0% found this document useful (0 votes)
3 views19 pages

R22 IV Year Syllabus

The document outlines the syllabus for the IV Year I Semester of the CSE - Cyber Security program at St. Ann's College of Engineering and Technology, covering various topics such as IoT Cloud Processing, Information Theory, Steganography, Blockchain Technology, Data Privacy, Cyber Laws, and Ethical Hacking. Each unit includes key concepts, methodologies, and relevant textbooks and references. The curriculum is designed to equip students with essential knowledge and skills in cybersecurity and related fields.

Uploaded by

anitha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views19 pages

R22 IV Year Syllabus

The document outlines the syllabus for the IV Year I Semester of the CSE - Cyber Security program at St. Ann's College of Engineering and Technology, covering various topics such as IoT Cloud Processing, Information Theory, Steganography, Blockchain Technology, Data Privacy, Cyber Laws, and Ethical Hacking. Each unit includes key concepts, methodologies, and relevant textbooks and references. The curriculum is designed to equip students with essential knowledge and skills in cybersecurity and related fields.

Uploaded by

anitha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

R22

ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY


(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3

IV Year I Semester DEPARTMENT OF CSE – CYBER SECURITY

IoT Cloud Processing and Analytics

UNIT-I: INTRODUTION TO INTERNET OF THINGS : The Internet of Things- An Overview of


Internet of things, Internet of Things Technology, behind IoTsSources of the IoTs, Examples
OF IoTs, Design Principles For Connected Devices, Internet connectivity, Application Layer
Protocols- HTTP, HTTPS, FTP.

UNIT-II: LAYER DESIGNING AND AFFORDABILITY : Business Models for Business Processes in
the Internet of Things, IoT/M2M systems LAYERS AND designs standardizations, Modified
OSI Stack for the IoT/M2M Systems ,ETSI M2M domains and High-levelcapabilities,
Communication Technologies, Data Enrichment and Consolidation and Device Management
Gateway Ease of designing and affordability.

UNIT-III: PROTOCOLS : Design Principles for the Web Connectivity for connected-Devices,
Web Communication protocols for Connected Devices, Message Communication protocols
for Connected Devices, Web Connectivity for connected-Devices.

UNIT-IV: DATA ANALYTICS : Data Acquiring, Organizing and Analytics in IoT/M2M,


Applications/Services/Business Processes, IOT/M2M Data Acquiring and Storage, Business
Models for Business Processes in the Internet Of Things, Organizing Data, Transactions,
Business Processes, Integration and Enterprise Systems.

UNIT-V: DATA STORAGE AND APPLICATIONS : Data Collection, Storage and Computing Using
a Cloud Platform for IoT/M2M Applications/Services, Data Collection, Storage and
Computing Using cloud platform Everything as a service and Cloud Service Models, IOT
cloud-based services using the Xively (Pachube/COSM), Nimbits and other platforms Sensor,
Participatory Sensing, Actuator, Radio Frequency Identification, and Wireless, Sensor
Network Technology, Sensors Technology, Sensing the World

TEXT BOOKS:

1. Internet of Things: Architecture, Design Principles And Applications, Rajkamal, McGraw


Hill Higher Education

2. Internet of Things, A.Bahgya and V.Madisetti, University Press, 2015

REFERENCE BOOKS:

1. Designing the Internet of Things, Adrian McEwen and Hakim Cassimally, Wiley

2. Getting Started with the Internet of Things, Cuno Pfister , Oreilly

1
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3

IV Year I Semester DEPARTMENT OF CSE – CYBER SECURITY

Information Theory for Cyber Security

UNIT – I:

Shannon’s foundation of Information theory, Random variables, Probability distribution


factors, Uncertainty/entropy information measures, Leakage, Quantifying Leakage and
Partitions, Lower bounds on key size: secrecy, authentication and secret sharing. Provable
security, computationally-secure, symmetric cipher.

UNIT – II:

Secrecy, Authentication, Secret sharing, Optimistic results on perfect secrecy, Secret key
agreement, Unconditional Security, Quantum Cryptography, Randomized Ciphers, Types of
codes: block codes, Hamming and Lee metrics, description of linear block codes, parity
check Codes, cyclic code, Masking techniques.

UNIT – III:

Information-theoretic security and cryptograph, basic introduction to Diffie-Hellman,


AES, and side-channel attacks.

