key management.
UNIT – V Web Security: Web security considerations, Secure Socket Layer and Transport Layer Security, Secure
electronic transaction
Intruders, virus and Firewalls: Intruders, Intrusion detection, password management, virus and related threats,
Countermeasures, Firewall design principles, types of firewalls
Case Studies on Cryptography and security: Secure Inter-branch Payment Transactions, Cross site Scripting Vulnerability,
Virtual Elections
TEXT BOOKS:
1. Cryptography and Network Security : William Stallings, Pearson Education,4″‘ Edition
2. Cryptography and Network Security : Atul Kahate, Mc Graw Hill Edition
REFERENCE BOOKS
1. Cryptography and Network Security: C K Shyamala, N Harin i, Dr T R Padmanabhan, Wiley India, 1”
2. Cryptography and Network Security : Forouzan Mukhopadhyay, MC Graw Hill, 2″” Edition
3. Information Security, Principles and Practice: Mark Stamp, Wiley India.
4. Principles of Computer Security: WM.Arthur Conklin, Greg White, TMH
5. Introduction to Network Security: Neal Krawetz, CENGAGE Learning
BIOMETRIC SYSTEM SECURITY
UNIT V MULTIBIOMETRICS
Multi biometrics and multi factor biometrics - two-factor authentication with passwords - tickets and
tokens–executive decision-implementation plan.
TextBooks:
1. Samir Nanavathi, Michel Thieme, and Raj Nanavathi : “Biometrics -Identity verification in a network”,
1st Edition,WileyEastern,2002.
2. JohnChirilloandScottBlaul:“ImplementingBiometricSecurity”,1stEdition,WileyEasternPublication,2005
65 29TH BOS| MAR 25, 2023
B.Tech CSE Effective from session 2022-23
Specialization- Cyber Security Annexure 29.1.4
References:
[1.]JohnBerger:“BiometricsforNetworkSecurity”,1stEdition,Prentice Hall,2022
[2].JamesLPeterson,OperatingSystemsConcept,JohnWiley&SonsInc,the6Revedition,2007.
[3]. Deitel H. M., An Introduction to Operating Systems,PHI,NewAddisonWesley, 1990.
[4]. Stallings William, OperatingSystems,Delhi,1997.
[5]. S. Tanenbaum Modern Operating Systems, Pearson Education,3rd edition, 2007.
[6]. Nutt, Operating System, Pearson Education,2009.
[7].S.Tanenbaum,DistributedOperatingSystems,PrenticeHall,2ndedition,2007.
ETHICAL HACKING
CourseCode: CC319 CourseCredits: 3
CourseCategory:CC E1 Course(U /P) U
CourseYear(U/P):U 3U CourseSemester(U/P): 5U
No.ofLectures+Tutorials(Hrs/Week): 03+00 MidSem. ExamHours: 1
TotalNo. ofLectures(L+T):30 45+00 EndSem.ExamHours: 3
COURSEOBJECTIVES
1.To exploretheconceptsofsecuritytestingandtheknowledgerequiredtoprotectagainstthe
hacker and attackers.
2.Tounderstandreconnaissanceandthe publicly available tools used to gather information on
Potential targets
3.To discover the scanning techniques used to identify network systems open ports.
4.To identify network system vulnerabilities and confirm their exploitability.
5.To explore techniques for identifying web application vulnerabilities andattacks
COURSEOUTCOMES
At the end of the course the students should be able to:
1.Understand the different terms of ethical hacking.
2.Learn real life applications of network and security.
3.Understands the use of different vulnerabilities and loop holes in the network.
4.Learn different security hacking techniques like phishing, bruteforce etc.
5.Perform implementation of protection mechanism in network.
TextBook-
1. loch,“Ethical Hacking and Penetration Testing Guide”, CRCPress,2014.
ReferenceBookBooks:
1.RafayBas:
1. KevinBeaver,“EthicalHackingforDummies”,SixthEdition, Wiley,2018.
2. JonErickson,“Hacking:TheArtofExploitation”,SecondEdition,Rogunix,2007.
COURSE OBJECTIVES
1.Write sorting programs using Divide-and-Conquer techniques.
2. Implement to find the minimum cost spanning tree and shortest path using different Greedy
techniques
3. Construct DFS, BFS programs and topological ordering using Decrease-and-Conquer technique
4. Implement knapsack, travelling salesperson
5.Design different searching & sorting techniques and finding the complexities.
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Demonstrate Quick sort and Merge sort and calculate the time required to sort the elements.
2.Implement the topological ordering of vertices, travelling salesman problem and Knapsack
problem
3.Construct programs to check graph is connected or not using BFS and DFS methods
4.Implement programs on divide and conquer, decrease and conquer
5.Experiment finding the minimum cost of spanning tree using Prim’s algorithms and shortest path
using Dijkstra’ algorithm
PRACTICALS
(Note: Use any programming tools like C/Java/Python to execute.) 1.Sort
a given set of elements :
(a)using the Quick sort method and also analyse it’s runtime complexity for different inputs.
(b)using merge sort method and also analyse it’s runtime complexity for different inputs.
COURSE OBJECTIVES
1.To learn different commands for implementing encryption and decryption.
2.To understand the implementation of Caesar cipher.
3.To understand the encryption and decryption for XOR operation.
4.To understand the working of wireless audit on a router.
5. To demonstrate intrusion detection system.
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Apply encryption and decryption on any input.
2.Generate random numbers within a range.
3.Apply an RSA algorithm with different values of p and q.
4.Apply snort tool.
5. Design New policies related to privacy methods
List of Experiments:
1. To understand and illustrate the different commands used to implement encryption and
decryption.
2. Write an encryption and decryption program for Caesar cipher.
3. Write a program in which encryption and decryption is done in one program without input.
4. Write a program in C++ to generate Pseudo Random numbers in a range.
5. Write a program in C++ for XOR Encryption and Decryption.
6. Write a program in C++ for Vernam Cipher.
7. Write a program in C++ for the RSA algorithm taking p and q randomly.
8. Working with KfSensor Tool for Creating And Monitoring Honeypot.
9. Working with NetStumbler to Perform Wireless Audit On Router.
10. Working with Snort Tool to Demonstrate Intrusion Detection Syste
COURSE OBJECTIVES
1.To understand the basic concepts and techniques of Machine Learning through python programming.
2.To develop skills of using recent machine learning packages for solving practical problems.
