bca-cs-nep-2023
bca-cs-nep-2023
Survey/
Discipline Specific
Discipline Specific Core (DSC) Generic Elective (GE) Vocational Seminar/MOOC/Com
SEMESTER Elective (DSE) Co-Curricular (CC) GP Total Credit
(Major) (Minor) Course(VOC) munity Outreach
(Major)
(SSMC)
4 Subjects 18 Credits
1 1 Subject 4 Credits 1 Subject 3 Credits 1 Credit 26
(6+6+4+2 Credits)
4 Subjects 16 Credits
2 1 Subject 4 Credits 1 Subject 3 Credits 1 Subject 2 Credits 1 Credit 26
(6+4+2+4 Credits)
4 Subjects 19 Credits
3 1 Subject 4 Credits 1 Subject 2 Credits 1 Credit 26
(6+6+4+3 Credits)
3 Subjects 15 Credits
4 1 Subjects 4 Credits 1 Subject 4 Credits 1 Subject 2 Credits 1 Credit 26
(6+6+3 Credits)
Early Exit Option-3: Award of Bachelor of Computer Applications (After 3 Year: 154 Credits)
Award of Bachelor of Computer Applications With Research (After 4 Years: 204 Credits)
Babu Banarasi Das University, Lucknow
School of Computer Applications
Bachelor of Computer Application (CS&F)
Evaluation Scheme (w. e. f. Academic Session 2023-24)
SEMESTER I
Course Period Per Week Evaluation Scheme
Course Code Course Title Credits Mode
Category L T P CIA ESE Total
DSC BCACSN11101 Data Privacy Fundamentals 3 1 0 40 60 100 4 IBM
DSC BCACSN11102 Fundamentals of Computer & Programming in 'C' 3 1 0 40 60 100 4
DSC BCACSN11103 Web Designing 3 1 0 40 60 100 4
DSC BCACSN11104 Basic Mathematics 2 0 0 40 60 100 2
GE Generic Elective-I 3 1 0 40 60 100 4
School
CC Co-Curricular-I 2 1 0 40 60 100 3
DSC BCACSN11151 Programming in 'C' Lab 0 0 4 40 60 100 2
DSC BCACSN11152 Web Designing Lab 0 0 4 40 60 100 2
GPN1101 General Proficiency 0 0 0 100 0 100 1
Total 16 5 8 420 480 900 26
SEMESTER II
Course Period Per Week Evaluation Scheme
Course Code Course Title Credits Mode
Category L T P CIA ESE Total
DSC BCACSN12101 Cyber Security 3 1 0 40 60 100 4 IBM
DSC BCACSN12102 Security Data Privacy Laws and Standards 2 0 0 40 60 100 2 IBM
DSC BCACSN12103 Operating System 3 1 0 40 60 100 4
DSC BCACSN12104 Basics of Python Programming 3 1 0 40 60 100 4
GE Generic Elective-II 3 1 0 40 60 100 4
CC Co-Curricular-II 3 0 0 40 60 100 3 School
DSC BCACSN12151 Basics of Python Programming Lab 0 0 4 40 60 100 2
VC Vocational Course-II 2 0 0 40 60 100 2
GPN1201 General Proficiency 0 0 0 100 0 100 1
Total 19 4 4 420 480 900 26
SEMESTER IV
Course Period Per Week Evaluation Scheme
Course Code Course Title Credits Mode
Category L T P CIA ESE Total
DSC BCACSN14201 Apply End to End Security to Cloud Application 3 0 0 40 60 100 3 IBM
DSC BCACSN14202 Data Warehousing & Data Mining 3 1 0 40 60 100 4
DSC BCACSN14203 Server Side Scripting 3 1 0 40 60 100 4
GE Generic Elective-IV 3 1 0 40 60 100 4
DSE Discipline Specific Elective-I 3 1 0 40 60 100 4
School
DSC BCACSN14251 Server Side Scripting Lab 0 0 4 40 60 100 2
DSC BCACSN14252 Data Warehousing & Data Mining Lab 0 0 4 40 60 100 2
VC Vocational Course-IV / SSMC 2 0 0 40 60 100 2
GPN1401 General Proficiency 0 0 0 100 0 100 1
Total 17 4 8 420 480 900 26
Early Exit Option-3: Award of Bachelor of Computer Applications (After 3 Year: 154 Credits)
SEMESTER VII
Course Period Per Week Evaluation Scheme
Course Code Course Title Credits Mode
Category L T P CIA ESE Total
DSC BCACSN17401 Statistical & Optimization Techniques 3 1 0 40 60 100 4
DSC BCACSN17402 Research Methodology 3 1 0 40 60 100 4
DSC BCACSN17403 Understanding Security & Forensics Through Case Study 3 1 0 40 60 100 4
DSE Discipline Specific Elective-IV 3 1 0 40 60 100 4 School
DSC BCACSN17451 Statistical Package for Social Sciences(SPSS) Lab 0 0 4 40 60 100 2
DSC BCACSN17452 Dissertation-I 0 0 12 120 180 300 6
GPN1701 General Proficiency 0 0 0 100 0 100 1
Total 12 4 16 420 480 900 25
SEMESTER VIII
Course Period Per Week Evaluation Scheme
Course Code Course Title Credits Mode
Category L T P CIA ESE Total
DSC BCACSN18401 R Programming 3 1 0 40 60 100 4
DSC BCACSN18402 Intellectual Property Right 3 1 0 40 60 100 4
DSC BCACSN18451 R Programming Lab 0 0 4 40 60 100 2 School
DSC BCACSN18452 Dissertation-II 0 0 28 200 300 500 14
GPN1801 General Proficiency 0 0 0 100 0 100 1
Total 6 2 32 420 480 900 25
Award of Bachelor of Computer Applications With Research (After 4 Years: 204 Credits)
Note: 1. Student may select any subject from Co-Curricular list offered by the University
2. Student may selct any subject from Vocational Course list offered by the University
Bachelor of Computer
Applications
(Cyber Security & Forensics)
In Collaboration with IBM
FIRST SEMESTER
Program Bachelor of Computer Applications (CS & F)
Year I Semester I
Course Name Data Privacy Fundamentals
Code BCACSN11101
Course Type DSC L T P Credit
Pre-Requisite 3 1 0 4
Get an outline of data privacy laws and walk away with some guiding principles for
Course how to stay out of trouble. Also Knowing how to hack a colleague's password will raise
Objectives some ethical questions and review theories of data privacy as well as data privacy in
the context of social media and artificial intelligence.