UNIT – IV:

Secrecy metrics: strong, weak, semantic security, partial secrecy, Secure source coding:
rate-distortion theory for secrecy systems, side information at receivers, Differential

privacy, Distributed channel synthesis.

UNIT – V:

Digital and network forensics, Public Key Infrastructure, Light weight cryptography, Elliptic
Curve Cryptography and applications.

TEXT BOOKS:

1. Information Theory and Coding, Muralidhar Kulkarni, K S Shivaprakasha, John Wiley &
Sons.
2. Communication Systems: Analog and digital, Singh and Sapre, Tata McGraw Hill.
3. Fundamentals in information theory and coding, Monica Borda, Springer. r.REFERENCE
REFERENCE BOOKS:
1. Information Theory, Coding and Cryptography R Bose.
2. Information Security & Cyber Laws, Gupta & Gupta, Khanna Publishing House.
3. Multi-media System Design, Prabhat K Andleigh and Kiran Thakra

2
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3

IV Year I Semester DEPARTMENT OF CSE – CYBER SECURITY

Steganography and Digital Watermarking

UNIT – I:

Steganography: Overview, History, Methods for hiding (text, images, audio, video, speech
etc.). Steganalysis: Active and Malicious Attackers, Active and passive Steganalysis.

UNIT – II:

Frameworks for secret communication (pure steganography, secret key, public key
steganography), Steganography algorithms (adaptive and non-adaptive).

UNIT – III:

Steganography techniques: Substitution systems, Spatial Domain, transform domain


techniques, Spread spectrum, Statistical steganography. Detection, Distortion, Techniques:
LSB Embedding, LSB Steganalysis using primary sets.

UNIT – IV:

Digital Watermarking: Introduction, Difference between Watermarking and Steganography,


Classification (Characteristics and Applications), types and techniques (Spatial-domain,
Frequency-domain, and Vector quantizationbased watermarking), Watermark security &
authentication.

UNIT – V:

Recent trends in Steganography and digital watermarking techniques. Case study of LSB
Embedding, LSB Steganalysis using primary sets.

TEXT BOOKS:

1. Peter Wayner, “Disappearing Cryptography – Information Hiding: Steganography &


Watermarking”, Morgan Kaufmann Publishers, New York, 2002.
2. Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, Jessica Fridrich, TonKalker, “Digital
Watermarking and Steganography”, Margan Kaufmann Publishers, New York, 2008.

REFERENCE BOOKS:

1. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures by


Neil F. Johnson, Zoran Duric, Sushil Jajodia.
2. Information Hiding Techniques for Steganography and Digital Watermarking by Stefan
Katzenbeisser, Fabien A. P. Petitcolas.

3
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3

IV Year I Semester DEPARTMENT OF CSE – CYBER SECURITY

Block Chain Technology

UNIT – I: Block chain Fundamentals: Tracing Block chain’s Origin, Revolutionizing the
Traditional Business Network, How Blockchain Works, What Makes a Blockchain Suitable for
Business? Introduction to Cryptography: Cryptographic Hash Functions, SHA256, Hash
Pointers and Data Structures, Merkle tree.

UNIT – II: Digital Signatures: Elliptic Curve Digital Signature Algorithm (ECDSA), Public Keys
as Identities, A Simple Crypto currency.

UNIT – III: Centralization vs. Decentralization, Distributed Consensus, Consensus without


identity using a block chain, Incentives and proof of work. Mechanics of Bit coin: Bit coin
transactions, Bit coin Scripts, Applications of Bit coin scripts, Bit coin blocks, The Bit coin
network.

UNIT – IV: Storage of and Usage of Bit coins: Simple Local Storage, Hot and Cold Storage,
Splitting and Sharing Keys, Online Wallets and Exchanges, Payment Services, Transaction
Fees, Currency Exchange Markets.

UNIT – V: Bit coin Mining: The Task of Bit coin miners, Mining Hardware, Mining pools,
Mining incentives and strategies. Bit coin and Anonymity: Anonymity Basics, Mixing, Zero
coin and Zero cash

TEXT BOOKS:

1. BlockChain for dummies, Manav Gupta, Second IBM Limited Edition, 2018, John Wiley &
Sons.

2. Bitcoin and Cryptocurrency Technologies, Arvind Narayanan, Joseph Bonneau, Edward


Felten, Andrew Miller and Steven Goldfeder, 2016.