3.To gain experience of doing independent study and research
4.To understand the methods using in machine learning
5. To demonstrate real time applications using python
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Familiarize Python
2.Able to generate, analyze and interpret data using Python.
3. Use Python to design and implement classifiers for machine learning applications.
4.Implement an end to end Machine Learning System
5. Design new programs related to machine learning methods
List of Experiments:
SEMESTER-VI
COURSE OBJECTIVES
1. Describe the fundamentals of the web.
2. Introduce the creation of static webpage using HTML
3. Describe the function of JavaScript as a dynamic webpage creating tool
4. Outline the principles behind using MySQL as a backend DBMS with PHP
5.Describe the importance of CSS in web development
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Learn and use DHTML and AJAX. Learn the basics of JQuery.
2. Learn about the major vulnerabilities facing web sites and some simple ways to reduce their
likelihood
3.Use a MySQL database with PHP to create database applications
4.Design HTML pages and use basic JavaScript code to enhance the pages
5.Develop a complete market-ready database-driven website with PHP and JavaScript and go
through the basic phases of the software life cycle
UNIT I INTRODUCTION
Internet Standards, Introduction to WWW, WWW Architecture, client and server, web server, web
application basic pieces, working of a website, Internet Protocols, Overview of HTTP, HTTP request
– response, Generations of dynamic web pages, Frontend and backend web development, web content
management systems: Wordpress, Joomla, web development life cycle, Guidelines for Indian
Government websites.
UNIT II BASICS OF HTML,CSS, JAVASCRIPT
HTML and HTML5: Introduction, TML Tags, Formatting and Fonts, Commenting Code, Anchors,
Backgrounds, Images, Hyperlinks, Lists, Tables, Frames, HTML Forms. Cascading Style Sheet
(CSS): Introduction, Basics of CSS, style types. JavaScript: Introduction, variables, operators,
conditionals, looping and validation. Introduction to Jquery, Ajax and XML.
UNIT III INTRODUCTION TO PHP
PHP structure: basic syntax, variables, operators, multiline commands. Expression and control flow in
PHP, PHP dynamic linking. PHP functions and Objects, PHP arrays, Practical PHP: Date and time
functions, file handling, system calls. Accessing and manipulating databases using PHP, Error
handling in PHP, generating images with PHP. Cookies, sessions and authentication.
UNIT IV INTRODUCTION TO FRAMEWORK
Introduction of MVC pattern models, MVC works, Configuration Codelgniter, setting up Codelgniter
with apache, Environment eg. Enable mod_rewrite, Fetching data, saving and updating data, Deleting
data, user defined function in model, Data Validation, controller function, interacting with views,
controller variables and parameters, Redirection, Getting post data, working with configuration layout,
creating custom layout, Element and helpers, storing data in cake session, Reading a session data,
Delete data from session
UNIT V MYSQL - Databases, Tables, Columns, MySQL Data Type, SELECT, UPDATE and DELETE
Statements,PHP and MySQL: Connecting from PHP to MySQL Database, Executing SQL Queries from PHP.
Text Books:
1. Learning PHP, MySQL & JavaScript with JQUERY, CSS & HTML5: Robin Nixon (O’Reilly)
2. Learning Web Design: A Beginner’s Guide to (X)HTML, Style Sheets and Web Graphics:
Jennifer Niederst Robbins (O’Reilly).
COURSE OBJECTIVES
1.Determine the various levels of a cybersecurity evaluation
2.Recognize the various types of cyber-threats
3.Acquire the skills needed to conduct a hands-on cybersecurity assessment
4.Use the learned techniques to defend IT assets against cyber-threats
5.Understand the network, system, and application risks and how to manage them
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Securing an IT infrastructure, examining and resolving security risks in networks and computer
systems.
2.Creating, testing, and evaluating secure application software.
3. Developing policies and procedures for managing security risks in organizations.
4.Identify network, system, and application vulnerabilities and implement the strongest possible security
countermeasure
5. Understand techniques used by hackers to penetrate computer networks and systems
UNIT I
Network security and its working, what can be done with network security, advantages and
disadvantages of network security, why do we need network security, Future scope for network
security
UNIT II
Data security & why it is important, its considerations, types of data security controls, Cryptography,
cryptography techniques and tools, Network security, working and need of cyber security
UNIT III
Phishing, its need and tools, Basics of cyber security, network topology, Algorithms and
Cryptography, HTTP methods, authentication methods, security technologies
UNIT IV
Security architecture, email security gateways, network monitoring tools, network analysis, types of
Ddos attacks, different protocols for network defense with cyber security
UNIT V Case studies and research articles related to network defense for cyber security.
Text Books:
1. Practical Malware Analysis. The Hands-On Guide to Dissecting Malicious Software by
Michael Sikorski,July 2017
2. The Code Book. The Science of Secrecy from Ancient Egypt to Quantum Cryptography
by simon Singh,August 2016
Reference Books
1. Cyberwar. The Next Threat to National Security & What to Do About It by Richard A.
Clarke, Robert Knake.
2. The Web Application Hacker’s Handbook Finding and Exploiting Security Flaws
by Dafydd Stuttard,August 2018
3. Open Source Intelligence Techniques. Resources for Searching and Analyzing Online
Information by Michael Bazzell.
COURSE OBJECTIVES
1.To identify the IT Audit Process
2.To analyse the risk assessment and IT Governance,
3. To introduce Audit life Cycle
4. To describe IT Audit standards & regulations
5. Identify and analyze controls within the IT security framework
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Explain the role of IT Audit function within an organization
2. Explain the audit process and the tasks within an Audit Area
3. Understand risk methods and procedures in an audit perspective
4.Understand risk management process and control practices in an audit contex
5. students will learn the life cycle of auditing different IT systems including the operation system,
database, computer network etc
UNIT I
Investigates the principles of information systems audit, IT audit tools, audit procedures to help in
detection and prevention of security breaches and fraud. Examines the solutions that can be used to
prevent information loss or costly business interruptions, the role of information technology
governance in business organizations, reporting requirements, and industry standards for IT
Governance.