Course Outcomes
CO1 Identify foundational understanding of digital age privacy concepts and theories.
CO2 Identify privacy implications of modern digital technology.
CO3 Identify the rules and frameworks for data privacy in the age of technology.
CO4 Learn the various data privacy acts and IT Acts
Contact Mapped
Module Course Contents
Hrs. CO
Privacy in the Digital Age: An overview of privacy laws in
Canada Case Study: Student loans data breach (Canada) - A
breach involving the personal information of about more than
half a million clients of Human Resources and Skills
Development Canada (HRSDC) and 250 departmental CO1
1 15
employees. Information and foundational concepts of digital
age privacy. You will see some of the history of it and consider
the quandary that comes with trying to define privacy.
Questions about the realities of securing personal data
information will also be considered.
Risks in Data Privacy: An overview of the Personal Information
Protection and Electronic Documents Act (PIPEDA) Case Study:
Target Corp. (USA) - A data breach involving information on 40
million payment cards (i.e., credit, debit, and ATM cards) and CO2
personally identifiable information (PII) on 70 million
2 15
customers Contemplate what threatens our privacy in this
digital age and the steps we can we take to protect it. Also, we
will take a deep look into the growing influence of smart
devices and artificial intelligence and consider whether or not
they help or hinder human beings.
Frameworks of Data Privacy Law: Dr. Ann Cavoukian's 7
Foundational Principles of 'Privacy by Design' Case Study: Think
W3 (UK) - A data breach involving 1.2 million credit and debit
card details Case Study: Doritex Corp. (USA) - A data breach
exposed the social security numbers of over 500 job applicants CO3
3 15
Privacy and the law and how it pertains to privacy in the media,
in surveillance situations and in protecting personal data
information. Finally, we will see how privacy regimes are
functioning outside of the United States and make comparisons
on approaches to privacy and how it is regulated.
Data breaches and passwords: Case Study: Home Depot (USA)
- A data breach estimated to have put payment card CO4
4 15
information at risk for approximately 56 million unique
payment cards Class Participation Questionnaire
Suggested Readings
1. Data Privacy and GDPR Hank book
2. Privacy and Data Protection Essentials by Ruben Zeegers and Theo Wanders
Online Resources
1. https://www.coursera.org/learn/northeastern-data-privacy
2. https://cognitiveclass.ai/courses/data-privacy
3. https://onlinecourses.nptel.ac.in/noc22_cs37/preview
Suggested Readings:
Online Resources:
1. https://nptel.ac.in/courses/106106222
Online Resources:
1. http://www.nptel.com/computerscience/Linuxprogramming
2. http://manuals.bioinformatics.ucr.edu/home/linux-basics
Online Resources:
1. https://archive.nptel.ac.in/courses/106/105/106105162/
Suggested Readings:
1. Matt Bishop, “Introduction to Computer Security”, Addition Wesley.
2. William Stallings, “Computer Security: Principles and Practices”, Pearson Education.
3. Berouz Forouzan, “Cryptography and Network Security”, TMH.
4. John R. Vecca, “Network and System Security”, Syngress.
Online Resources:
1. https://archive.nptel.ac.in/noc/courses/noc15/SEM1/noc15-cs03/
1. Michael Minelli, Michelle Chambers, and Ambiga Dhiraj, "Big Data, Big Analytics: Emerging Business
Intelligence and Analytic Trends for Today's Businesses", Wiley
2. DT Editorial Services, Big-Data Black Book, Wiley
3. Dirk deRoos, Chris Eaton, George Lapis, Paul Zikopoulos, Tom Deutsch, “Understanding Big Data
Analytics for Enterprise Class Hadoop and Streaming Data”, McGraw Hill.
4. Thomas Erl, Wajid Khattak, Paul Buhler, “Big Data Fundamentals: Concepts, Drivers and Techniques”,
Prentice Hall.
5. Bart Baesens, “Analytics in a Big Data World: The Essential Guide to Data Science and its Applications
(WILEY Big Data Series)”, John Wiley & Sons
Online Resources:
1. https://archive.nptel.ac.in/courses/106/108/106108058/
Course Outcomes
To understand IoT and Cyber Security fundamentals, identify related threats, and
CO1 apply solutions. To grasp the impact of cyber security incidents through case studies.
To understand Energy and Sustainability Technologies fundamentals and the role of
CO2 Cyber Security, and to grasp the impact of cyber security incidents through case
studies.
To understand AR & VR fundamentals, identify security challenges, and apply the
CO3 best solutions. To grasp the impact of cyber security incidents in these technologies
through case studies.
To Understand the fundamental concepts of Quantum Computing, role of cyber
CO4 security, understanding the future of Quantum Computing in Cyber Security in
through case study.