REFERENCE BOOKS:

1. Blockchain: Blueprint for a New Economy,Melanie Swan, First edition, 2015, O'Reilly
Media.

2. Bitcoin: Programming the Open Blockchain, Andreas M. Antonopoulos, Mastering, Second


edition, 2017, O'Reilly Media.

4
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3

IV Year I Semester DEPARTMENT OF CSE – CYBER SECURITY

Data Privacy

UNIT – I:

Introduction to Security: Cryptography, Web security, Hardware and software vulnerabilities

UNIT – II:

Data Privacy: Data localization issues, Managing personally identifiable or sensitive


information, Hippocratic databases, Differential privacy, Privacy preserving data analysis

UNIT – III:

Basic concepts and definitions, objectives, disclosure control and inference of entities,
models of protection like null map, k-map, wrong-map

UNIT – IV:

Data Explosion: Availability vs. Storage vs. Collection trade-off, barriers to distribution,
mathematical models for sharing practices and policies for computing privacy and risk
measurements

UNIT – V:

Demographics and Uniqueness, data linking, data profiling, data privacy attacks

TEXT BOOKS:

1. Stallings, W. Cryptography and Network Security. Pearson Education India.

2. Giannotti, F., &Pedreschi, D. (Eds.). Mobility, data mining and privacy: Geographic
knowledge discovery. Springer Science & Business Media.

3. Bygrave, L. A. Data privacy law: an international perspective (Vol. 63). Oxford: Oxford
University Press.

4. Scoble, R., Israel, S., &Benioff, M. R.. Age of context: Mobile, sensors, data and the future
of privacy. USA: Patrick Brewster Press.

5. Bendat, J. S., &Piersol, A. G. Random data analysis and measurement procedures.

5
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3

IV Year I Semester DEPARTMENT OF CSE – CYBER SECURITY

Cyber Laws and Security Policies

UNIT- I : Introduction to Computer Security: Definition, Threats to security, Government


requirements, Information Protection and Access Controls, Computer security efforts,
Standards, Computer Security mandates and legislation, Privacy considerations,
International security activity.

UNIT-II: Secure System Planning and administration, Introduction to the orange book,
Security policy requirements, accountability, assurance and documentation requirements,
Network Security, The Red book and Government network evaluations.

UNIT-III: Information security policies and procedures: Corporate policies- Tier 1, Tier 2 and
Tier3 policies – process management-planning and preparation-developing policies-asset
classification policy developing standards.

UNIT- IV: Information security: fundamentals-Employee responsibilities- information


classification Information handling- Tools of information security- Information processing-
secure program administration.

UNIT-V: Organizational and Human Security: Adoption of Information Security


Management Standards, Human Factors in Security- Role of information security
professionals.

TEXT BOOK:

1. Debby Russell and Sr. G. T Gangemi, “Computer Security Basics (Paperback)”, 2nd Edition,
O’ Reilly Media, 2006.

REFERENCES:

1. Thomas R. Peltier, “Information Security policies and procedures: A Practitioner’s


Reference”, 2nd Edition Prentice Hall, 2004.

2. Kenneth J. Knapp, “Cyber Security and Global Information Assurance: Threat Analysis and
Response Solutions”, IGI Global, 2009.

3. Thomas R Peltier, Justin Peltier and John blackley, ”Information Security Fundamentals”,
2nd Edition, Prentice Hall, 1996

4. Jonathan Rosenoer, “Cyber law: the Law of the Internet”, Springer-verlag, 1997

5. James Graham, “Cyber Security Essentials” Averbach Publication T & F Group

6
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3

IV Year I Semester DEPARTMENT OF CSE – CYBER SECURITY

Ethical Hacking

UNIT I: Introduction To Hacking :Introduction to Hacking – Important Terminologies –


Penetration Test – Vulnerability Assessments versus Penetration Test – Pre-Engagement –
Rules of Engagement -Penetration Testing Methodologies – OSSTMM – NIST – OWASP –
Categories of Penetration Test – Types of Penetration Tests – Vulnerability Assessment
Summary -Reports.