UNIT II
Risk and its management,Risk management framework,principles, Umbrella methodology for the
management of risk,Types and sources of risk,Risk and the economic environment ,Corporate
governance and organizational structure,External reporting and accounting Section ,The risk
management process,A risk management framework ,Risk measurement tools and techniques
UNIT III
Identifying and assessing interest rate risk,Evaluating interest rate risk ,Managing interest rate
risk,Interest rate risk management Instruments:short term,Interest rate risk management Instruments
:longer term,Other risk issues,Treasury operational risk and controls,External risk reporting
UNIT IV
Risk assessment:risk analysis and evaluation,IT Audit Planning and Managing the IT Audit Function -
Management of IT Auditing - Developing the IT Audit Plan,Auditing IT Governance Controls -
Information Security Governance - Auditing IT Governance - IT Outsourcing
UNIT V Risk responses and risk treatment Introduction to risk treatment and risk response, the 4Ts, risk control
techniques (PCDD), control of selected hazard risks, introduction to monitoring and review, insurance and risk
transfer, business continuity planning (BCP)
Text Books:
1. Fundanentals of Information & Management Auditing,Christopher,wright,IT
Governance Publishing,April 2016
2. Risk Management ,Macmillan foundation
Reference Books:
COURSE OBJECTIVES
1.Overview of digital investigation and digital evidence
2.To identify data Acquisition of physical storage devices
3.To analyse file carving & documententation
4.To examine Time, registry & password recovery
5.To determine Email & database forensics
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Students will explain and properly document the process of digital forensics analysis.
2.Students will gain an understanding of the tradeoffs and differences between various forensic tools.
3.Students will understand the inner workings of file systems.
4.Students will be able to create disk images, recover deleted files and extract hidden information.
5.Students will be introduced to the current research in computer forensics. This will encourage them to
define research problems and develop effective solutions.
Unit I
Foundations of Digital Forensics, Digital Evidence, Increasing Awareness of Digital Evidence, Digital
Forensics: Past, Present, and Future, Principles of Digital Forensics, Challenging Aspects of Digital
Evidence, Following the Cyber trail. Language of Computer Crime Investigation, The Role of
Computers in Crime.
Unit II
Conducting Digital Investigations-Digital Investigation Process Models, scaffolding for Digital
Investigations, Applying the Scientific Method in Digital Investigations, Investigative Scenario:
Security Breach. Handling a Digital Crime Scene- Published Guidelines for Handling Digital Crime
Scenes, Fundamental Principles, Authorization
Unit III
Investigative Reconstruction with Digital Evidence- Equivocal Forensic Analysis, Victimology,Crime
Scene Characteristics, Threshold Assessments. Axes to Pathological Criminals and Other Unintended
Consequences, Modus Operandi, Technology and Modus Operandi, Motive and Technology, Current
Technologies.
Unit IV
Digital Evidence as Alibi- Investigating an Alibi, Time as Alibi, Location as Alibi. ApplyingForensic
Science to Computers- Preparation, Survey, Documentation, Preservation, Examination and Analysis,
Reconstruction, Reporting.
Unit V Applying Forensic Science to Networks- reparation and Authorization, Identification,Documentation,
Collection, and Preservation, Filtering and Data Reduction, Class/Individual Characteristics and Evaluation of
Source, Evidence Recovery, Investigative Reconstruction, Reporting Results.
Text Books:
1. Digital evidence and computer crime: forensic science, computers and the Internet. Academic
Press.Casey, E. (2011).
2. Computer forensics: computer crime scene investigation. Jones and Bartlett Publishers. Vacca,
J. R. (2010).
Reference Books:
2. Nelson, B., Phillips, A., & Steuart, C. (2014). Guide to computer forensics and
investigations. Cengage Learning.
3. Solomon, M. G., Rudolph, K., Tittel, E., Broom, N., & Barrett, D. (2011) Computer
forensics jumpstart. John Wiley & Sons
COURSE OBJECTIVES
1.To understand the fundamentals of security, and how it relates to information systems.
2To identify risks and vulnerabilities in operating systems from a database perspective.
3.To learn good password policies, and techniques to secure passwords in an organization
4. To learn and implement administration policies for users.
5.To understand the various database security models and their advantages or disadvantages.
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Identify between authorized & unauthorized data observation.
2.Examine unauthorized data modification.
3.Ensure the data confidentiality.
4.Identify security threats in database systems.
5.Design and Implement secure database systems.
UNIT I
Introduction:Introduction to Databases Security Problems in Databases Security Controls
Conclusions,Security Models -l:Introduction Access Matrix Model Take-Grant Model Acten Model
PN Model Hartson and Hsiao’s Model Fernandez’s Model Bussolati and Martella‘s Model for
Distributed databases
UNIT II
Security Models -2:Bell and LaPadula’s Model Biba’s Model Dion’s Model Sea View Model
Jajodia and Sandhu‘s Model The Lattice Model for the Flow Control conclusion
UNIT III
Security Mechanisms:Introduction User ldcntification fit authentication Memory Protection Resource
Protection Control Flow Mechanisms Isolation Security Functionalities in some Operating Systems
Trusted Computer System Evaluation Criteria
UNIT IV
Security Software Design:Introduction A Methodological Approach to Security Software Design
Secure Operating System Design Secure DBMS Design Security Packages Database Security Design
UNIT V
Statistical Database Protection & Intrusion Detection Systems: lntroduction, Statistics Concepts and
Definitions Types of Attacks Inference Controls evaluation Criteria for Control Comparison.
Introduction IDES System RETISS System ASES System Discovery
Text Books:
1. Database Security and Auditing, Hassan A. Afyouni, India Edition, CENGAGE Learning, 2009.
2. Database Security, Castano, Second edition, Pearson Education.
Reference Books:
1. Database security by alfred basta, melissa zgola, CENGAGE learning.
2. Data and Applications Security and Privacy by Pierangela Samarati,22 June 2015
3. Protecting Privacy in Data Release: 57 (Advances in Information Security)by Giovanni
Livraga 9 October 2016
ELECTIVE 2
MOBILE SECURITY
CourseCode: CC312 CourseCredits: 3
CourseCategory:CC CC Course(U /P) U
CourseYear(U/P):U 3U CourseSemester(U/P): 6U
No.ofLectures+Tutorials(Hrs/Week): 03+00 MidSem. ExamHours: 1
TotalNo. ofLectures(L+T):30 45+00 EndSem.ExamHours: 3
COURSEOBJECTIVES
1. To explore the concepts of security testing and the knowledge required to protect against the hacker
and attackers.
2. To understand reconnaissance and the publicly available tools used to gather information on
potential targets
3. To discover the scanning techniques used to identify network systems open ports.
4. To identify network system vulnerabilities and confirm their exploitability
5. To explore techniques for identifying web application vulnerabilities and attacks
COURSE OUTCOMES
1.To explore the concepts of security testing and the knowledge required to protect against the hacker
and attackers.
