R22 IV Year Syllabus
R22 IV Year Syllabus
UNIT-II: LAYER DESIGNING AND AFFORDABILITY : Business Models for Business Processes in
the Internet of Things, IoT/M2M systems LAYERS AND designs standardizations, Modified
OSI Stack for the IoT/M2M Systems ,ETSI M2M domains and High-levelcapabilities,
Communication Technologies, Data Enrichment and Consolidation and Device Management
Gateway Ease of designing and affordability.
UNIT-III: PROTOCOLS : Design Principles for the Web Connectivity for connected-Devices,
Web Communication protocols for Connected Devices, Message Communication protocols
for Connected Devices, Web Connectivity for connected-Devices.
UNIT-V: DATA STORAGE AND APPLICATIONS : Data Collection, Storage and Computing Using
a Cloud Platform for IoT/M2M Applications/Services, Data Collection, Storage and
Computing Using cloud platform Everything as a service and Cloud Service Models, IOT
cloud-based services using the Xively (Pachube/COSM), Nimbits and other platforms Sensor,
Participatory Sensing, Actuator, Radio Frequency Identification, and Wireless, Sensor
Network Technology, Sensors Technology, Sensing the World
TEXT BOOKS:
REFERENCE BOOKS:
1. Designing the Internet of Things, Adrian McEwen and Hakim Cassimally, Wiley
1
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3
UNIT – I:
UNIT – II:
Secrecy, Authentication, Secret sharing, Optimistic results on perfect secrecy, Secret key
agreement, Unconditional Security, Quantum Cryptography, Randomized Ciphers, Types of
codes: block codes, Hamming and Lee metrics, description of linear block codes, parity
check Codes, cyclic code, Masking techniques.
UNIT – III:
UNIT – IV:
Secrecy metrics: strong, weak, semantic security, partial secrecy, Secure source coding:
rate-distortion theory for secrecy systems, side information at receivers, Differential
UNIT – V:
Digital and network forensics, Public Key Infrastructure, Light weight cryptography, Elliptic
Curve Cryptography and applications.
TEXT BOOKS:
1. Information Theory and Coding, Muralidhar Kulkarni, K S Shivaprakasha, John Wiley &
Sons.
2. Communication Systems: Analog and digital, Singh and Sapre, Tata McGraw Hill.
3. Fundamentals in information theory and coding, Monica Borda, Springer. r.REFERENCE
REFERENCE BOOKS:
1. Information Theory, Coding and Cryptography R Bose.
2. Information Security & Cyber Laws, Gupta & Gupta, Khanna Publishing House.
3. Multi-media System Design, Prabhat K Andleigh and Kiran Thakra
2
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3
UNIT – I:
Steganography: Overview, History, Methods for hiding (text, images, audio, video, speech
etc.). Steganalysis: Active and Malicious Attackers, Active and passive Steganalysis.
UNIT – II:
Frameworks for secret communication (pure steganography, secret key, public key
steganography), Steganography algorithms (adaptive and non-adaptive).
UNIT – III:
UNIT – IV:
UNIT – V:
Recent trends in Steganography and digital watermarking techniques. Case study of LSB
Embedding, LSB Steganalysis using primary sets.
TEXT BOOKS:
REFERENCE BOOKS:
3
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3
UNIT – I: Block chain Fundamentals: Tracing Block chain’s Origin, Revolutionizing the
Traditional Business Network, How Blockchain Works, What Makes a Blockchain Suitable for
Business? Introduction to Cryptography: Cryptographic Hash Functions, SHA256, Hash
Pointers and Data Structures, Merkle tree.
UNIT – II: Digital Signatures: Elliptic Curve Digital Signature Algorithm (ECDSA), Public Keys
as Identities, A Simple Crypto currency.
UNIT – IV: Storage of and Usage of Bit coins: Simple Local Storage, Hot and Cold Storage,
Splitting and Sharing Keys, Online Wallets and Exchanges, Payment Services, Transaction
Fees, Currency Exchange Markets.
UNIT – V: Bit coin Mining: The Task of Bit coin miners, Mining Hardware, Mining pools,
Mining incentives and strategies. Bit coin and Anonymity: Anonymity Basics, Mixing, Zero
coin and Zero cash
TEXT BOOKS:
1. BlockChain for dummies, Manav Gupta, Second IBM Limited Edition, 2018, John Wiley &
Sons.
REFERENCE BOOKS:
1. Blockchain: Blueprint for a New Economy,Melanie Swan, First edition, 2015, O'Reilly
Media.
