Honors CSE CSv2

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

DR. A.P.J.

ABDUL KALAM TECHNICAL UNIVERSITY


UTTAR PRADESH, LUCKNOW

Evaluation Scheme & Syllabus

for

B.Tech. Hono
Honors Degree
in

Cyber Security

Eligible Branches
Branches-
Computer Science and Engineering and allied Branches

As per NEP 2020

(Effective from the Session: 202


2023-24)
STUDY & EVALUATION SCHEME
Honors Degree in Cyber Security
Eligible Branches- Computer Science and Engineering
& allied Branches

EVALUATION SCHEME
(Effective from the Session:2023-24)

Practical End
Examination

Examination
Theory End
Sessional

Semester

Semester
Practical
Theory Sessional
Semester

Periods

Credits
Sl. No.

Total
Subject (TS)
Subject
Codes

L T P CT TA CT+TA PS TE PE

Information
1 IV HTCS401 Theory for 3 1 0 30 20 50 -- 100 -- 150 4
Cyber Security

Data Encryption
2 V HTCS501 and 3 1 0 30 20 50 -- 100 -- 150 4
Compression

Security
Assessment
3 VI HTCS601 3 1 0 30 20 50 -- 100 -- 150 4
and Risk
Analysis

Database
4 VII HTCS701 Security and 3 1 0 30 20 50 -- 100 -- 150 4
Access Control

Cyber Security
5 VIII HTCS801 Lab 0 0 4 -- -- -- 50 -- 50 100 2

Total 700 18
Syllabus
HTCS401 Information Theory for Cyber Security
Course Outcome ( CO)
At the end of course , the student will be able to understand
To provide an insight to information coding techniques, error correction mechanism for cyber
CO 1 security.

CO 2
To introduce the principles and applications of information theory.

CO 3
To justify how information is measured in terms of probability and entropy.

CO 4
To learn coding schemes, including error correcting codes.

DETAILED SYLLABUS
Proposed
Unit Topic
Lecture
Shannon’s foundation of Information theory, Random variables, Probability
distribution factors, Uncertainty/entropy information measures, Leakage,
I Quantifying Leakage and Partitions, Lower bounds on key size: secrecy, 08
authentication and secret sharing. provable security, computationally-secure,
symmetric cipher.

Secrecy, Authentication, Secret sharing, Optimistic results on perfect secrecy, Secret


key agreement, Unconditional Security, Quantum Cryptography, Randomized Ciphers,
II 08
Types of codes: block codes, Hamming and Lee metrics, description of linear block
codes, parity check Codes, cyclic code, Masking techniques.

III Information-theoretic security and cryptograph, basic introduction to Diffie-Hellman, 08


AES, and side-channel attacks.

Secrecy metrics: strong, weak, semantic security, partial secrecy, Secure source
IV coding: rate-distortion theory for secrecy systems, side information at receivers, 08
Differential privacy, Distributed channel synthesis.

Digital and network forensics, Public Key Infrastructure, Light weight cryptography,
V 08
Elliptic Curve Cryptography and applications

Text books:
1. Information Theory and Coding, Muralidhar Kulkarni, K S Shivaprakasha, John Wiley & Sons.
2. Communication Systems: Analog and digital, Singh and Sapre, Tata McGraw Hill.
3. Fundamentals in information theory and coding, Monica Borda, Springer.
4. Information Theory, Coding and Cryptography R Bose.
HTCS501 Data Encryption and Compression
Course Outcome ( CO)
At the end of course , the student will be able to understand
CO 1 At the end of this course the student will have the knowledge of Encryption Techniques.

CO 2
To introduce the principles and applications of Cryptography

CO 3 To understand the concept of the Data Compression.

CO 4
To introduce the principles and applications of Entropy encoding

DETAILED SYLLABUS
Proposed
Unit Topic
Lecture
Introduction to Security: Need for security, Security approaches, Principles of
security, Types of attacks.
I 08
Encryption Techniques: Plaintext, Cipher text, Substitution & Transposition
techniques, Encryption & Decryption, Types of attacks, Key range & Size.