Contact Mapped
Module Course Contents
Hrs. CO
Internet of Things (IoT): Introduction to IoT, Cyber security
versus IoT Security, Understanding IoT Architecture, The IoT
Ecosystem, IoT Security Challenges, Vulnerabilities, attacks on
1 15 CO1
IoT Systems, Common IoT attack types, Attack trees, IoT
Security Solutions and Best Practices, Case Study: IoT Security
Incidents.
Energy and Sustainability Technologies: Introduction to
Energy Technologies, Types of energy technologies (fossil
fuels, renewable energy, nuclear energy, energy storage,
energy efficiency), Role of Cybersecurity in Energy
2 Technologies (protecting energy infrastructure, securing data, 15 CO2
ensuring operational continuity, compliance with regulations,
building trust), Sustainability and Cybersecurity, Security
Challenges in Green Technologies, Case Study: Cyber Attacks
on Energy Infrastructure.
Augmented Reality (AR) and Virtual Reality (VR) :
Introduction to AR and VR, Understanding AR/VR
Technologies, perceptual aspect in AR/VR, Input devices and
3 tracking, output devices in AR/VR, Security Challenges in 15 CO3
AR/VR, Cybersecurity in AR/VR( protecting user data, securing
AR/VR devices, ensuring privacy, promoting trust training and
awareness), Case Study: Security Incidents in AR/VR.
Quantum Computing and Cybersecurity: Introduction to
Quantum Computing, Quantum bits, Bras and kets, Quantum
State Representation, Bloch Sphere, gates, Entanglement,
4 Quantum Computing and Cybersecurity, Quantum 15 CO4
Cryptography, Case Study: The Future of Quantum Computing
in Cybersecurity.
Quantum Computing and Cybersecurity: Introduction to
Quantum Computing, Quantum bits, Bras and kets, Quantum
State Representation, Bloch Sphere, gates, Entanglement,
4 15 CO4
Quantum Computing and Cybersecurity, Quantum
Cryptography, Case Study: The Future of Quantum Computing
in Cybersecurity.
Suggested Readings:
1. Russel, B., & Van Duren, “Practical Internet of Things Security”. Packt Publishing Ltd.
2. Lea, P., “IoT and Edge Computing for Architects: Implementing edge and IoT systems from sensors to
clouds with communication systems, analytics, and security”, Packt Publishing Ltd.
3. Randolph, J., & Masters, G. M., “Energy for Sustainability: Technology, Planning, Policy”. Island
Press1718192021.
4. Patel, P. D, “A systematic literature review on Virtual Reality and Augmented Reality in terms of
privacy, authorization and data-leaks”. ArXiv222324.
Online Resources:
1. https://archive.nptel.ac.in/courses/106/105/ 106105166/
2. https://archive.nptel.ac.in/courses/115/101 /115101092/
3. https://onlinecourses.nptel.ac.in/noc24_ma64/ preview
Suggested Readings:
1. Andrew S Tanenbaum, David. J. Wetherall, “Computer Networks”, Pearson Education.
2. Douglas E. Comer, “Hands-on Networking with Internet Technologies”, Pearson Education.
3. Richard Stevens, “Unix Network Programming”, Prentice Hall/Pearson Education.
4. James F. Kurose and Keith W. Ross “Computer Networking: A Top-Down Approach", Pearson
Education.
Online Resources:
1. https://nptel.ac.in/courses/106105080
2. https://nptel.ac.in/courses/117105076
Course Articulation Matrix
PO-PSO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 1 1 1 1 2 1 1 1 1 1 1
CO2 1 1 1 2 1 1 1 1 1 1
Program Bachelor of Computer Applications (CS & F)
Year II Semester III
Course Name Linux and Shell Programming Lab
Code BCACSN13252
Course Type DSC L T P Credit
Pre-Requisite 0 0 4 2
To provide the fundamental knowledge about LINUX operating system, its diverse
Course
commands related to file handling, disk, process utilities, redirection etc. Also
Objectives
familiarize the students to do shell programming using vi editor.
Course Outcomes
To demonstrate the basic knowledge of Linux commands and file handling utilities by
CO1 using Linux shell environment.
CO2 To introduce shell scripting for various applications.
Contact Mapped
Module Course Contents
Hrs. CO
1.Use of Basic LINUX Commands: PATH, man, echo,who
passwd, uname, date, stty, pwd, cd,mkdir, rmdir, cat,
ls, cp, mv, rm, more, wc
2. Commands related to Input Output Redirection
3. Commands related to File handling and Process utilities
4. Commands related to Security by file permissions:
chmod, umask, stickybit
5. Commands related to disk utilities-du, df, find & ulimit
6. Implementation of Filters and Pipes
7. Using vi editor do the following things:
1 i) Cursor movement 30 CO1
ii) Text insertion
iii) Changing and replacing text
iv) Deleting text
v) Searching the text
vi) Pattern Matching of text
vii) Various options to: set command
viii) Compiling and Running a C program
Note: Student will also perform all other exercises provided by
course instructor.
1. Write interactive shell scripts based on following:
i) Positional parameters
ii) Arithmetic and Logical Operators
iii) If-then-fi, if-then-else-fi, nested if-else, elif, case
structure
iv) While, until and for loop
v) Shell Meta characters
2. Write a Shell script that accepts a filename, starting and
ending line numbers as arguments and displays all the
lines between the given line numbers.
3. Write a Shell script that deletes all lines containing a
specified word in one or more files supplied as arguments
to it.
4. Write a Shell script that displays list of all the files in the
current directory to which the user has Read, Write and
Execute permissions.