4
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3
Data Privacy
UNIT – I:
UNIT – II:
UNIT – III:
Basic concepts and definitions, objectives, disclosure control and inference of entities,
models of protection like null map, k-map, wrong-map
UNIT – IV:
Data Explosion: Availability vs. Storage vs. Collection trade-off, barriers to distribution,
mathematical models for sharing practices and policies for computing privacy and risk
measurements
UNIT – V:
Demographics and Uniqueness, data linking, data profiling, data privacy attacks
TEXT BOOKS:
2. Giannotti, F., &Pedreschi, D. (Eds.). Mobility, data mining and privacy: Geographic
knowledge discovery. Springer Science & Business Media.
3. Bygrave, L. A. Data privacy law: an international perspective (Vol. 63). Oxford: Oxford
University Press.
4. Scoble, R., Israel, S., &Benioff, M. R.. Age of context: Mobile, sensors, data and the future
of privacy. USA: Patrick Brewster Press.
5
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3
UNIT-II: Secure System Planning and administration, Introduction to the orange book,
Security policy requirements, accountability, assurance and documentation requirements,
Network Security, The Red book and Government network evaluations.
UNIT-III: Information security policies and procedures: Corporate policies- Tier 1, Tier 2 and
Tier3 policies – process management-planning and preparation-developing policies-asset
classification policy developing standards.
TEXT BOOK:
1. Debby Russell and Sr. G. T Gangemi, “Computer Security Basics (Paperback)”, 2nd Edition,
O’ Reilly Media, 2006.
REFERENCES:
2. Kenneth J. Knapp, “Cyber Security and Global Information Assurance: Threat Analysis and
Response Solutions”, IGI Global, 2009.
3. Thomas R Peltier, Justin Peltier and John blackley, ”Information Security Fundamentals”,
2nd Edition, Prentice Hall, 1996
4. Jonathan Rosenoer, “Cyber law: the Law of the Internet”, Springer-verlag, 1997
6
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3
Ethical Hacking
UNIT II: The Technical Foundations of Hacking: The Attacker’s Process, The Ethical Hacker’s
Process, Security and the Stack. Foot printing and scanning : Information Gathering,
Determining the Network Range, Identifying Active Machines, Finding Open Ports and
Access Points, OS Fingerprinting Services, Mapping the Network Attack Surface
UNIT III: Vulnerability Data Resources – Exploit Databases – Network Sniffing – Types of
Sniffing -Promiscuous versus Nonpromiscuous Mode – MITM Attacks – ARP Attacks – Denial
of Service Attacks -Hijacking Session with MITM Attack – SSL Strip: Stripping HTTPS Traffic -
DNS Spoofing – ARP Spoofing Attack Manipulating the DNS Records – DHCP Spoofing -
Remote Exploitation – Attacking Network Remote Services – Overview of Brute Force
Attacks – Traditional Brute Force – Attacking SMTP – Attacking SQL Servers – Testing for
Weak Authentication.
UNIT IV: Malware Threats: Viruses and Worms, Trojans, Covert Communication, Keystroke
Logging and Spyware, Malware Counter measures. Sniffers, Session Hijacking and Denial of
Service: Sniffers, Session Hijacking, Denial of Service and Distributed Denial of Service.
UNIT V: Wireless Hacking – Introducing Aircrack- Cracking the WEP – Cracking a WPA/WPA2
Wireless Network Using Aircrack-ng – Evil Twin Attack – Causing Denial of Service on the
Original AP – Web Hacking – Attacking the Authentication – Brute Force and Dictionary
Attacks – Types of Authentication – Log-In Protection Mechanisms – Captcha Validation
Flaw – Captcha RESET Flaw – Manipulating User-Agents to Bypass Captcha and Other
Protection – Authentication Bypass Attacks – Testing for the Vulnerability – Automating It
with Burp Suite – Session Attacks – SQL Injection Attacks – XSS (Cross-Site Scripting) -Types
of Cross-Site Scripting – Cross-Site Request Forgery (CSRF) – SSRF Attacks.
TEXT BOOKS:
1. Rafay Baloch, “Ethical Hacking and Penetration Testing Guide”, CRC Press, 2014.
7
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3
REFERENCE BOOKS:
2. Kevin Beaver, “Ethical Hacking for Dummies”, Sixth Edition, Wiley, 2018.
3. Jon Erickson , “Hacking: The Art of Exploitation”, Second Edition, Rogunix, 2007.
8
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3
UNIT I: History of Intrusion detection, Audit, Concept and definition , Internal and external
threats to data, attacks, Need and types of IDS, Information sources Host based information
sources, Network based information sources.