Symmetric & Asymmetric Key Cryptography: Algorithm types & Modes, DES, IDEA,
II Differential & Linear Cryptanalysis, RSA, Symmetric & Asymmetric key together, 08
Digital signature, Knapsack algorithm.

Case Studies of Cryptography: Denial of service attacks, IP spoofing attacks,


Conventional Encryption and Message Confidentiality, Conventional Encryption
Algorithms, Key Distribution.
III 08
Public Key Cryptography and Message Authentication: Approaches to Message
Authentication, SHA-1, MD5, Public-Key Cryptography Principles, RSA, Digital,
Signatures, Key Management, Firewall.

Introduction: Need for data compression, Fundamental concept of data compression


& coding, Communication model, Compression ratio, Requirements of data
IV compression, Classification. 08

Methods of Data Compression: Data compression-- Loss less & Lossy.

Entropy encoding-- Repetitive character encoding, Run length encoding, Zero/Blank


encoding; Statistical encoding-- Huffman, Arithmetic & Lempel-Ziv coding; Source
V encoding-- Vector quantization (Simple vector quantization & with error term). 08

Recent trends in encryption and data compression techniques.


Text books:
1. Cryptography and Network Security, Mohammad Amjad, John Wiley & Sons.
2. Cryptography & Network Security by Atul Kahate, TMH.
3. Information Theory and Coding, Muralidhar Kulkarni, K S Shivaprakasha, John Wiley & Sons.
4. Cryptography and Network Security by B. Forouzan, McGraw-Hill.
5. The Data Compression Book by Nelson, BPB.
HTCS601 Security Assessment and Risk Analysis
Course Outcome ( CO)
At the end of course , the student will be able to understand
To Describe the concepts of risk management in information security. Define and differentiate
CO 1 various Contingency Planning components.

To Skilled to be able to describe the escalation process from incident to disaster in case of
CO 2
security disaster.
CO 3 To understand the concept of the Data Compression.
CO 4 To Design a Disaster Recovery Plan for sustained organizational operations.
DETAILED SYLLABUS
Proposed
Unit Topic
Lecture
SECURITY BASICS: Information Security (INFOSEC) Overview: critical information
characteristics – availability information states – processing security
countermeasures-education, training and awareness, critical
I 08
information , characteristics – confidentiality critical information characteristics –
integrity, information states – storage, information states –
transmission, security , countermeasures- policy, procedures and practices, threats,
vulnerabilities.
Threats to and Vulnerabilities of Systems: Threats, major categories of threats (e.g., fraud,
Hostile Intelligence Service (HOIS). Countermeasures: assessments (e.g., surveys, inspections).
II 08
Concepts of Risk Management: consequences (e.g., corrective action, risk assessment),
cost/benefit analysis and implementation of controls, monitoring the efficiency and effectiveness
of controls (e.g., unauthorized or inadvertent disclosure of information).

Security Planning: directives and procedures for policy mechanism.

III Contingency Planning/Disaster Recovery: agency response procedures and 08


continuity of operations, contingency plan components, determination of backup
requirements, development of plans for recovery actions after a disruptive event.

Personnel Security Practices and Procedures: access authorization/verification


(need- to-know), contractors, employee clearances, position sensitivity, security
training and awareness, systems maintenance personnel.
IV 08
Auditing and Monitoring: conducting security reviews, effectiveness of security
programs, investigation of security breaches, privacy review of accountability
controls, review of audit trails and logs.

Operations Security (OPSEC): OPSEC surveys/OPSEC planning INFOSEC: computer


V security – audit, cryptography-encryption (e.g., point-to-point, network, link). 08
Case study of threat and vulnerability assessment.
Text books:
1. Information Systems Security, 2ed: Security Management, Metrics, Frameworks and Best Practices, Nina
Godbole, John Wiley & Sons.
2. Principles of Incident Response and Disaster Recovery, Whitman & Mattord, Course Technology ISBN:
141883663X.
Corresponding Online Resources:
1. Introduction to Cyber Security,https://swayam.gov.in/nd2_nou20_cs01/preview
2. (Web Link)http://www.cnss.gov/Assets/pdf/nstissi_4011.pdf
HTCS 701 Database Security and Access Control
Course Outcome ( CO)
At the end of course , the student will be able to understand
CO 1 To provide fundamentals of database security.