2.To understand and reconnaissance and the publicly available tools used to gather information on
potential targets
3.To discover the scanning techniques used to identify network systems open ports.
4.To identify network system vulnerabilities and confirm their exploitability
5.To explore techniques for identifying web application vulnerabilities and attacks
UNIT I
Introduction to Mobile Security – Important Terminologies, Mobile Application Threat Model, Android
SecurityMechanism, Security Issues in Wireless and Mobile Communications, Security Requirements in
Wireless andMobile Communications, Security for Mobile Applications, Advantages and Disadvantages
of Application – levelSecurity.
UNIT II
Security of Device, Network, and Server Levels: Mobile Devices Security Requirements,
MobileWirelessnetworklevelSecurity,ServerLevelSecurity.ApplicationLevelSecurityinWirelessNetworks:
Application of WLANs, Wireless Threats, Some Vulnerabilities and Attack Methods overWLANs,
Security for 1G Wi-Fi Applications, Security for 2G Wi-Fi Applications, Recent
SecuritySchemesforWi-FiApplications
UNIT III
Application Level Security in Cellular Networks: Generations of Cellular Networks, Security Issuesand
Attacks in cellular networks, GSM Security for applications, GPRS Security for applications,UMTS
security for applications, Security of UMTS Networks, 3G security for applications, Some
ofSecurityandauthenticationSolutions.
UNIT IV
Application Level Security in MANETs: MANETs, Some applications of MANETs, MANET Features,
SecurityChallengesinMANETs,SecurityAttacksonMANETs,ExternalThreatsforMANETapplications,Intern
althreatsforMANET Applications, Some of the Security Solutions. Ubiquitous Computing, Need for
NovelSecurity Schemes for UC, Security Challenges for UC,and Security Attacks on UC networks, Some
of the security solutions for UC.
UNIT V
Data Center Operations - Security challenge, implement “Five Principal Characteristics of Cloud
Computing, Datacenter Security Recommendations Encryption for Confidentiality and Integrity,
83 29TH BOS| MAR 25, 2023
B.Tech CSE Effective from session 2022-23
Specialization- Cyber Security Annexure 29.1.4
Encrypting data at rest, Key Management Life cycle,Emerging Trends in Mobile Security,Cloud Encryption
Standards.
TextBooks:
1. PallapaVenkataram,SatishBabu:“WirelessandMobileNetworkSecurity”,1stEdition,TataMcGrawHill,2010
.
2. FrankAdelstein,K.S.Gupta:“FundamentalsofMobileandPervasiveComputing”,1stEdition,TataMcGrawHi
ll2005.
Unit 1 Overview of Computing Paradigm - Recent trends in Computing, Grid Computing, Cluster Computing,
Distributed Computing, Utility Computing, Cloud Computing. Evolution of cloud computing, Business driver for adopting
cloud computing
Unit 2 Introduction to Cloud Computing- Cloud Computing (NIST Model), Introduction to Cloud Computing, History of
Cloud Computing, Cloud service providers, Properties, Characteristics & Disadvantages, Pros and Cons of Cloud Computing,
Benefits of Cloud Computing, Cloud computing vs. Cluster computing vs. Grid computing, Role of Open Standards
Unit 3 Cloud Computing Architecture- Cloud computing stack, Comparison with traditional computing architecture
(client/server), Services provided at various levels, How Cloud Computing Works, Role of Networks in Cloud computing,
protocols used, Role of Web services Service Models (XaaS)- Infrastructure as a Service(IaaS), Platform as a
Service(PaaS), software as a Service(SaaS), Deployment Models- Public cloud, Private cloud, Hybrid cloud,
Community cloud
Unit 4 Infrastructure as a Service(IaaS) - Introduction to IaaS: IaaS definition, Introduction to virtualization, Different
approaches to virtualization, Hypervisors, Machine Image, Virtual Machine(VM), Resource Virtualization: Server, , storage,
Network-Virtual Machine(resource) provisioning and manageability, storage as a service, Data storage in cloud computing(storage
as a service) -Examples Amazon EC2- Renting, EC2 Compute Unit, Platform and Storage, pricing, customers Eucalyptus
Platform as a Service(PaaS) - Introduction to PaaS, What is PaaS, Service Oriented Architecture (SOA), Cloud Platform
and Management- Computation, Storage, Examples- Google App Engine, Microsoft Azure, SalesForce.com’s
Force.com platform
Software as a Service(PaaS) - Introduction to SaaS: Web services, Web 2.0, Web OS, Case Study on SaaS
Unit 5 Service Management in Cloud Computing- Service Level Agreements(SLAs), Billing & Accounting,
Comparing Scaling Hardware: Traditional vs. Cloud, Economics of scaling: Benefitting enormously, Managing Data-
Looking at Data, Scalability & Cloud Services, Database & Data Stores in Cloud, Large Scale Data Processing
Cloud Security - Infrastructure Security, Network level security, Host level security, Application level security, Data
security and Storage, Data privacy and security Issues, Jurisdictional issues raised by Data location, Identity & Access
Management, Access Control, Trust, Reputation, Risk, Authentication in cloud computing, Client access in cloud,
Cloud contracting Model, Commercial and business considerations
Case Study on Open Source & Commercial Clouds -Eucalyptus, Microsoft Azure, Amazon EC2
Reference Books
● Cloud Computing: Principles and Paradigms, Editors: Rajkumar Buyya, James Broberg, Andrzej M.
Goscinski, Wile, 2011
● Cloud Computing: Principles, Systems and Applications, Editors: Nikos Antonopoulos, Lee Gillam, Springer,
2012
● Cloud Security: A Comprehensive Guide to Secure Cloud Computing, Ronald L. Krutz, Russell Dean Vines,
Wiley-India, 2010
Unit 1 Introduction
the key concepts in secure programming including typical problems and procedures. Differentiate between robust programming
and secure programming and generalize from philosophies of "what to watch out for" and "where to look" to specific situations.
Introduction, The Philosophy of Secure Programming, Defining Secure Programming, Robust vs. Secure Programming, Security
Policies and Procedures, Secure Programming General Philosophy, Checking Design and Implementation, Where to Look for
Vulnerabilities.
Methods for Robustness Overview, Methods Overview: Formal, Informal, and Ad Hoc Methods, Overview of Formal Methods,
Login Program Example, Incorporating Hierarchical Decomposition Methodology, Login Program: Authenticating a User, Login
Program: Preconditions and Postconditions.