UNIT II: Intrusion Prevention Systems, Network IDs protocol based IDs ,Hybrid IDs, Analysis
schemes, thinking about intrusion. A model for intrusion analysis , techniques Responses
requirement of responses, types of responses mapping responses to policy Vulnerability
analysis, credential analysis non credential analysis.
UNIT III: Introduction to Snort, Snort Installation Scenarios, Installing Snort, Running Snort
on Multiple Network Interfaces, Snort Command Line Options. Step-By-Step Procedure to
Compile and Install Snort Location of Snort Files, Snort Modes Snort Alert Modes.
UNIT IV: Working with Snort Rules, Rule Headers, Rule Options, The Snort Configuration File
etc. Plug-in, Preprocessors and Output Modules, Using Snort with MySQL
UNIT V: Using ACID and Snort Snarf with Snort, Agent development for intrusion detection,
Architecture models of IDs and IPs.
Text Books:
1. Rafeeq Rehman : “ Intrusion Detection with SNORT, Apache, MySQL, PHP and ACID,” 1st
Edition, Prentice Hall , 2003.
Reference Books:
1. Christopher Kruegel, Fredrik Valeur, Giovanni Vigna: “Intrusion Detection and Correlation
Challenges and Solutions”, 1st Edition, Springer, 2005.
2. Carl Endorf, Eugene Schultz and Jim Mellander “ Intrusion Detection & Prevention”, 1st
Edition, Tata McGraw-Hill, 2004.
3. Stephen Northcutt, Judy Novak : “Network Intrusion Detection”, 3rd Edition, New Riders
Publishing, 2002.
9
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3
UNIT–I: Introduction to Security and Ciphers: Security goals, Cryptographic Attacks, Services
and Mechanism, Techniques. Traditional Symmetric Key Ciphers: Introduction, Substitution
Ciphers, Transposition Ciphers, Stream and Block Ciphers. Introduction to Modern
Symmetric-Key Ciphers: Modern Block Ciphers, Modern Stream Ciphers.
UNIT–II: Symmetric and Asymmetric encryption algorithms: Data Encryption Standard (DES):
Introduction, DES Structure, DES Analysis, Multiple DES, Security of DES. Advanced
Encryption Standard (AES): Introduction, Transformations, Key Expansion, AES Ciphers,
Analysis of AES. Asymmetric-Key Cryptography: Introduction, RSA Cryptosystem, Rabin
Cryptosystem, Elgamal Cryptosystem, Elliptic Curve Crypto systems. MODULE III: Hash
Funcstions.
UNIT–III: Hash Functions, Digital Signature and Data Hiding: Cryptographic Hash Functions:
Introduction, Iterated Hash function, SHA-512, WHIRLPOOL. Digital Signature: Comparison,
Process, Services, Attacks on Digital Signature, Digital Signature Standard. Data Hiding in
Text: Basic Features, Applications of Data Hiding, Watermarking, Intuitive Methods, Simple
Digital Methods, Data Hiding in Text, Innocuous Text, Mimic Functions.
UNIT–IV: Data Hiding in Images: LSB Encoding, BPCS Steganography, Lossless Data Hiding,
Spread Spectrum Steganography, Data Hiding by Quantization, Patchwork , Signature
Casting in Images, Transform Domain Methods, Robust Data Hiding in JPEG Images, Robust
Frequency Domain Watermarking, Detecting Malicious Tampering.
UNIT–V: Privacy, Legal and Ethical Issues: Privacy: Privacy Concepts, Privacy Principles and
Policies, Authentication and Privacy, Data Mining, Privacy on the Web, E-Mail Security,
Impacts on Emerging Technologies. Legal and Ethical Issues in Computer Security: Protecting
Programs and Data, Information and the Law, Rights of Employees and employers, Redress
for Software Failures, Computer Crime, Ethical Issues in Computer Security.
TEXT BOOKS:
3. Security in Computing by Charles Pfleeger, Shari Lawrence Pfleeger, 5th Edition, PHI,2015.
10
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3
REFERENCE BOOKS:
1. Information Security: Principles and Practice by Mark Stamp, Wiley Inter Science,2011.
2. Computer Security: Art and Science by Matt Bishop, First Edition, Addison Wesley,2002.
11
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3
Deep Learning
UNIT-III: Introduction to Deep Learning, Historical Trends in Deep learning, Deep Feed -
forward networks, Gradient-Based learning, Hidden Units, Architecture Design, Back-
Propagation and Other Differentiation Algorithms
UNIT–IV: Regularization for Deep Learning: Parameter norm Penalties, Norm Penalties as
Constrained Optimization, Regularization and Under-Constrained Problems, Dataset
Augmentation, Noise Robustness, Semi-Supervised learning, Multi-task learning, Early
Stopping, Parameter Typing and Parameter Sharing, Sparse Representations, Bagging and
other Ensemble Methods, Dropout, Adversarial Training, Tangent Distance, tangent Prop
and Manifold, Tangent Classifier.