To Skilled to be able to describe the escalation process from incident to disaster in case of
CO 2
security disaster. To understand and implement classical models and algorithms.
To analyze the data, identify the problems, and choose the relevant models and algorithms to
CO 3
apply.
To assess the strengths and weaknesses of various access control models and to analyze their
CO 4
behaviour.
DETAILED SYLLABUS
Proposed
Unit Topic
Lecture
Introduction to Access Control, Purpose and fundamentals of access
I 08
control.
Policies of Access Control, Models of Access Control, and Mechanisms, Discretionary
II Access Control (DAC), Non- Discretionary Access Control, Mandatory Access Control 08
(MAC). Capabilities and Limitations of Access Control Mechanisms: Access Control
List (ACL) and Limitations, Capability List and Limitations.
Role-Based Access Control (RBAC) and Limitations, Core RBAC, Hierarchical RBAC,
Statically Constrained RBAC, Dynamically Constrained RBAC, Limitations of RBAC.
III 08
Comparing RBAC to DAC and MAC Access Control policy, Integrating RBAC with
enterprise IT infrastructures: RBAC for WFMSs, RBAC for UNIX and JAVA
environments.
Smart Card based Information Security, Smart card operating system-fundamentals,
IV design and implantation principles, memory organization, smart card files, file 08
management. PPS Security techniques- user identification, smart card security,
quality assurance and testing, smart card life cycle-5 phases, smart card terminals.
Cloud Data Security: Recent trends in Database security and access control
V 08
mechanisms. Cloud Data Audit: Intro, Audit, Best Practice, Key management, Cloud
Key Management Audit.
Text books:
1. Role Based Access Control: David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli.

Reference Books :
1.Database Security and Auditing, Hassan A. Afyouni, India Edition, CENGAGE Learning, 2009.
2. Database Security, Castano, Second edition, Pearson Education.

Corresponding Online Resources:

1. http://www.smartcard.co.uk/tutorials/sct-itsc.pdf: Smart Card Tutorial.


2. Advanced System Security Topics,https://www.coursera.org/lecture/advanced-system-security-topics/role-
based-access-control-rbac-bYvzS.
HTCS 801 Cyber Security Lab

1. Implement the following SUBSTITUTION & TRANSPOSITION TECHNIQUES concepts:


a) Caesar Cipher
b) Playfair Cipher
c) Hill Cipher
d) Vigenere Cipher
e) Rail fence – row & Column Transformation
2. Implement the following algorithms
a) DES
b) RSA Algorithm
c) Diffiee-Hellman
d) MD5
e) SHA-1
3. Implement the Signature Scheme - Digital Signature Standard
4. Demonstrate how to provide secure data storage, secure data transmission and for creating digital signatures
(GnuPG)
5. Setup a honey pot and monitor the honeypot on network (KF Sensor)
6. Installation of rootkits and study about the variety of options
7. Perform wireless audit on an access point or a router and decrypt WEP and WPA. ( Net Stumbler)
8. Demonstrate intrusion detection system (ids) using any tool (snort or any other s/w)
9. Implement Huffman coding.
10 Implement Arithmetic Coding.
11. Implement one dimension DCT
12. Implement Chinese Remainder Theorem
13. Implement Ceaser Cipher Algorithm
14. TCP scanning using NMAP2.
15. Port scanning using NMAP3.
16. TCP / UDP connectivity using Netcat
17. Network vulnerability using OpenVAS5.
18. Web application testing using DVWA
19. Manual SQL injection using DVWA
20. XSS using DVWA
21. Automated SQL injection with SqlMap

Note: Subject Teachers may add/delete the experiments as per the subject requirements

You might also like