UNIT II: The Technical Foundations of Hacking: The Attacker’s Process, The Ethical Hacker’s
Process, Security and the Stack. Foot printing and scanning : Information Gathering,
Determining the Network Range, Identifying Active Machines, Finding Open Ports and
Access Points, OS Fingerprinting Services, Mapping the Network Attack Surface

UNIT III: Vulnerability Data Resources – Exploit Databases – Network Sniffing – Types of
Sniffing -Promiscuous versus Nonpromiscuous Mode – MITM Attacks – ARP Attacks – Denial
of Service Attacks -Hijacking Session with MITM Attack – SSL Strip: Stripping HTTPS Traffic -
DNS Spoofing – ARP Spoofing Attack Manipulating the DNS Records – DHCP Spoofing -
Remote Exploitation – Attacking Network Remote Services – Overview of Brute Force
Attacks – Traditional Brute Force – Attacking SMTP – Attacking SQL Servers – Testing for
Weak Authentication.

UNIT IV: Malware Threats: Viruses and Worms, Trojans, Covert Communication, Keystroke
Logging and Spyware, Malware Counter measures. Sniffers, Session Hijacking and Denial of
Service: Sniffers, Session Hijacking, Denial of Service and Distributed Denial of Service.

UNIT V: Wireless Hacking – Introducing Aircrack- Cracking the WEP – Cracking a WPA/WPA2
Wireless Network Using Aircrack-ng – Evil Twin Attack – Causing Denial of Service on the
Original AP – Web Hacking – Attacking the Authentication – Brute Force and Dictionary
Attacks – Types of Authentication – Log-In Protection Mechanisms – Captcha Validation
Flaw – Captcha RESET Flaw – Manipulating User-Agents to Bypass Captcha and Other
Protection – Authentication Bypass Attacks – Testing for the Vulnerability – Automating It
with Burp Suite – Session Attacks – SQL Injection Attacks – XSS (Cross-Site Scripting) -Types
of Cross-Site Scripting – Cross-Site Request Forgery (CSRF) – SSRF Attacks.

TEXT BOOKS:

1. Rafay Baloch, “Ethical Hacking and Penetration Testing Guide”, CRC Press, 2014.

2. Certified Ethical Hacker, Version 9, Second Edition, Michael Gregg, Pearson IT


Certification

3. Hacking the Hacker, Roger Grimes, Wiley

7
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3

IV Year I Semester DEPARTMENT OF CSE – CYBER SECURITY

REFERENCE BOOKS:

1. The Unofficial Guide to Ethical Hacking, Ankit Fadia, Premier Press

2. Kevin Beaver, “Ethical Hacking for Dummies”, Sixth Edition, Wiley, 2018.

3. Jon Erickson , “Hacking: The Art of Exploitation”, Second Edition, Rogunix, 2007.

8
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3

IV Year I Semester DEPARTMENT OF CSE – CYBER SECURITY

ntrusion Detection and Prevention System

UNIT I: History of Intrusion detection, Audit, Concept and definition , Internal and external
threats to data, attacks, Need and types of IDS, Information sources Host based information
sources, Network based information sources.

UNIT II: Intrusion Prevention Systems, Network IDs protocol based IDs ,Hybrid IDs, Analysis
schemes, thinking about intrusion. A model for intrusion analysis , techniques Responses
requirement of responses, types of responses mapping responses to policy Vulnerability
analysis, credential analysis non credential analysis.

UNIT III: Introduction to Snort, Snort Installation Scenarios, Installing Snort, Running Snort
on Multiple Network Interfaces, Snort Command Line Options. Step-By-Step Procedure to
Compile and Install Snort Location of Snort Files, Snort Modes Snort Alert Modes.

UNIT IV: Working with Snort Rules, Rule Headers, Rule Options, The Snort Configuration File
etc. Plug-in, Preprocessors and Output Modules, Using Snort with MySQL

UNIT V: Using ACID and Snort Snarf with Snort, Agent development for intrusion detection,
Architecture models of IDs and IPs.

Text Books:

1. Rafeeq Rehman : “ Intrusion Detection with SNORT, Apache, MySQL, PHP and ACID,” 1st
Edition, Prentice Hall , 2003.

Reference Books:

1. Christopher Kruegel, Fredrik Valeur, Giovanni Vigna: “Intrusion Detection and Correlation
Challenges and Solutions”, 1st Edition, Springer, 2005.

2. Carl Endorf, Eugene Schultz and Jim Mellander “ Intrusion Detection & Prevention”, 1st
Edition, Tata McGraw-Hill, 2004.

3. Stephen Northcutt, Judy Novak : “Network Intrusion Detection”, 3rd Edition, New Riders
Publishing, 2002.

4. T. Fahringer, R. Prodan, “A Text book on Grid Application Development and Computing


Environment”. 6th Edition, Khanna Publihsers, 2012.