UNIT–V: Optimization for Train Deep Models: Challenges in Neural Network Optimization,
Basic Algorithms, Parameter Initialization Strategies, Algorithms with Adaptive Learning
Rates, Approximate SecondOrder Methods, Optimization Strategies and Meta-Algorithms
Applications: Large-Scale Deep Learning, Computer Vision, Speech Recognition, Natural
Language Processing.
TEXT BOOKS:
1. Deep Learning: An MIT Press Book By Ian Goodfellow and Yoshua Bengio and Aaron
Courville.
2. Neural Networks and Learning Machines, Simon Haykin, 3rd Edition, Pearson
Prentice Hall.
12
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3
UNIT-II: Data Collection: Live Data Collection from Windows Systems, Creating a Response
Toolkit, Storing Information Obtained during the Initial Response, Obtaining Volatile Data,
Performing an In-Depth Live Response, Is Forensic Duplication Necessary? Live Data
Collection from Unix Systems: Creating a Response Toolkit , Storing Information Obtained
During the Initial Response, Obtaining Volatile Data Prior to Forensic Duplication.
UNIT-V: Data Analysis: Computer System Storage Fundamentals, Hard Drives and Interfaces,
Preparation of Hard Drive Media, Introduction to File Systems and Storage Layers. Data
Analysis Techniques: Preparation for Forensic Analysis, Restoring a Forensic Duplicate,
Preparing a Forensic Duplication for Analysis In Linux, Reviewing Image Files with Forensic
Suites.
TEXT BOOKS:
1. Incident Response and computer forensics, Kevin Mandia, Chris Prosise, Tata McGrawHill,
2006.
2. Computer Forensics, Computer Crime Investigation, John R. Vacca, Firewall Media, New
Delhi.
13
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3
REFERENCE BOOKS:
1. Real Digital Forensics, Keith J. Jones, Richard Bejtiich, Curtis W. Rose, Addison- Wesley
Pearson Education.
2. Forensic Compiling, A Tractitioneris Guide by Tony Sammes and Brian Jenkinson, Springer
International Edition.
14
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3
Data Science
UNIT II: Visualizing Data: mat plot lib, Bar Charts, Line Charts, Scatter plots. Linear Algebra:
Vectors, Matrices, Statistics: Describing a Single Set of Data, Correlation, Simpson’s Paradox,
Some Other Correlation Caveats, Correlation and Causation. Gradient Descent: The Idea
Behind Gradient Descent, Estimating the Gradient, Using the Gradient, Choosing the Right
Step Size, Using Gradient Descent to Fit Models, Minibatch and Stochastic Gradient Descent.
UNIT III: Getting Data: stdin and stdout, Reading Files, Scraping the Web, Using APIs,
Working with Data: Exploring Your Data Using Named Tuples, Data classes, Cleaning and
Munging, Manipulating Data, Rescaling, Dimensionality Reduction. Probability: Dependence
and Independence, Conditional Probability, Bayes’s Theorem, Random Variables,
Continuous Distributions, The Normal Distribution, The Central Limit Theorem
UNIT IV: Machine Learning: Modeling, Over fitting and Under fitting, Correctness, The Bias-
Variance Tradeoff, Feature Extraction and Selection, k-Nearest Neighbors, Naive Bayes,
Simple Linear Regression, Multiple Regression, Digression, Logistic Regression
UNIT V: Clustering: The Idea, The Model, Choosing k, Bottom-Up Hierarchical Clustering.
Recommender Systems: Manual Curation, Recommending What’s Popular, User-Based
Collaborative Filtering, Item-Based Collaborative Filtering, Matrix Factorization Data Ethics,
Building Bad Data Products, Trading Off Accuracy and Fairness, Collaboration,
Interpretability, Recommendations, Biased Data, Data Protection IPython, Mathematics,
NumPy, pandas, scikit-learn, Visualization R
TEXT BOOKS:
15
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3
REFERENE BOOKS:
1) Doing Data Science: Straight Talk From The Frontline, 1 st Edition, Cathy O’Neil and
Rachel Schutt, O’Reilly, 2013
2) Mining of Massive Datasets, 2 nd Edition, Jure Leskovek, Anand Rajaraman and Jeffrey
Ullman, v2.1, Cambridge University Press, 2014
3) “The Art of Data Science”, 1 st Edition, Roger D. Peng and Elizabeth matsui, Lean
Publications, 2015
4) “Algorithms for Data Science”, 1 st Edition, Steele, Brian, Chandler, John, Reddy, Swarna,
springers Publications, 2016
16
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3
UNIT – I:
Mobile Networks: Cellular Wireless Networks. GSM: Architecture, Protocols, Connection
Establishment, Frequency Allocation, Routing, Mobility Management and GPRS.