2 5. Write a Shell script that receives any number of file names
as arguments checks if every argument supplied is a file or 30 CO2
a directory and reports accordingly. If the argument is a
file, the number of lines on it is also reported.
6. Write a Shell script that accepts a list of file names as its
arguments, counts and reports the occurrence of each
word present in the first argument file on other argument
files.
7. Write a shell program to accept user name and reports if
user log has logged in.
Note: Student will also perform all other exercises provided by
course instructor.
Suggested Readings:
1. Sumitabha Das, “Unix Concepts and Applications”, TMH.
2. Yashwant Kanetkar, “Unix Shell Programming”, BPB.
3. Parata, “Advanced Unix–A Programmer’s Guide”, BPB.
4. Behrouz A. Forouzan, Richard F. Gilberg, “Unix and shell Programming”, Thomson Asia.
5. M.G. Venkateshmurthy, “Unix & Shell Programming”, Pearson Education.
Online Resources:
1. http://www.nptel.com/computerscience/Linuxprogramming
2. http://manuals.bioinformatics.ucr.edu/home/linux-basics
1. Ronald L. Krutz and Russell Dean Vines, Cloud Security: A Comprehensive Guide to Secure Cloud
Computing, Wiley.
2. John R. Vacca, Cloud Computing Security, CRC Press.
Online Resources:
1. https://archive.nptel.ac.in/courses/106/106/106106129/
Suggested Readings:
1. Jiawei Han and Micheline Kamber, “Data Mining Concepts and Techniques”, Elsevier.
2. Pang-Ning Tan, Michael Steinbach and Vipin Kumar, “Introduction to Data Mining”, PHI
3. Max Bramer, “Principles of Data Mining”, Springer.
4. Arun K Pujari, “Data Mining Techniques”, University Press.
Online Resources:
1. https://archive.nptel.ac.in/courses/106/105/106105174/
Suggested Readings:
1. Robin Nixon,” Learning PHP, MySQL & JavaScript_ with jQuery, CSS & HTML5”, O’ Reilly Media.
2. Larry Ullman, “Php for the Web Visual Quickstart Guide”, Peachpit Press.
3. Alan Forbes, “The Joy of PHP Programming: A Beginner’s Guide to Programming Interactive Web
Applications with PHP and MySQL”, Plum Island.
4. Vikram Vaswani, “PHP: A Beginner’s Guide”, McGraw-Hill.
Online Resources:
1. https://spoken-tutorial.org/tutorial-search/?search_foss=PHP+and+MySQL&search_language=English
Suggested Readings:
1. Barrie Sosinsky, “Cloud Computing Bible”, Wiley India.
2. Rajkumar Buyya, James Broberg, Andrzej M. Goscinski, “Cloud Computing: Principles and
Paradigms”, Wiley.
3. Nikos Antonopoulos, Lee Gillam, “Cloud Computing: Principles, Systems and Applications”,
Springer.
4. Ronald L. Krutz, Russel lDeanVines ,“Cloud Security: A Comprehensive Guide to Secure Cloud
Computing”, Wiley-India.
Online Resources:
1. https://nptel.ac.in/courses/106105167
2. https://onlinecourses.nptel.ac.in/noc22_cs20/
Course Outcomes
CO1 To understand distributed database systems architecture and design.
CO2 Able to apply methods and techniques for distributed query processing
and optimization.
CO3 To understand the concepts of distributed transaction process and concurrency control
methods.
CO4 To understand the concept of database reliability and database administration.
Contact Mapped
Module Course Contents
Hrs. CO
Distributed Data Base an Overview: Distributed Database
Management System, Defining Distributed Database System,
Problem Areas, distributed versus Centralized Database, Levels of
1 Distributed Transparency; Heterogeneity DDBMS Architecture:
Client/Server, Peer to peer, Types of Data Fragmentation,
Distributed Transparency, Integrity Constraints, Framework for 15 CO1
Distributed Database Design, Fragment Allocation.
Query Transformation & Optimization: Query processing
objectives, characterization of query processors, query
decomposition, Equivalence Transformation for Queries,
Transforming Global Queries into Fragment Queries, Distributed
2 Grouping and Aggregate Function Evaluation, Parametric Queries, 15 CO2
centralized query optimization, distributed query optimization
Framework for Query Optimization, Join Queries, General
Queries.
Transaction Management & Concurrency control: Framework for
Transaction Management, Definition, properties, Transaction
Supporting Atomicity; Distributed Concurrency Control:
3 Foundation of Distributed Concurrency Control, Locking based
Concurrency Control, Time stamp-based Concurrency Control, 15 CO3
Distributed Deadlock, Concurrency Control Based on Timestamps.
Reliability & Distributed Transaction: Reliability and Concurrency
Control, Determining a Consistent View of Network, Detection
4 and Resolution of Inconsistency, Checkpoint and Cold Restart; 15 CO4
Distributed Database Administration: Catalog Management in
Distributed Database, Authorization and Protection.
Suggested Readings:
1. S. Ceri, G. Pelagatti, “Distributed Database: Principles and Systems”, McGrawHill.
2. M. Tamer Ozsu, “Principles of Distributed Database Systems”, Pearson Education.
3. Abraham Silberschatz, Henry F. Korth, S. Sudarshan, “Database System Concepts”, McGrawHill.
4. David Bell, Jane Grimson, “Distributed Database Systems”, Addison-Welley.
Online References:
1. https://onlinecourses.nptel.ac.in/noc22_cs80/preview
Online Sources:
1. https://onlinecourses.nptel.ac.in/noc23_cs127/preview
2. https://archive.nptel.ac.in/courses/129/106/129106001/#
Suggested Readings:
Online Resources:
1. https://archive.nptel.ac.in/courses/106/105/106105183/
Online Resources:
1. https://spoken-tutorial.org/tutorial-search/?search_foss=PHP+and+MySQL&search_language=English.