9
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3

IV Year I Semester DEPARTMENT OF CSE – CYBER SECURITY

DATA SECURITY AND PRIVACY

UNIT–I: Introduction to Security and Ciphers: Security goals, Cryptographic Attacks, Services
and Mechanism, Techniques. Traditional Symmetric Key Ciphers: Introduction, Substitution
Ciphers, Transposition Ciphers, Stream and Block Ciphers. Introduction to Modern
Symmetric-Key Ciphers: Modern Block Ciphers, Modern Stream Ciphers.

UNIT–II: Symmetric and Asymmetric encryption algorithms: Data Encryption Standard (DES):
Introduction, DES Structure, DES Analysis, Multiple DES, Security of DES. Advanced
Encryption Standard (AES): Introduction, Transformations, Key Expansion, AES Ciphers,
Analysis of AES. Asymmetric-Key Cryptography: Introduction, RSA Cryptosystem, Rabin
Cryptosystem, Elgamal Cryptosystem, Elliptic Curve Crypto systems. MODULE III: Hash
Funcstions.

UNIT–III: Hash Functions, Digital Signature and Data Hiding: Cryptographic Hash Functions:
Introduction, Iterated Hash function, SHA-512, WHIRLPOOL. Digital Signature: Comparison,
Process, Services, Attacks on Digital Signature, Digital Signature Standard. Data Hiding in
Text: Basic Features, Applications of Data Hiding, Watermarking, Intuitive Methods, Simple
Digital Methods, Data Hiding in Text, Innocuous Text, Mimic Functions.

UNIT–IV: Data Hiding in Images: LSB Encoding, BPCS Steganography, Lossless Data Hiding,
Spread Spectrum Steganography, Data Hiding by Quantization, Patchwork , Signature
Casting in Images, Transform Domain Methods, Robust Data Hiding in JPEG Images, Robust
Frequency Domain Watermarking, Detecting Malicious Tampering.

UNIT–V: Privacy, Legal and Ethical Issues: Privacy: Privacy Concepts, Privacy Principles and
Policies, Authentication and Privacy, Data Mining, Privacy on the Web, E-Mail Security,
Impacts on Emerging Technologies. Legal and Ethical Issues in Computer Security: Protecting
Programs and Data, Information and the Law, Rights of Employees and employers, Redress
for Software Failures, Computer Crime, Ethical Issues in Computer Security.

TEXT BOOKS:

1. Cryptography and Network Security by Behrouz A. Forouzan, Dedeep Mukhopadhyay,


TMH, 2nd edition, 2013.

2. Data Privacy and Security by Salomon, David, Springer, 2003.

3. Security in Computing by Charles Pfleeger, Shari Lawrence Pfleeger, 5th Edition, PHI,2015.

10
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3

IV Year I Semester DEPARTMENT OF CSE – CYBER SECURITY

REFERENCE BOOKS:

1. Information Security: Principles and Practice by Mark Stamp, Wiley Inter Science,2011.

2. Computer Security: Art and Science by Matt Bishop, First Edition, Addison Wesley,2002.

3. Cryptography and Network Security by William Stallings, Pearson Education,7th


edition,2017.

11
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3

IV Year I Semester DEPARTMENT OF CSE – CYBER SECURITY

Deep Learning

UNIT-I: Artificial Neural Networks Introduction, Basic models of ANN, important


terminologies, Supervised Learning Networks, Perceptron Networks, Adaptive Linear
Neuron, Back-propagation Network. Associative Memory Networks. Training Algorithms for
pattern association, BAM and Hopfield Networks.

UNIT-II: Unsupervised Learning Network- Introduction, Fixed Weight Competitive Nets,


Maxnet, Hamming Network, Kohonen Self-Organizing Feature Maps, Learning Vector
Quantization, Counter Propagation Networks, Adaptive Resonance Theory Networks.
Special Networks-Introduction to various networks.

UNIT-III: Introduction to Deep Learning, Historical Trends in Deep learning, Deep Feed -
forward networks, Gradient-Based learning, Hidden Units, Architecture Design, Back-
Propagation and Other Differentiation Algorithms

UNIT–IV: Regularization for Deep Learning: Parameter norm Penalties, Norm Penalties as
Constrained Optimization, Regularization and Under-Constrained Problems, Dataset
Augmentation, Noise Robustness, Semi-Supervised learning, Multi-task learning, Early
Stopping, Parameter Typing and Parameter Sharing, Sparse Representations, Bagging and
other Ensemble Methods, Dropout, Adversarial Training, Tangent Distance, tangent Prop
and Manifold, Tangent Classifier.