UNIT – II:
Mobile Network Security: Mobile IP, DHCP, AdHoc, Proactive and Reactive Routing Protocols,
Multicast Routing. Mobile routing protocols: DSR, AODV, Reactive routing, Location aided routing.
UNIT – III:
Wireless Networks: Issues and challenges of Wireless networks: Location management, Resource
management, Routing. Wireless Media Access Techniques : ALOHA , CSMA , Wireless LAN , MAN
,IEEE 802.11 (a,b,e,f,g,h,i), Bluetooth, WiFi, WiMAX Wireless routing protocols : Mobile IP, IPv4, IPv6.
UNIT – IV:
Wireless Network Security: Network Packet analysis: Packet analysis and Packet sniffing in Hub and
Switched environment, Analysis of packet for security i.e. Sync Scan. Technique of hacking wireless
network and its counter measures.
UNIT – V:
E-Commerce & M-Commerce : An overview of E- Commerce- Operating System Services, Developer
Services, Data Services, Application Services, Store Services, Client Services. Electronic Payment
Systems: Overview of Electronic Payment Systems, Cybercash. Smart Card , Electronic Banking,
Electronic Fund Transfers, Session Management. M-commerce trust, security, and payment: Trust in
Mcommerce, Encryption, Authentication, confidentiality, integrity, and non-repudiation.
TEXT BOOKS:
17
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3
Edge Analytics
What is edge analytics, Applying and comparing architectures, Key benefits of edge
analytics, Edge analytics architectures, Using edge analytics in the real world.
Basic edge analytics components, Connecting a sensor to the ESP-12F microcontroller, KOM-
MICS smart factory platform, Communications protocols used in edge analytics, Wi-Fi
communication for edge analytics, Bluetooth for edge analytics communication, Cellular
technologies for edge analytics communication, Long-distance communication using LoRa
and Signfox for edge analytics.
Working with Microsoft Azure IoT Hub, Cloud Service providers, Microsoft Azure, Exploring
the Azure portal, Azure ioT Hub, Using the Raspberry Pi with Azure IoT edge, Connecting our
Raspberry Pi edge device, adding a simulated temperature sensor to our edge device.
Using Micro python for Edge Analytics, Understanding Micro python, Exploring the
hardware that runs Micro Python, Using Micro Python for an edge analytics application,
Using edge intelligence with microcontrollers, Azure Machine Learning designer, Azure IoT
edge custom vision.
UNIT – V: Applications
Designing a Smart Doorbell with Visual Recognition setting up the environment, Writing the
edge code, creating the Node-RED dashboard, Types of attacks against our edge analytics
applications, Protecting our edge analytics applications
TEXT BOOKS:
1. Hands-On Edge Analytics with Azure IoT: Design and develop IoT applications with edge
analytical solutions including Azure IoT Edge by Colin Dow
REFERENCE BOOKS:
18
R22
ST. ANNS. COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS) CHIRALA, ANDHRA PRADESH, INDIA L T P C
CSE – CYBER SECURITY (R22 - IV YEAR Ist SEMESTER SYLLABUS) 3 0 0 3
UNIT – I:
The Web Security, The Web Security Problem, Risk Analysis and Best Practices Cryptography
and the Web: Cryptography and Web Security, Working Cryptographic Systems and
Protocols, Legal Restrictions on Cryptography, Digital Identification
UNIT – II:
The Web’s War on Your Privacy, Privacy-Protecting Techniques, Backups and Antitheft, Web
Server Security, Physical Security for Servers, Host Security for Servers, Securing Web
Applications
UNIT – III:
Database Security: Recent Advances in Access Control, Access Control Models for XML,
Database Issues in Trust Management and Trust Negotiation, Security in Data Warehouses
and OLAP Systems
UNIT – IV:
UNIT – V:
TEXT BOOKS:
1. Web Security, Privacy and Commerce Simson GArfinkel, Gene Spafford, O’Reilly.
2. Handbook on Database security applications and trends Michael Gertz, Sushil Jajodia.
REFERENCE BOOKS:
19