Text books
1. Engineering Safe and Secure Software Systems (Artech House Information Security and Privacy), by C. Warren Axelrod
(Buy here) ...
2. The Software Vulnerability Guide (Programming Series) by Herbert H. Thompson and Scott G. ...
3. Secure Coding: Principles and Practices by Mark G. Graff and Kenneth R.
INFORMATION WARFARE
CourseCode: CC318 CourseCredits: 3
CourseCategory:CC E2 Course(U/P) U
CourseYear(U/P):U 3U CourseSemester(U/P): 6U
No.ofLectures+Tutorials(Hrs/Week): 03+00 MidSem.ExamHours: 1
TotalNo.of Lectures(L+T):30 45+00 EndSem.ExamHours: 3
COURSE OBJECTIVES
1. Explain the theory of data, information and knowledge as they pertain to information warfare.
2. Apply strategies of using information as a weapon and a target.
3. Apply the principles of offensive and defensive information warfare for a given context.
4. Demonstrate appropriate techniques to gather intelligence from a variety of sources to support a position /
objective.
5. Discuss the social, legal and ethical implications of information warfare.
COURSE OUTCOMES
At the end of thecourse the students should beable to:
1. Evaluate contemporary information warfare concepts for their application in a corporate environment.
2. Understand and describe how tapping into the emotional component of an idea can spark a revolt.
3. Outline the different types of means and methods used in digital influence & manipulation operations.
4. Examine and propose how influence operations focus on manipulating the psychology of targets through
strategic communication.
5. Analyze different case studies on past adversarial IO campaigns to determine how informational power is
created and leveraged.
Text Books:
1. Inside Cyber Warfare: Mapping the Cyber Underworld by Jeffrey Carr, 2nd edition, O,Reilly
2. Cyberdeterrence and Cyberwar by Martin C. Libicki.
ReferenceBooks:
1. Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives by Sumit Belapure and Nina
Godbole, Wiley India Pvt. Ltd.
2. Information Warfare and Security by Dorothy F. Denning, Addison Wesley.
3. Security in the Digital Age: Social Media Security Threats and Vulnerabilities by Henry A. Oliver, Create Space
Independent Publishing Platform.
4. Data Privacy Principles and Practice by Natraj Venkataramanan and Ashwin Shriram, CRC Press.
5. Information Security Governance, Guidance for Information Security Managers by W. KragBrothy, 1st Edition, Wiley
Publication.
COURSEOBJECTIVES
1. Understand the basic terminologies related to cyber security and current cyber security threat
landscape.
2. Understanding about the Cyber warfare and necessity to strengthen the cyber security of end user
machine, critical IT and national critical infrastructure.
3. Able to appreciate various privacy and security concerns on online Social media.
4. Understand the reporting procedure of inappropriate content, underlying legal aspects and best
practices for the use of Social media platforms.
5.Understanding of security&protectionin Social media.
COURSE OUTCOMES
Attheendofthecoursethestudentsshouldbeableto:
1. Understand the aspects related to personal data privacy and security.
2. Get insight into the Data Protection Bill,2019 and data privacy and security issues related to Social
media platforms.
3. Analyse and evaluate existing legal framework and laws on cyber security.
4. Will be able to use basic tools and technologies to protect their devices.
5. Understand the basic security aspects related to Computer and Mobiles.
ReferenceBooks:
1. Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives by Sumit
Belapure and Nina Godbole, Wiley India Pvt. Ltd.
2. Information Warfare and Security by Dorothy F. Denning, Addison Wesley.
3. Security in the Digital Age: Social Media Security Threats and Vulnerabilities by Henry A. Oliver,
Create Space Independent Publishing Platform.
4. Data Privacy Principles and Practice by Natraj Venkataramanan and Ashwin Shriram, CRC Press.
5. Information Security Governance, Guidance for Information Security Managers by W. KragBrothy,
1st Edition, Wiley Publication.
COURSE OBJECTIVES
1. Understand best technologies for solving web client/server problems using PHP
2. Analyse & design real time web applications
3. Use PHP for dynamic effects and to validate form input entry
4.Analyze & Develop to Use appropriate client-side or Server-side applications
5. To develop and deploy real time web applications in web servers and in the cloud
COURSE OUTCOMES
At the end of the course the students should be able to:
1. Develop a dynamic webpage by the use of java script and DHTML.
2. Write a well formed / valid XML document using PHP
3. Connect a java program to a DBMS and perform insert, update and delete operations on DBMS
table using PHP.
4. Draft a server side application called Servlet to catch form data sent from client, process it and
store it on database using PHP
5. Create a server side application to catch form data sent from client and store it on database using
PHP
List of Experiments:
1. Basic HTML Tags,Table Tags,List Tags,Image Tags, Forms .
2. Implement forms using HTML,FRAMES,CSS.
3. Install the following on local machine
• Apache web server
• Tomcat application server locally,
• Install MySQL
• PHP and configure it to work with Apache web server and MySQL
4. To create an email id for receive and send pictures, documents .
5. To create a simple web file to demonstrate the use of different tags.
6. To create an html web with different types of frames such as floating frame, navigation frame
& mixed frame.
7. Write a PHP program to store current date-time in a COOKIE and display the ‘Last visited
on’ date- time on the web page upon reopening of the same page.
8. Write a PHP program to store page views count in SESSION, to increment the count on each
refresh, and to show the count on web page.
9. Create a XHTML form with Name, Address Line 1, Address Line 2, and E-mail text fields.
On submitting, store the values in MySQL table.Retrieve and display the data based on Name.
10. Using PHP and MySQL, develop a program to accept book information viz. Accession
number, title, authors, edition and publisher from a web page and store the information in a database
and to search for a book with the title specified by the user and to display the search results with
proper headings.
COURSE OBJECTIVES
1.Exhibit knowledge to secure corrupted systems, protect personal data, and secure computer networks in
an Organization.
2. Practice with an expertise in academics to design and implement security solutions
3. Understand key terms and concepts in Cryptography, Governance and Compliance.
4. Develop cyber security strategies and policies
5. Understand principles of web security and to guarantee a secure network by monitoring and analyzing
the nature of attacks through cyber/computer forensics software/tools.
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Measure the performance and troubleshoot cyber security systems.
2. Implement cyber security solutions and use of cyber security, information assurance, and
cyber/computer forensics software/tools
3. Comprehend and execute risk management processes, risk treatment methods, and key risk and
performance indicators
4. Design and develop a security architecture for an organization.
5.Design operational and strategic cyber security strategies and policies.