UNIT–V: Optimization for Train Deep Models: Challenges in Neural Network Optimization,
Basic Algorithms, Parameter Initialization Strategies, Algorithms with Adaptive Learning
Rates, Approximate SecondOrder Methods, Optimization Strategies and Meta-Algorithms
Applications: Large-Scale Deep Learning, Computer Vision, Speech Recognition, Natural
Language Processing.

TEXT BOOKS:

1. Deep Learning: An MIT Press Book By Ian Goodfellow and Yoshua Bengio and Aaron
Courville.
2. Neural Networks and Learning Machines, Simon Haykin, 3rd Edition, Pearson
Prentice Hall.

12
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3

IV Year I Semester DEPARTMENT OF CSE – CYBER SECURITY

Security Incident and Response Management (SOC)

UNIT-I: Real-World Incidents: Factors Affecting Response, International Crime, Introduction


to the Incident Response Process, Preparing for Incident Response: Overview of Pre-incident
Preparation, Identifying Risk, Preparing Individual Hosts , Preparing a Network , Establishing
Appropriate Policies and Procedures, Creating a Response Toolkit , Establishing an Incident
Response Team.

UNIT-II: Data Collection: Live Data Collection from Windows Systems, Creating a Response
Toolkit, Storing Information Obtained during the Initial Response, Obtaining Volatile Data,
Performing an In-Depth Live Response, Is Forensic Duplication Necessary? Live Data
Collection from Unix Systems: Creating a Response Toolkit , Storing Information Obtained
During the Initial Response, Obtaining Volatile Data Prior to Forensic Duplication.

UNIT-III: Forensic Duplication: Forensic Duplicates As Admissible Evidence, Forensic


Duplication Tool Requirements, Creating a Forensic Duplicate of a Hard Drive , Creating a
Qualified Forensic Duplicate of a Hard Drive. Collecting Network-based Evidence: What is
Network-based Evidence, What Are the Goals of Network Monitoring? , Types of Network
Monitoring, Setting Up a Network Monitoring System, Performing a Trap-and-Trace.

UNIT-IV: Evidence Handling: What Is Evidence?, The Challenges of Evidence Handling,


Overview of Evidence-Handling Procedures, Evidence System Description, Digital Photos,
Evidence Tags, Evidence Labels, Evidence Storage, The Evidence Log, Working Copies,
Evidence Backups, Evidence Disposition, Evidence Custodian Audits.

UNIT-V: Data Analysis: Computer System Storage Fundamentals, Hard Drives and Interfaces,
Preparation of Hard Drive Media, Introduction to File Systems and Storage Layers. Data
Analysis Techniques: Preparation for Forensic Analysis, Restoring a Forensic Duplicate,
Preparing a Forensic Duplication for Analysis In Linux, Reviewing Image Files with Forensic
Suites.

TEXT BOOKS:

1. Incident Response and computer forensics, Kevin Mandia, Chris Prosise, Tata McGrawHill,
2006.

2. Computer Forensics, Computer Crime Investigation, John R. Vacca, Firewall Media, New
Delhi.

3. Computer Forensics and Investigations, Nelson, Phillips Enfinger, Steuart, cengage


Learning.

13
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3

IV Year I Semester DEPARTMENT OF CSE – CYBER SECURITY

REFERENCE BOOKS:

1. Real Digital Forensics, Keith J. Jones, Richard Bejtiich, Curtis W. Rose, Addison- Wesley
Pearson Education.

2. Forensic Compiling, A Tractitioneris Guide by Tony Sammes and Brian Jenkinson, Springer

International Edition.

14
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3

IV Year I Semester DEPARTMENT OF CSE – CYBER SECURITY

Data Science

UNIT I: Introduction, The Ascendance of Data, Motivating Hypothetical: Data Science,


Finding Key Connectors, The Zen of Python, Getting Python, Virtual Environments,
Whitespace Formatting, Modules, Functions, Strings, Exceptions, Lists, Tuples, Dictionaries
default dict, Counters, Sets, Control Flow, Truthiness, Sorting, List Comprehensions,
Automated Testing and assert, Object Oriented Programming, Iterables and Generators,
Randomness, Regular Expressions, Functional Programming, zip and Argument Unpacking,
args and kwargs, Type Annotations, How to Write Type Annotations.

