Honors CSE CSv2
Honors CSE CSv2
Honors CSE CSv2
for
B.Tech. Hono
Honors Degree
in
Cyber Security
Eligible Branches
Branches-
Computer Science and Engineering and allied Branches
EVALUATION SCHEME
(Effective from the Session:2023-24)
Practical End
Examination
Examination
Theory End
Sessional
Semester
Semester
Practical
Theory Sessional
Semester
Periods
Credits
Sl. No.
Total
Subject (TS)
Subject
Codes
L T P CT TA CT+TA PS TE PE
Information
1 IV HTCS401 Theory for 3 1 0 30 20 50 -- 100 -- 150 4
Cyber Security
Data Encryption
2 V HTCS501 and 3 1 0 30 20 50 -- 100 -- 150 4
Compression
Security
Assessment
3 VI HTCS601 3 1 0 30 20 50 -- 100 -- 150 4
and Risk
Analysis
Database
4 VII HTCS701 Security and 3 1 0 30 20 50 -- 100 -- 150 4
Access Control
Cyber Security
5 VIII HTCS801 Lab 0 0 4 -- -- -- 50 -- 50 100 2
Total 700 18
Syllabus
HTCS401 Information Theory for Cyber Security
Course Outcome ( CO)
At the end of course , the student will be able to understand
To provide an insight to information coding techniques, error correction mechanism for cyber
CO 1 security.
CO 2
To introduce the principles and applications of information theory.
CO 3
To justify how information is measured in terms of probability and entropy.
CO 4
To learn coding schemes, including error correcting codes.
DETAILED SYLLABUS
Proposed
Unit Topic
Lecture
Shannon’s foundation of Information theory, Random variables, Probability
distribution factors, Uncertainty/entropy information measures, Leakage,
I Quantifying Leakage and Partitions, Lower bounds on key size: secrecy, 08
authentication and secret sharing. provable security, computationally-secure,
symmetric cipher.
Secrecy metrics: strong, weak, semantic security, partial secrecy, Secure source
IV coding: rate-distortion theory for secrecy systems, side information at receivers, 08
Differential privacy, Distributed channel synthesis.
Digital and network forensics, Public Key Infrastructure, Light weight cryptography,
V 08
Elliptic Curve Cryptography and applications
Text books:
1. Information Theory and Coding, Muralidhar Kulkarni, K S Shivaprakasha, John Wiley & Sons.
2. Communication Systems: Analog and digital, Singh and Sapre, Tata McGraw Hill.
3. Fundamentals in information theory and coding, Monica Borda, Springer.
4. Information Theory, Coding and Cryptography R Bose.
HTCS501 Data Encryption and Compression
Course Outcome ( CO)
At the end of course , the student will be able to understand
CO 1 At the end of this course the student will have the knowledge of Encryption Techniques.
CO 2
To introduce the principles and applications of Cryptography
CO 4
To introduce the principles and applications of Entropy encoding
DETAILED SYLLABUS
Proposed
Unit Topic
Lecture
Introduction to Security: Need for security, Security approaches, Principles of
security, Types of attacks.
I 08
Encryption Techniques: Plaintext, Cipher text, Substitution & Transposition
techniques, Encryption & Decryption, Types of attacks, Key range & Size.
Symmetric & Asymmetric Key Cryptography: Algorithm types & Modes, DES, IDEA,
II Differential & Linear Cryptanalysis, RSA, Symmetric & Asymmetric key together, 08
Digital signature, Knapsack algorithm.
To Skilled to be able to describe the escalation process from incident to disaster in case of
CO 2
security disaster.
CO 3 To understand the concept of the Data Compression.
CO 4 To Design a Disaster Recovery Plan for sustained organizational operations.
DETAILED SYLLABUS
Proposed
Unit Topic
Lecture
SECURITY BASICS: Information Security (INFOSEC) Overview: critical information
characteristics – availability information states – processing security
countermeasures-education, training and awareness, critical
I 08
information , characteristics – confidentiality critical information characteristics –
integrity, information states – storage, information states –
transmission, security , countermeasures- policy, procedures and practices, threats,
vulnerabilities.
Threats to and Vulnerabilities of Systems: Threats, major categories of threats (e.g., fraud,
Hostile Intelligence Service (HOIS). Countermeasures: assessments (e.g., surveys, inspections).
II 08
Concepts of Risk Management: consequences (e.g., corrective action, risk assessment),
cost/benefit analysis and implementation of controls, monitoring the efficiency and effectiveness
of controls (e.g., unauthorized or inadvertent disclosure of information).
To Skilled to be able to describe the escalation process from incident to disaster in case of
CO 2
security disaster. To understand and implement classical models and algorithms.
To analyze the data, identify the problems, and choose the relevant models and algorithms to
CO 3
apply.
To assess the strengths and weaknesses of various access control models and to analyze their
CO 4
behaviour.
DETAILED SYLLABUS
Proposed
Unit Topic
Lecture
Introduction to Access Control, Purpose and fundamentals of access
I 08
control.
Policies of Access Control, Models of Access Control, and Mechanisms, Discretionary
II Access Control (DAC), Non- Discretionary Access Control, Mandatory Access Control 08
(MAC). Capabilities and Limitations of Access Control Mechanisms: Access Control
List (ACL) and Limitations, Capability List and Limitations.
Role-Based Access Control (RBAC) and Limitations, Core RBAC, Hierarchical RBAC,
Statically Constrained RBAC, Dynamically Constrained RBAC, Limitations of RBAC.
III 08
Comparing RBAC to DAC and MAC Access Control policy, Integrating RBAC with
enterprise IT infrastructures: RBAC for WFMSs, RBAC for UNIX and JAVA
environments.
Smart Card based Information Security, Smart card operating system-fundamentals,
IV design and implantation principles, memory organization, smart card files, file 08
management. PPS Security techniques- user identification, smart card security,
quality assurance and testing, smart card life cycle-5 phases, smart card terminals.
Cloud Data Security: Recent trends in Database security and access control
V 08
mechanisms. Cloud Data Audit: Intro, Audit, Best Practice, Key management, Cloud
Key Management Audit.
Text books:
1. Role Based Access Control: David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli.
Reference Books :
1.Database Security and Auditing, Hassan A. Afyouni, India Edition, CENGAGE Learning, 2009.
2. Database Security, Castano, Second edition, Pearson Education.
Note: Subject Teachers may add/delete the experiments as per the subject requirements