List of Experiments:
1. Study of different wireless network components and features of any one of the Mobile
Security Apps.
2. To understand different concepts related to commands, software used for implementing
and the background of cyber security.
3. Study of the features of firewalls in providing network security and to set Firewall Security in
windows.
4. Steps to ensure Security of any one web browser (Mozilla Firefox/Google Chrome).
5. Study of different types of vulnerabilities for hacking websites / Web Applications.
6. Analysis of the Security Vulnerabilities of E-commerce services.
7. Analysis the security vulnerabilities of E-Mail Applications
8. To develop some method for securing the confidential information of an organization.
9. To understand the need and applications where network defense is must and to be
implemented as soon as possible.
10. To understand the future scope of network defense.
COURSE OBJECTIVES
1.To provide a good foundation in mathematics, sciences and engineering fundamentals required to solve
engineering problems
2. To provide analytical and problem solving skills to design algorithms, other hardware / software
systems
3.To facilitate graduates to get familiarized with the art software / hardware tools, imbibing creativity
and innovation
4. To inculcate professional ethics, inter-personal skills to work in a multi-cultural team.
5. To facilitate & learn employment skills in industry and / or to pursue postgraduate studies with an
appreciation for lifelong learning
COURSE OUTCOMES
At the end of the course the students should be able to:
1.An ability to apply knowledge of mathematics, science and engineering to develop and analyze
computing systems
2.An ability to apply knowledge of mathematics, science and engineering to develop and analyze
computing systems
3.An ability to perform experiments to analyze and interpret data for different applications.
4. An ability to design, implement and evaluate computer-based systems, processes, components or
programs to meet desired needs within realistic constraints of time and space.
5. An ability to use current techniques, skills and modern engineering tools necessary to practice as an IT
professional.
List of Experiments:
SEMESTER-VI
BLOCKCHAIN TECHNOLOGY
Course Code: CC401 Course Credits: 3
Course Category: CC Course (U / P) U
Course Year (U / P): 4U Course Semester (U / P): 7U
No. of Lectures + Tutorials (Hrs/Week): 03 +00 Mid Sem. Exam Hours: 1
Total No. of Lectures (L + T): 45 + 00 End Sem. Exam Hours: 3
COURSE OBJECTIVES
1. To understand the technology behind blockchain
2. Explain distributed Consensus, and Consensus in Bitcoin
3. Discuss Permissioned Blockchain, and Hyperledger Fabric
4. To comprehend the issues related to blockchain
5. To study the real-world applications of blockchain
COURSE OUTCOMES
At the end of the course the students should be able to:
1. Describe the basic concept of Blockchain, Crypto Primitives, Bitcoin Basics
2. Identify the area in which they can apply permission or permission less blockchain.
3. Apply Block chaining concept in various applications.
4.Design and implement new ways of using blockchain for applications other than cryptocurrency
5. Recognize the underlying technology of transactions, blocks, proof-of-work, and consensus building
UNIT I
Introduction to Blockchain: What is Blockchain, Public Ledgers, Blockchain as Public Ledgers,
Bitcoin, Blockchain 2.0, Smart Contracts, Block in a Blockchain, Transactions, Distributed
Consensus, The Chain and the Longest Chain, Cryptocurrency to Blockchain 2.0, Permissioned
Model of Blockchain
UNIT II
Basic Crypto Primitives: Cryptographic Hash Function, Properties of a hash function, Hash pointer
and Merkle tree, Digital Signature, Public Key Cryptography, A basic cryptocurrency.
Bitcoin Basics: Creation of coins, Payments and double spending, FORTH – the precursor for Bitcoin
scripting, Bitcoin Scripts, Bitcoin P2P Network, Transaction in Bitcoin Network, Block Mining,
Block propagation and block relay.
UNIT III
Distributed Consensus: Why Consensus, Distributed consensus in open environments, Consensus in a
Bitcoin network.
Consensus in Bitcoin: Bitcoin Consensus, Proof of Work (PoW) – basic introduction, Hashcash PoW,
Bitcoin PoW, Attacks on PoW and the monopoly problem, Proof of Stake, Proof of Burn and Proof of
Elapsed Time. The life of a Bitcoin Miner, Mining Difficulty, Mining Pool.
UNIT IV
Permissioned Blockchain: Permissioned model and use cases, Design issues for Permissioned
blockchains, Execute contracts, State machine replication, Consensus models for permissioned
blockchain, Distributed consensus in closed environment, Paxos, RAFT Consensus, Byzantine general
problem.Blockchain Components and Concepts: Actors in a Blockchain, Components in Blockchain
design, Ledger in Blockchain.
UNIT V
Hyperledger Fabric – Transaction Flow: Fabric Architecture, Transaction flow in Fabric.
Hyperledger Fabric Details: Ordering Services, Channels in Fabric, Fabric Peer and Certificate
Authority.
Fabric – Membership and Identity Management: Organization and Consortium Network, Membership
Service Provide, Transaction Signing.
Text Books
1. Nitin Gaur, Luc Desrosiers, Venkatraman Ramakrishna, Petr Novotny, Salman Baset,
Anthony O’Dowd.Hands-On Blockchain with Hyperledger: Building decentralized applications with
Hyperledger Fabric and Composer. Packt Publishing Ltd.
2. Bellaj Badr, Richard Horrocks, Xun (Brian) Wu. Blockchain By Example: A developer's
guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger. Packt
Publishing Ltd, 2018.
Reference Books
1. Vikram Dhillon, David Metcalf, Max Hooper. Blockchain Enabled Applications: Understand
the Blockchain Ecosystem and How to Make it Work for You. Apress.
2. Mayukh Mukhopadhyay Ethereum Smart Contract Development: Build blockchain-based
decentralized applications using solidity. Packt Publishing Ltd.
COURSE OBJECTIVES
1. To Analyze and improving cybersecurity posture
2. To understand AI & CS systems are being trained to identify malware, execute pattern recognition
3. To study better Vulnerability Management
4. To understand the concepts of AI by Adversaries
5. AI enabled cyber security.
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Insight into the main methods used in artificial intelligence (AI) and Cyber security
2.Students are able to gain knowledge AI and CS important for cybersecurity
3.Students will able to use CS/ML Security in today lives.
4.Students will be able to explain CS/ML Used in Security.
5. knowledge of the historical development of the field of Cyber Security enabled AI.