CO1 2 2 2 2 2 2 3 3 3 2 2 2 3
CO2 2 2 2 3 2 2 2 3 2 2 2 2 2
Program Bachelor of Computer Applications (CS & F)
Year II Semester IV
Course Name Data Warehousing & Data Mining Lab
Code BCACSN14252
Course Type DSC L T P Credit
Pre-Requisite 0 0 4 2
The objective of this lab syllabus is to provide students with hands-on experience in
Course designing, implementing, and analyzing data warehousing and data mining solutions.
Objectives The lab exercises will cover various aspects of data warehousing, including data
modeling, ETL processes, OLAP cube design, and data mining techniques.
Course Outcomes
CO1 To design and implement Data Warehouse.
CO2 To implement data mining techniques.
Contact Mapped
Module Course Contents
Hrs. CO
1. Overview of Data warehousing tools and platforms.
2. Setting up the Data Warehousing Environment.
3. Design and Implements Dimensional Model of Data
warehouse.
4. Implement ETL Process.
i. Extract
1 ii. Transform 30 CO1
iii. Load
5. Building OLAP Cube.
6. Querying OLAP Cube.
Note: Student will also perform all other exercises provided
by course instructor.
1. Implementation of Apriori and Implementation of FP-
Growth Algorithm.
2. Implementation of Decision Tree.
3. Implementation of Bayesian Classification.
2 4. Implementation of K-Means Clustering. 30 CO2
5. Implementation of Birch Clustering.
6. Implementation of DBSCAN, Sting Clustering.
Note: Student will also perform all other exercises provided
by course instructor.
Suggested Readings:
1. Jiawei Han and Micheline Kamber, “Data Mining Concepts and Techniques”, Elsevier.
2. Pang-Ning Tan, Michael Steinbach and Vipin Kumar, “Introduction to Data Mining”, PHI
3. Max Bramer, “Principles of Data Mining”, Springer.
4. Arun K Pujari,” Data Mining Techniques”, University Press.
Online Resources:
1. https://archive.nptel.ac.in/courses/106/105/106105174/
Online Resources:
1. https://archive.nptel.ac.in/courses/106/105/106105223/
Online Resources:
1. https://archive.nptel.ac.in/courses/106/106/106106156/
Suggested Readings:
1. Rafael C. Gonzalez, Richard E. Woods, “Digital Image Processing”, Pearson Education.
2. Anil K. Jain, “Fundamentals of Digital Image Processing”, Pearson Education.
3. Kenneth R. Castleman, “Digital Image Processing”, Pearson Education.
4. Rafael C. Gonzalez, Richard E. Woods, Steven Eddins, “Digital Image Processing using MATLAB”,
Pearson Education.
5. D, E. Dudgeon and RM. Mersereau, “Multidimensional Digital Signal Processing”, Prentice Hall
Professional Technical Reference.
Online Resources:
1. https://archive.nptel.ac.in/courses/117/105/117105135/
Course Articulation Matrix
PO-PSO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 1 1 2 1 1 1 1 2 3 1
CO2 2 2 2 2 2 1 1 1 1 2 3 1
CO3 2 3 1 2 2 2 1 1 1 1 3 3 2
CO4 2 3 1 3 2 2 1 1 1 3 3 2
Program Bachelor of Computer Applications (CS & F)
Year III Semester V
Course Name Biometric Security
Code BCACSN15321
Course Type DSE L T P Credit
Pre- Requisite 3 1 0 4
Enrich the knowledge of students with the understanding of biometrics and standards
Course applied to security. Help students understand various prevalent Biometric
Objectives technologies and various feature extraction techniques for biometric systems. Also,
help them to understand various biometric security issues.
Course Outcomes:
CO1 To understand the basic concepts of Biometrics and Biometric Standards
CO2 To understand Physiological Biometric Technologies
CO3 To understand Behavioral and Multimodal Biometric Technologies
CO4 To understand to evaluate the performance of a Biometric System and Security issues
Contact Mapped
Module Course Contents
Hrs. CO
INTRODUCTION TO BIOMETRICS:
Introduction and Background; Biometric Modalities; Biometric
Technologies; Passive Biometrics; Active Biometrics; Types of
15 CO1
1 Biometric Systems: Unimodal and multimodal; Modes of
operation: Identification and Verification; Biometric
parameters; Templates; Biometric Applications; Biometric
Standards; Stages of working of a biometric system in general.
PHYSIOLOGICAL BIOMETRIC TECHNOLOGIES:
Fingerprint Recognition: Minutiae based Fingerprint Matching;
Non-Minutiae based Fingerprint Recognition, Fingerprint 15 CO2
2
Enhancement and Fingerprint Classification; Face Recognition:
data acquisition, Feature extraction techniques for face
Recognition.
BEHAVIORAL BIOMETRIC TECHNOLOGIES:
Speech Recognition, Gait Recognition, Keystroke dynamics:
Data Acquisition; Feature Extraction methods; Characteristics;
Strengths & Weaknesses; MULTIMODAL BIOMETRICS: 15 CO3
3
Introduction to Multimodal biometric system; Types of
multimodal biometric systems, Integration strategies;
Architecture; levels of fusion; score fusion techniques score
normalization, user-specific parameters.