UNIT II: Visualizing Data: mat plot lib, Bar Charts, Line Charts, Scatter plots. Linear Algebra:
Vectors, Matrices, Statistics: Describing a Single Set of Data, Correlation, Simpson’s Paradox,
Some Other Correlation Caveats, Correlation and Causation. Gradient Descent: The Idea
Behind Gradient Descent, Estimating the Gradient, Using the Gradient, Choosing the Right
Step Size, Using Gradient Descent to Fit Models, Minibatch and Stochastic Gradient Descent.

UNIT III: Getting Data: stdin and stdout, Reading Files, Scraping the Web, Using APIs,
Working with Data: Exploring Your Data Using Named Tuples, Data classes, Cleaning and
Munging, Manipulating Data, Rescaling, Dimensionality Reduction. Probability: Dependence
and Independence, Conditional Probability, Bayes’s Theorem, Random Variables,
Continuous Distributions, The Normal Distribution, The Central Limit Theorem

UNIT IV: Machine Learning: Modeling, Over fitting and Under fitting, Correctness, The Bias-
Variance Tradeoff, Feature Extraction and Selection, k-Nearest Neighbors, Naive Bayes,
Simple Linear Regression, Multiple Regression, Digression, Logistic Regression

UNIT V: Clustering: The Idea, The Model, Choosing k, Bottom-Up Hierarchical Clustering.
Recommender Systems: Manual Curation, Recommending What’s Popular, User-Based
Collaborative Filtering, Item-Based Collaborative Filtering, Matrix Factorization Data Ethics,
Building Bad Data Products, Trading Off Accuracy and Fairness, Collaboration,
Interpretability, Recommendations, Biased Data, Data Protection IPython, Mathematics,
NumPy, pandas, scikit-learn, Visualization R

TEXT BOOKS:

1. Joel Grus, “Data Science From Scratch”, OReilly.

2. Allen B.Downey, “Think Stats”, OReilly.

15
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3

IV Year I Semester DEPARTMENT OF CSE – CYBER SECURITY

REFERENE BOOKS:

1) Doing Data Science: Straight Talk From The Frontline, 1 st Edition, Cathy O’Neil and
Rachel Schutt, O’Reilly, 2013

2) Mining of Massive Datasets, 2 nd Edition, Jure Leskovek, Anand Rajaraman and Jeffrey
Ullman, v2.1, Cambridge University Press, 2014

3) “The Art of Data Science”, 1 st Edition, Roger D. Peng and Elizabeth matsui, Lean
Publications, 2015

4) “Algorithms for Data Science”, 1 st Edition, Steele, Brian, Chandler, John, Reddy, Swarna,
springers Publications, 2016

16
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3

IV Year I Semester DEPARTMENT OF CSE – CYBER SECURITY

Mobile and Wireless Security

UNIT – I:
Mobile Networks: Cellular Wireless Networks. GSM: Architecture, Protocols, Connection
Establishment, Frequency Allocation, Routing, Mobility Management and GPRS.

UNIT – II:
Mobile Network Security: Mobile IP, DHCP, AdHoc, Proactive and Reactive Routing Protocols,
Multicast Routing. Mobile routing protocols: DSR, AODV, Reactive routing, Location aided routing.

UNIT – III:
Wireless Networks: Issues and challenges of Wireless networks: Location management, Resource
management, Routing. Wireless Media Access Techniques : ALOHA , CSMA , Wireless LAN , MAN
,IEEE 802.11 (a,b,e,f,g,h,i), Bluetooth, WiFi, WiMAX Wireless routing protocols : Mobile IP, IPv4, IPv6.

UNIT – IV:
Wireless Network Security: Network Packet analysis: Packet analysis and Packet sniffing in Hub and
Switched environment, Analysis of packet for security i.e. Sync Scan. Technique of hacking wireless
network and its counter measures.

UNIT – V:
E-Commerce & M-Commerce : An overview of E- Commerce- Operating System Services, Developer
Services, Data Services, Application Services, Store Services, Client Services. Electronic Payment
Systems: Overview of Electronic Payment Systems, Cybercash. Smart Card , Electronic Banking,
Electronic Fund Transfers, Session Management. M-commerce trust, security, and payment: Trust in
Mcommerce, Encryption, Authentication, confidentiality, integrity, and non-repudiation.