Security issues in systems,secure software design, secure programming, and security testing, covering
security analysis as well as the secure development of software-based systems both on architectural
level and system level
Text Books:
1. Artificial Intelligence for Cybersecurity: Implement smart AI systems for preventing cyber
attacks and detecting threats and network anomalies
Alessandro Parisi , 1st edition (2 August 2019)
2. AI-Enabled Threat Detection and Security Analysis,by Hadis Karimipour (Editor), Farnaz
Derakhshan 3 August 2021
Reference Books:
1. Cyber Security Incident Response Guide. – Alan J White,
2. Cybersecurity – Attack and Defense Strategies: Counter Modern Threats and Employ State-of-the-
Art Tools and Techniques to Protect Your Organization Against Cybercriminals. – Yuri Diogenes,
Erdal Ozkaya,August 2019
3. Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including
Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and
Cyberwarfare. – Latest Edition
ELECTIVE 3
Reference Book:
1. Cyber-Physical Security Protecting Critical Infrastructure at the State and Local Level 2021
2. Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologies 2019
COURSE OBJECTIVES
1 Understanding Security control
2 To learn the fundamentals
3 To understand the different security and privacy assessment procedures
4 To learn 800-53
5 To learn 800-53 controls
COURSE OUTCOMES
At the end of the course the students should be able to:
1 Able to analyze different security controls
2 Able to clarify the fundamentals
3 Able to understand other assessment procedures
4 Able to define 800-53
5 Able to know various controls of 800-53
UNIT II Fundamentals
Assessments within the system development life cycle, control structure and organization, Building an
effective assurance case, and Assessment procedures: assessment objects, methods, and objectives
Access control, Awareness and training, Audit and Accountability, Assessment, authorization and
monitoring, comfiguration management , contingency planning, identification and authentication
Introduction, Risk management framework, How NIST explains 800-53, To Rev5 and Beyond
Control Families, Anatomy of a control, Control Selection, Common, System and Hybrid controls,
Organization defined variables, System Security Plan, Control Assessment, POA&M
Text Book
by Benny Benyamin Nasution (Author), Asad I Khan (Author), Bala S Srinivasan (Author)
Reference Book
1. Force, J. T. (2017). Security and privacy controls for information systems and organizations (No.
NIST Special Publication (SP) 800-53 Rev. 5 (Draft)). National Institute of Standards and
Technology.
2. Tariq, M. I., Tayyaba, S., Ashraf, M. W., Rasheed, H., & Khan, F. (2016). Analysis of NIST SP
800-53 rev. 3 controls effectiveness for cloud computing. computing, 3(4).
Text Book :
1. Guide to Operating systems security - Michel (2004)
2. Operating Systems Security (Synthesis Lectures on Information Security, Privacy, and Trust) -
Trent Jaeger (2008)
Reference Books :
1. Guide to Operating Systems - Michael Walters (2006)
2. Modern operating systems 4e - Tanenbaum
COURSE OBJECTIVES
1. To Understand the security implications inherent in wireless devices, as compared to their wired
counterparts
2. Understand the unique attack vectors faced by wireless networks and required wireless-specific
security strategies to mitigate attacks.
3. Learn fundamentals of wireless exploitation techniques, and gain hands-on experience attacking
wireless networks and devices via laboratory experiments
4. Understand the use of cryptographic primitives in specific wireless applications, including: 802.11,
GSM, RFID, and Bluetooth.
5. Understand techniques to secure wireless devices and networks.
COURSE OUTCOMES
At the end of the course the students should be able to:
1 Familiarize with the issues and technologies involved in designing a wireless and mobile system that
is robust against various attacks.
2. Gain knowledge and understanding of the various ways in which wireless networks can be attacked
and tradeoffs in protecting networks
3. Have a broad knowledge of the state-of-the-art and open problems
4. Learn various security issues involved in cloud computing.
5. Learn various security issues related to GPRS and 3G. Explain the design of a data center and
storage requirements.
UNIT I Introduction
Security Issues in Mobile Communication: Mobile Communication History, Security – Wired Vs Wireless, Security
Issues in Wireless and Mobile Communications, Security Requirements in Wireless and Mobile Communications,
Security for Mobile Applications, Advantages and Disadvantages of Application – level Security.
Text Books:
1. Pallapa Venkataram, Satish Babu: “Wireless and Mobile Network Security”, 1st Edition, Tata McGraw Hill,2010.
2. Frank Adelstein, K.S.Gupta : “Fundamentals of Mobile and Pervasive Computing”, 1st Edition, Tata McGraw Hill
2005.
Reference Book:
1. Randall k. Nichols, Panos C. Lekkas : “Wireless Security Models,Threats and Solutions”, 1st Edition, Tata
McGraw Hill, 2006.
2. Bruce Potter and Bob Fleck : “802.11 Security” , 1st Edition, SPD O’REILLY 2005.
3. James Kempf: “Guide to Wireless Network Security, Springer. Wireless Internet Security – Architecture and
Protocols”, 1st Edition, Cambridge University Press, 2008.
COURSE OBJECTIVES
1. Apply ethical frameworks to analyze problems and evaluate alternative solutions
2.Create and manage technology policies and procedures for an organization with an understanding of
the regulatory environment
3.Interpret and manage IT governance policies and Design appropriate security architecture with
an understanding of the technology
4.Create and deploy enterprise solutions in support of organizational goals
5.Plan and implement projects related to infrastructure, security, software development or data analysis
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Understand ethical frameworks to analyze problems and evaluate alternative solutions
2.Create and manage technology policies and procedures for an organization with an understanding of
the regulatory environment
3.: Interpret and manage IT governance policies.
4. Develop appropriate data management technologies
5. Create and deploy enterprise solutions in support of organizational goals
Physical security domain Physical safeguards, Software development lifecycle Security design reviews Best
practices in software engineering
Network security in context Protecting TCP/IP networks Virtual Private Networks IPSec Overview of Cloud
Securit, Defining the trusted computing base System security assurance concepts Confidentiality and Integrity
models
Text Books:
[1]. Brian Allen, Rachelle Loyear ,Enterprise Security Risk Management: Concepts and Applications
Reference Books:
[2]. Brian Allen, The Manager’s Guide to Enterprise Security Risk Management: Essentials of Risk-Based Security
[3]. Aaron Woody, Enterprise Security: A Data-Centric Approach to Securing the Enterprise
ELECTIVE 4
Malware analysis
CourseCode: CC415 CourseCredits: 3
CourseCategory:CC E4 Course(U/P) U
CourseYear(U/P):U 4U CourseSemester(U/P): 7U
No.ofLectures+Tutorials(Hrs/Week): 03+00 MidSem.ExamHours: 1
TotalNo.of Lectures(L+T):30 45+00 EndSem.ExamHours: 3
COURSEOBJECTIVES
1. To recognize the types of malware through analysis methods.
2. To learn basic and advanced malware analysis techniques.
3.To learn basic malware functionality.