PERFORMANCE EVALUATION AND SECURITY:
Performance Evaluation Metrics: Confusion Matrix -TP, FP,
TN, FN; Statistical Measures of Biometrics - FAR, FRR, EER, 15 CO4
4 Recall, Specificity, Accuracy, Precision, F1-score: AUC-ROC
Curve; Security: Two-Factor Authentication; Adversary
Attack-Attacks on user interface; Attacks on biometric
processing; Attacks on template database.
Suggested Readings:
1. Anil K. Jain, Arun A. Ross and Karthik Nanda Kumar, “Introduction to Biometrics”, Springer Science &
Business Media.
2. Rud Bolle, Jonathan Connell, Sharanth Chandra Pankanti, Nalini Ratha and Andrew Senior, “Guide to
Biometrics”, Springer Professional Computing (SPC).
3. James L. Wayman, Anil K. Jain, Davide Maltoni and Dario Maio, “Biometric Systems Technology, Design
and Performance Evaluation”, Springer London Ltd.
4. Paul Reid, “Biometrics for Network Security”, Pearson Education.
Online Resources:
1. http://nptel.ac.in/courses/106104119/
Online Resources:
1. https://www.coursera.org/articles/what-is-erp
Suggested Readings:
Online Resources:
1. https://archive.nptel.ac.in/courses/106/106/106106234/
PO -PSO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 2 2 1 2 1 2 1 2 1 2 1 1
CO2 2 2 2 2 2 2 1 2 1 2 2 2
CO3 2 3 2 2 2 2 1 2 1 3 3 3
CO4 2 3 2 2 1 2 1 2 3 3 3
Program Bachelor of Computer Applications (CS & F)
Year III Semester V
Course Name Blockchain Technology
Code BCACSN15324
Course Type DSE L T P Credit
Pre-Requisite 3 1 0 4
To Gain a comprehensive understanding of Blockchain and Distributed Ledger
Course Technologies, covering fundamental concepts and functionalities. Delve into Alternative
Objectives Blockchains to grasp the workings of Distributed Ledger Technology beyond
conventional paradigms
Course Outcomes
Students will learn fundamental concepts of Blockchain and Distributed Ledger
CO1
Technologies
CO2 To acquire the insights into Blockchain functionality.
CO3 To explore Blockchain implementation through Bitcoin and Merkle Root etc.
CO4 To get knowledge about Distributed Ledger Technology in Alternative Blockchains.
Contact Mapped
Module Course Contents
Hrs. CO
Blockchain and Distributed Ledger Fundamentals:
Blockchain, Growth of Blockchain technology, Cryptographic
basics for cryptocurrency: signature schemes, encryption
1 schemes; Categories of Blockchain: Public Blockchain, Private 15 CO1
Blockchain, Permissioned Ledger, Tokenized Blockchain,
Token less Blockchain.
Blockchain Functionality: Distributed identity and Digital
identification: Public and private keys, Decentralized network,
Permissioned distributed Ledger, Digital identification and
wallets; Blockchain data structure and security: Double
2 15 CO2
spending, Network consensus, Sybil attacks, Block rewards
and miners, Forks and consensus chain, Sharding based
consensus algorithms to prevent attack, Finality, Limitation of
proof-of-work, Alternatives to Proof of Work.
Blockchain Implementation: Bitcoin and Merkle Root;
Eventual Consistency and Bitcoin; Byzantine Fault Tolerance
and Bitcoin; Bitcoin block-size; Bitcoin Mining; Blockchain
3 Collaborative Implementations: Hyperledger, Corda; 15 CO3
Ethereum’s ERC 20 and token explosion; Blockchain and full
ecosystem decentralization: Smart contract, Decentralized
autonomous organization (DAO), Decentralized applications.
Distributed Ledger Technology in Alternative Blockchain:
Blockchain Governance Challenges: Bitcoin Blocksize Debate,
The Ethereum DAO Fork, Ethereum’s Move to PoS and Scaling
4 15 CO4
Challenges; Blockchain Technical Challenges: Denial-of-Service
Attacks, Security in Smart Contracts, Ripple, Stellar;
Decentralized Network manager: Tezos.
Suggested Readings:
1. Iyer, Kedar, et al., “Blockchain: A Practical Guide to Developing Business, Law, and Technology
Solutions”, McGraw-Hill Education.
2. Wattenhofer, R., “Distributed Ledger Technology: The Science of the Blockchain”, Create
Space Independent Publishing Platform.
3. Mark Gates, “Block chain: Ultimate guide to understanding block chain, bit coin, crypto
currencies, smart contracts and the future of money”, CreateSpace Independent Publishing
Platform.
4. Bahga, Vijay Madisetti, “Block chain Applications: A Hands-On Approach”, Arshdeep Bahga.
Online Resources:
1. https://nptel.ac.in/courses/106105184/
Suggested Readings:
1. Sudip Misra, Anandarup Mukherjee, Arijit Roy, “Introduction to IoT”, Cambridge University Press.
2. Arsheep Bahga, Vijay Madisetti, “INTERNET OF THINGS - A HANDS-ON APPROACH”, Orient Black swan
Private Limited.
3. Raj Kamal, “INTERNET OF THINGS (IOT): Architecture and Design Principles”, McGraw Hill.
Online Resources:
1. https://archive.nptel.ac.in/courses/106/105/106105166/
Course Articulation Matrix
PO-PSO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 2 1 2 1 1 1 2 1 1 1 1 1
CO2 2 1 3 1 1 2 1 1 3 1 2 2 1
CO3 1 3 3 2 3 2 1 2 1 2 3 1
CO4 3 3 1 3 1 1 1 1 3 1 3 2 1 2
Program Bachelor of Computer Applications (CS & F)
Year III Semester V
Course Name Storage Area Network
Code BCACSN15326
Course Type DSE L T P Credit
Pre-Requisite 3 1 0 4
This course introduces fundamental principles, architectures, technologies, and
Course management practices of Storage Area Networks (SANs). Students will gain hands-on
Objectives experience with SAN components, protocols, and administration tools.