TEXT BOOKS:

1. Stalling W., “ Network Security Essentials”, Pearson


2. Practical Packet Analysis: Using Wireshark to Solve Real-Word Network problems by
3. Chris Sanders Jochen Schiller, “Mobile Communications”, PHI.
4. Uwe Hansmann, Lothar Merk, Martin S. Nicklons and Thomas Stober, Principles of
Mobile Computing, Springer, New York, 2003
5. Frank Adelstein, Sandeep KS Gupta, Golden Richard, Fundamentals of Mobile and
Pervasive Computing,McGraw-Hill

17
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3

IV Year I Semester DEPARTMENT OF CSE – CYBER SECURITY

Edge Analytics

UNIT – I: Introduction to Edge Analytics

What is edge analytics, Applying and comparing architectures, Key benefits of edge
analytics, Edge analytics architectures, Using edge analytics in the real world.

UNIT – II: Edge Components

Basic edge analytics components, Connecting a sensor to the ESP-12F microcontroller, KOM-
MICS smart factory platform, Communications protocols used in edge analytics, Wi-Fi
communication for edge analytics, Bluetooth for edge analytics communication, Cellular
technologies for edge analytics communication, Long-distance communication using LoRa
and Signfox for edge analytics.

UNIT – III: Azure Cloud

Working with Microsoft Azure IoT Hub, Cloud Service providers, Microsoft Azure, Exploring
the Azure portal, Azure ioT Hub, Using the Raspberry Pi with Azure IoT edge, Connecting our
Raspberry Pi edge device, adding a simulated temperature sensor to our edge device.

UNIT – IV: Edge Analytics

Using Micro python for Edge Analytics, Understanding Micro python, Exploring the
hardware that runs Micro Python, Using Micro Python for an edge analytics application,
Using edge intelligence with microcontrollers, Azure Machine Learning designer, Azure IoT
edge custom vision.

UNIT – V: Applications

Designing a Smart Doorbell with Visual Recognition setting up the environment, Writing the
edge code, creating the Node-RED dashboard, Types of attacks against our edge analytics
applications, Protecting our edge analytics applications

TEXT BOOKS:

1. Hands-On Edge Analytics with Azure IoT: Design and develop IoT applications with edge
analytical solutions including Azure IoT Edge by Colin Dow

REFERENCE BOOKS:

1. Learn Edge Analytics - Fundamentals of Edge Analytics: Automated analytics at source

using MicrosoftAzure by Ashish Mahajan

18
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3

IV Year I Semester DEPARTMENT OF CSE – CYBER SECURITY

Web & Database Security

UNIT – I:

The Web Security, The Web Security Problem, Risk Analysis and Best Practices Cryptography
and the Web: Cryptography and Web Security, Working Cryptographic Systems and
Protocols, Legal Restrictions on Cryptography, Digital Identification

UNIT – II:

The Web’s War on Your Privacy, Privacy-Protecting Techniques, Backups and Antitheft, Web
Server Security, Physical Security for Servers, Host Security for Servers, Securing Web
Applications

UNIT – III:

Database Security: Recent Advances in Access Control, Access Control Models for XML,
Database Issues in Trust Management and Trust Negotiation, Security in Data Warehouses
and OLAP Systems

UNIT – IV:

Security Re-engineering for Databases: Concepts and Techniques, Database Watermarking


for Copyright Protection, Trustworthy Records Retention, Damage Quarantine and Recovery
in Data Processing Systems, Hippocratic Databases: Current Capabilities.

UNIT – V:

Future Trends Privacy in Database Publishing: A Bayesian Perspective, Privacy-enhanced


Location based Access Control, Efficiently Enforcing the Security and Privacy Policies in a
Mobile Environment

TEXT BOOKS:

1. Web Security, Privacy and Commerce Simson GArfinkel, Gene Spafford, O’Reilly.
2. Handbook on Database security applications and trends Michael Gertz, Sushil Jajodia.

REFERENCE BOOKS:

1. Andrew Hoffman, Web Application Security: Exploitation and Countermeasures for


Modern Web Applications, O’reilly.
2. Jonathan LeBlanc Tim Messerschmidt, Identity and Data Security for Web Development
– Best Practices, O’reilly.
3. McDonald Malcolm, Web Security For Developers, No Starch Press, US.

19

You might also like