4. To practice the android malware analysis techniques.
5. To practice malware analysis techniques for real world applications.
COURSEOUTCOMES
At the end of the course the students should be able to:
1. .Identify various malwares and understand the behavior of malwares in real world applications
2. Implement different malware analysis techniques
3. .Analyze the malware behavior in windows and android.
4. Understand the purpose of malware analysis.
5. Identify the various tools for malware analysis
UNIT-1 INTRODUCTION
Malware Analysis Introduction What is Malware?, Types of Malware, The goal of Malware analysis,
Malware Analysis Methodology, What is Malware Analysis?, Basic Techniques for Malware Analysis,
General Rules for Malware Analysis, Lab Setup for Malware Analysis
UNIT II Basic Analysis
Basic Analysis Antivirus Scanning, Hashing, Finding Strings, Packed and Obfuscated Malware, Portable
Executables File Format, Linked Library and Functions, Static Analysis in Practice, The PE File Headers
and Section
UNIT III Malware Analysis in Virtual Machine
The Structure of Virtual Machine, Creating Malware Analysis Machine, Using Malware Analysis
Machine, Risk of Virtual Machine for Malware Analysis.
UNIT IV Basic Dynamic Analysis
Malware Sandboxes, Monitoring with Process Manager, Viewing Process with Process Explorer,
Comparing Registry Snapshot, Faking a Network, Packet Sniffing with Wireshark, Using INetSim
UNIT V Malware Functionality
Malware Behaviour: Downloaders and Launchers, Backdoors, Credential Stealers, Persistence Mechanism,
Privilege Escalation
Testbook:
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software 1st Edition
Reference Books:
• Practical malware analysis The Hands-On Guide to Dissecting Malicious Software by Michael
Sikorski and Andrew Honig ISBN-10: 159327-290-1, ISBN-13: 978-1-59327-290-6, 2012
• Computer viruses: from theory to applications by Filiol, Eric Springer Science & Business Media,
2006
• Android Malware by Xuxian Jiang and Yajin Zhou, Springer ISBN 978-1-4614-7393-0, 2005
• Hacking exposed™ malware & rootkits: malware & rootkits security secrets & Solutions by Michael
Davis, Sean Bodmer, Aaron Lemasters, McGraw-Hill, ISBN: 978-0-07-159119-5, 2010
COURSE OBJECTIVES
3. To develop code signing and details how Android’s application installation and
management process works.
COURSE OUTCOMES
1.
4. Evaluate tools and technologies for use in protecting the network and individual
network systems
Android’s Architecture, Linux Kernel, Native Userspace, Dalvik VM, Java Runtime Libraries, . System Services,
Inter-Process Communication ,Binde, Android Framework Libraries, Applications, Android’s Security
UNIT 2 - Permissions
The Nature of Permissions ,Requesting Permissions ,Permission Management, Permission Protection Levels,
Permission Assignment,Contents in Detail Permission Enforcement,Kernel-Level Enforcement, Native Daemon-Level
Enforcement, Framework-Level Enforcement ,System Permissions,Signature Permissions,Development Permissions,
Shared User ID,Custom Permissions,Public and Private Components, Activity and Service Permissions Broadcast
Permissions, Content Provider Permissions, Static Provider Permissions,Dynamic Provider Permissions,Pending
Intents
Android Application Package Format,Code Signing, Java Code Signing,Android Code Signing . APK Install Process,
Location of Application Packages and Data, Active Components,Installing a Local Package, Updating a
Package,Installing Encrypted APKs, Forward Locking,Android 4.1 Forward Locking Implementation,Encrypted Apps
and Google Play,Package Verification, Android Support for Package Verification, Google Play Implementation,
Reference Books
1. Michael Gertz and Sushil Jajodia (Editors), Handbook of Database Security: Applications and Trends ,
ISBN-10: 0387485325. Springer, 2007
2. Osama S. Faragallah, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie, Ahmed I. Sallam, and Hala S.
El-Sayed, Multilevel Security for Relational Databases by; ISBN 978-1-4822- 0539-8. CRC Press,
2014.
3. Bhavani Thuraisingham, Database and Applications Security: Integrating Information Security and Data
Management, CRC Press, Taylor & Francis Group, 2
TextBooks:
1. [Xavier, C, “ Web Technology and Design” , New Age International
2. Ivan Bayross,” HTML, DHTML, Java Script, Perl & CGI”, BPB Publication
ReferenceBooks:
1. Hans Bergsten, “Java Server Pages”, SPD O’Reilly
2. Different classifications of identity management system. Various models for Trust paradigms.
COURSEOUTCOMES
At the end of the course the students should be able to:
1. Analyze to compute tasks with security contexts.
4. Compare and contrast between Discretionary access model and Access Matrix Model.
COURSE OBJECTIVES
1.To incorporate an assessment of the security requirements for AI systems in public procurement
policies.
2.To address the skills shortage and uneven distribution of talents and professionals
3.To ensure a degree of operational control over AI systems by developing and monitoring practices
4.To enhance AI reliability and reproducibility by using techniques such as Randomisation, Noise
Prevention, Defensive Distillation, Ensemble Learning.
5.To plan secure logs related to the development/coding of the system,
COURSE OUTCOMES
At the end of the course the students should be able to:
1.Propose the full auditability of models at time/point of failure to organizations
2. Demonstrate due diligence when testing the technology, before releasing it, preferably including the
actual test suites
3. Devise new methods to allow for system audits other than openly pushing dataset, such as restricting
audits
4.Access cyber-secure pedigrees for all software libraries linked to that code.
5. Execute & strengthen AI security as it relates to maintaining accountability across intelligent systems.
List of Experiments:
1. To study the different frameworks that are available in cyber security along with their
benefits and limitations.
2. To study those applications of artificial intelligence where cyber security is a mandatory
concept.
3. To study the concepts of cyber threat identification.
4. To implement cyber threat identification.
5. To automate threat hunting.
6. To automatically recognize patterns in the data for cyber security.
7. To develop an AI based antivirus software.
8. To implement Email monitoring.
9. To study the ways to fight with different threats using AI.
10. To study the future AI