Course Outcomes
CO1 To understand the basic concept of SAN and Underlying Technologies.
CO2 To understand the Architecture and Components of SAN.
CO3 To understand the basic concept Storage in SAN
CO4 To understand the network components used in SAN and Data Center Application.
Contact Mapped
Module Course Contents
Hrs. CO
Introduction to Information Storage: Information Storage,
Evolution of Storage Architecture, Data Center Infrastructure,
Virtualization and Cloud Computing; Data Center
Environment: Application Database Management System
1 (DBMS), Host (Compute), Connectivity, Storage, Disk Drive 15 CO1
Components, Disk Drive Performance, Host Access to Data,
Direct-Attached Storage, Storage Design Based on Application;
Storage Area Network: Introduction, Features, Importance
and Capabilities; NAS Vs SAN.
Storage Networking Architecture: Components of SAN-based
client-server systems; Basic SAN System, NAS appliance with
local storage, Network-attached storage model with SAN-
attached storage, In-Band SAN Appliance, Out-of-Band SAN
2 15 CO2
Appliance, Cluster File System withCentral Metadata,
Symmetric Cluster File System, RAID Subsystem-Based Volume
Replication, Server-Based Volume Replication, File-Based Data
Replication.
Storage in Storage Networking: Challenges, Cost, Disk
Aggregation and Virtualization, Mirroring versus RAID versus
3 Data Striping; RAID: Protection AgainstDisk Failures, Mirroring 15 CO3
and Parity, Controller Failures, Tolerance, Operations and Data
Integrity.
Fibre Channel: The Standards, Storage area network devices:
Fibre Channel bridges, Arbitrated loop hubs and switched
hubs, Switches and directors; Infrastructure, Fibre Channel
Variations; Emerging SAN Interconnect Technologies:
4 ipStorage and Infiniband; Software for Storage Networking: 15 CO4
Data Center I/O Stack, Discovering Devices, Controlling Access
to Storage Devices and Data Objects, Shared Access Data
Managers, Computer System I/O Performance, Load Balancing,
High performance Volumes.
Suggested Readings:
1. EMC Education Services, “Information Storage and Management”, Wiley India Publications.
2. Paul Massiglia, Richard Barker, "Storage Area Network Essentials: A Complete Guide to Understanding
and Implementation SANs Paperback", Wiley India Publications.
3. Marc Farley, “Storage Networking Fundamentals: An Introduction to Storage Devices, Subsystems,
Applications, Management, and Filing Systems”, Cisco press.
4. Robert W Kembel, “Fiber Channel a Comprehensive Introduction”, Northwest Learning Associates.
Online Resources:
1. https://archive.nptel.ac.in/courses/106/108/106108058/
Online Resources:
1. https://archive.nptel.ac.in/courses/106/106/106106156/
Suggested Readings:
1. Rafael C. Gonzalez, Richard E. Woods, “Digital Image Processing”, Pearson Education.
2. Anil K. Jain, “Fundamentals of Digital Image Processing”, Pearson Education.
3. Kenneth R. Castleman, “Digital Image Processing”, Pearson Education.
4. Rafael C. Gonzalez, Richard E. Woods, Steven Eddins, “Digital Image Processing using MATLAB”,
Pearson Education.
5. D, E. Dudgeon and RM. Mersereau, “Multidimensional Digital Signal Processing”, Prentice Hall
Professional Technical Reference.
Online Resources:
1. https://archive.nptel.ac.in/courses/117/105/117105135/
Course Articulation Matrix
PO-PSO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 3 3 2 1 3 1 3 3 3
CO2 3 2 3 3 2 1 3 1 3 3 3
SIXTH SEMESTER
Program Bachelor of Computer Applications (CS & F)
Year III Semester VI
Course Name Cyber Protection Practices
Code BCACSN16301
Course Type DSC L T P Credit
Pre-Requisite 3 1 0 4
Course To understand the concept of cyber security and issues and challenges associated
Objectives with it. Students, at the end of this course, should be able to understand the
cybercrimes, their nature, legal remedies and as to how report the crimes.
Course Outcomes
CO1 After completion of this course, students would be able to understand the concept of
cyber security and issues and challenges associated with it.
CO2 Students should be able to understand the cyber-crimes, their nature, legal remedies
and as to how report the crimes through available platforms.
CO3 On completion of this course, students should be able to appreciate various privacy
and security concerns on online social media and understand the reporting
procedure of inappropriate content, underlying legal aspects and best practices for
the use of social media platforms.
CO4 Students, after completion of this module will be able to understand the basic
security aspects related to current era.
Contact Mapped
Module Course Contents
Hrs. CO
Introduction to Cyber security: Defining Cyberspace and
Overview of Computer and Web-technology, Architecture of
cyberspace, Communication and web technology, Internet,
1 World wide web, Advent of internet, Internet infrastructure for 15 CO1
data transfer and governance, Internet society, Regulation of
cyberspace, Concept of cyber security, Issues and challenges of
cyber security.
Data Privacy and Data Security: Defining data, meta-data, big
data, non-personal data. Data protection, Data privacy and data
security, Personal Data Protection Bill and its compliance, Data
protection principles, Big data security issues and challenges,
2 Data protection regulations of other countries- General Data 15 CO2
Protection Regulations (GDPR), Personal Information Protection
and Electronic Documents Act (PIPEDA)., Social media- data
privacy and security issues.
Social Media Overview and Security: Introduction to Social
networks, Types of social media, social media platforms, social
media monitoring, Hashtag, Viral content, social media
marketing, social media privacy, challenges, opportunities and
3 pitfalls in online social network, Security issues related to social 15 CO3
media, Flagging and reporting of inappropriate content, Laws
regarding posting of inappropriate content, best practices for
the use of social media, case studies.
Suggested Readings:
1. R. C Mishra, “Cyber Crime Impact in the New Millennium”, Auther Press.
2. Sumit Belapure and Nina Godbole, “Cyber Security Understanding Cyber Crimes, Computer
Forensics and Legal Perspectives”, Wiley India Pvt. Ltd.
3. Henry A. Oliver, “Security in the Digital Age: Social Media Security Threats and Vulnerabilities”,
Create Space Independent Publishing Platform, Pearson.
4. K. Kumar, “Cyber Laws: Intellectual Property & E-Commerce Security”, Dominant Publishers.
Online Resources:
1. https://onlinecourses.nptel.ac.in/noc24_cs121/preview
Online Resources:
1. https://archive.nptel.ac.in/courses/111/105/111105039/
Online References:
1. https://onlinecourses.nptel.ac.in/noc23_ge36/preview
Course Outcomes
CO1 Students will be able to demonstrate a foundational understanding of security and its
concepts.
CO2 Students will be able to identify digital threats, apply security measures, analyze, and
investigate security incidents.
CO3 Students hand on practice with open-source digital forensics platform and tools.
CO4 Students, after completion of this module will be able to understand the basic
security aspects related to current era.
Contact Mapped
Module Course Contents
Hrs. CO
Case Studies on Data Security: Data Privacy and Data Security,
Personal Data Protection Bill and Its Compliance, Data
Protection Principles, Big Data Security Issues and Challenges,
1 Data Protection Regulations of Other Countries; GDPR, PIPEDA, 15 CO1
Case Study: WhatsApp Pegasus Spyware (2019).
Case Study: The Equifax Data Breach (2017).
Case Studies on Concepts of Security: Principles of Security,
Encryption and Decryption, Authentication, Security Standards,
2 Security Services, Importance of Security Services, Security 15 CO2
Mechanism.
Case Study: Uber Data Breach (2016).
Case Study: Capital One Data Breach (2019).
Case Studies on Digital Forensics and Tools: Digital Forensics
Fundamentals, Chain of Custody, Introduction Open-Source
3 Digital Forensic Tools, Introduction to Memory Forensics, Data 15 CO3
Recovery, Legal and Ethical Considerations in Digital Forensics.
Case Study: Facebook-Cambridge Analytica Scandal (2018)
Case Study: Colonial Pipeline Ransomware Attack (2021)
Case Studies on Cyber-crime and Cyber Law: Classification of
Cybercrimes, Malware and Ransomware Attacks, Social
4 Engineering Attacks, Legal perspective of Cybercrime, IT Act 15 CO4
2000 and its amendments.
Case Study: Sony Pictures Entertainment Hack (2014)
Case Study: WannaCry Ransomware Attack (2017)
Suggested Readings:
1. R. C Mishra, “Cyber Crime Impact in the New Millennium”, Auther Press.
2. Sumit Belapure and Nina Godbole, “Cyber Security Understanding Cyber Crimes, Computer Forensics
and Legal Perspectives”, Wiley India Pvt. Ltd.
3. Henry A. Oliver, “Security in the Digital Age: Social Media Security Threats and Vulnerabilities” by, Create
Space Independent Publishing Platform, Pearson.
4. K Kumar, “Cyber Laws: Intellectual Property & E-Commerce Security”, Dominant Publishers
Online Resources:
1. https://archive.nptel.ac.in/courses/128/106/128106006/
Online Resources:
1. https://archive.nptel.ac.in/courses/106/106/106106146/
Online Resources:
1. https://archive.nptel.ac.in/courses/106/105/106105173/
Online Resources:
1. https://onlinecourses.nptel.ac.in/noc19_cs54/preview
Online Resources:
1. https://www.ibm.com/docs/en/spss-statistics
Suggested Readings:
1. Christian Heumann, Michael Schomaker and Shalabh “Introduction to Statistics and Data Analysis -
With Exercises, Solutions and Applications in R”, Springer.
2. Pierre Lafaye de Micheaux, Remy Drouilhet, Benoit Liquet “The R Software-Fundamentals of
Programming and Statistical Analysis”, Springer.
3. Alain F. Zuur, Elena N. Ieno, Erik H.W.G. Meesters “A Beginner's Guide to R (Use R)”, Springer.
Online Resources:
1. https://onlinecourses.nptel.ac.in/noc19_ma33/preview
2. https://home.iitk.ac.in/~shalab/sprs.htm
Online Resources:
1. http://www.ipindia.nic.in/
2. http://cipam.gov.in/
Suggested Readings:
1. Christian Heumann, Michael Schomaker and Shalabh, “Introduction to Statistics and Data Analysis -
With Exercises, Solutions and Applications in R”, Springer.
2. Pierre Lafaye de Micheaux, Remy Drouilhet, Benoit Liquet, “The R Software-Fundamentals of
Programming and Statistical Analysis”, Springer.
3. Alain F. Zuur, Elena N. Ieno, Erik H.W.G. Meesters, “A Beginner's Guide to R”, Springer.
Online Resources:
1. https://onlinecourses.nptel.ac.in/noc19_ma33/preview
2. https://home.iitk.ac.in/~shalab/sprs.htm