Seth Balkrishan Memorial Bhilai Institute of Technology,Durg
Transcript of Seth Balkrishan Memorial Bhilai Institute of Technology,Durg
Seth Balkrishan Memorial
Bhilai Institute of Technology,Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SCHEME OF TEACHING AND EXAMINATION (Effective from 2020 – 2021 Batch)
M.Tech. (e-Security) First Semester
Sl. N
o.
Board of Studies
(BOS) Courses (Subject)
Course
Code
Period per
Week
Scheme of
Examination To
tal
Ma
rks
Cred
it L T P Theory/Lab
ESE CT TA
1. Information
Technology
Mathematical
Foundation of
Information
Security
225101IT 3 1 - 100 20 20 140 4
2. Information
Technology Network System
Architecture 225102 IT 3 1 - 100 20 20 140 4
3. Information
Technology Data and
Knowledge Security 225103 IT 3 1 - 100 20 20 140 4
4.
Information
Technology Coding Techniques
for Secure
Transaction
225104 IT 3 1 - 100 20 20 140 4
5. Information
Technology Elective-I 3 1 - 100 20 20 140 4
6. Information
Technology Data & Knowledge
Security( Lab) 225191 IT - - 3 75 - 75 150 2
7. Information
Technology Network Simulation
(Lab) 225192 IT - - 3 75 - 75 150 2
Total Marks 15 5 6 650 100 250 1000 24
Elective-I
Sl. N
o.
Board of Studies (BOS) Courses (Subject) Course
Code
1. Information Technology Security Issues In Operating System 225121 IT
2. Information Technology Distributed Systems 225122 IT
3. Information Technology E – Commerce & Web Security 225123 IT
Note:
(a) Abbreviations used: L-Lecture, T-Tutorial, P-Practical, ESE-End Semester Exam, CT- Class Test, TA-
Teacher's Assessment.
(b) Choice of elective course once made for an examination cannot be changed in future examinations.
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e-Security) First Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
Sl. N
o.
Board of Studies
(BOS) Courses (Subject)
Course
Code
Period per
Week
Scheme of
Examination To
tal
Ma
rks
Cred
it L T P Theory/Lab
ESE CT TA
1. Information
Technology
Mathematical
Foundation of
Information
Security
225101IT 3 1 - 100 20 20 140 4
2. Information
Technology Network System
Architecture 225102 IT 3 1 - 100 20 20 140 4
3. Information
Technology Data and
Knowledge Security 225103 IT 3 1 - 100 20 20 140 4
4.
Information
Technology Coding Techniques
for Secure
Transaction
225104 IT 3 1 - 100 20 20 140 4
5. Information
Technology Elective-I 3 1 - 100 20 20 140 4
6. Information
Technology Data & Knowledge
Security( Lab) 225191 IT - - 3 75 - 75 150 2
7. Information
Technology Network Simulation
(Lab) 225192 IT - - 3 75 - 75 150 2
Total Marks 15 5 6 650 100 250 1000 24
Elective-I
Sl. N
o.
Board of Studies (BOS) Courses (Subject) Course
Code
1. Information Technology Security Issues In Operating System 225121 IT
2. Information Technology Distributed Systems 225122 IT
3. Information Technology E – Commerce & Web Security 225123 IT
Note:
(a) Abbreviations used: L-Lecture, T-Tutorial, P-Practical, ESE-End Semester Exam, CT- Class Test, TA-
Teacher's Assessment.
(b) Choice of elective course once made for an examination cannot be changed in future examinations.
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e-Security) First Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
MATHEMATICAL FOUNDATION OF INFORMATION SECURITY
Course Code 225101 IT L = 3 T = 1 P = 0 Credits = 4
Examination Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number of class tests to be conducted = 02 Minimum assignments = 02
Course Objectives Course Outcomes
The objective of Mathematical Foundation of
Information Security is to make the students
aware of set theory, graph theory and
hamming code technique which is helpful in
various areas like communication where data
security plays a important role.
On successful completion of the course, the
student will be able to:
CO1: Analyze the concept of set theory.
CO2: Apply the principles of circuits and tree.
CO3: Discuss the feature of group theory and
hamming code.
CO4: Analyze the importance of set theory.
CO5: Implement the concept of cryptography.
UNIT – I Introduction to Set Theory
Basic concept of set theory, Rough Set theory, Relations, Properties of relation in a set, Equivalence relation,
Composition of relations, Partial order & total order relations, Lattices & Hasse diagram, Introduction to
function, Inverse, Identity, Injective, Surjective & Bijective functions, Composition of functions and some
special functions. [10 Hrs]
UNIT – II Introduction to Graph Theory
Introduction to graph theory, Walks, Paths & Circuits, Types of graphs, Shortest path problems, Euclidian and
Hamiltonian graphs, Basic concept of tree: Spanning tree, Minimum Spanning tree, Search tree, Rooted Binary
tree, Cut sets, Network flow, Matrix representation of graphs. [8 Hrs]
UNIT – III Group Theory and Coding
Basic concept of Group theory, Homomorphism and Isomorphism of groups, COSETS and Lagrange’s Theorem,
Elements of Coding theory, Group codes, Decoding, Hamming matrices, The Parity check and Generator
Matrices. [10 Hrs]
UNIT – IV Introduction to Number Theory
Facts from elementary number theory, Fundamental theorem of arithmetic, G.C.D., Modular Operator, Euclid’s
algorithm, Modular arithmetic, Fermat’s little theorem, Euler’s Theorem, Modular Multiplicative Inverse,
Primarily Testing. [10 Hrs]
UNIT – V Introduction to Cryptography
Introduction to Cryptography, Encryption, Decryption, Integer Factoring Problem, Discrete Logarithm Problem,
Hash Function, Digital Signature, Symmetric key Cryptosystem, Public key Cryptosystem, Diffie-Hellman Key
Exchange, RSA Cryptosystem, ElGamal Cryptosystem, Elliptic Curve Cryptosystem. [10 Hrs]
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e-Security) First Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
Text Books:
S. No.
Title Author(s) Publisher
1. Discrete Mathematical Structures with applications to Computer Science
J.P. Tremblay and R. Manohar
Tata McGraw-Hill
2. A Text Book of Discrete Mathematics Swapan Kumar Sarkar S. Chand & Company Ltd.
3. Elementary Number Theory Gareth A. Jones, Josephine Mary Jones
Springer-Verlag
Reference Books:
S. No.
Title Author(s) Publisher
1. Elements of Discrete Mathematics C.L. Liu Tata McGraw-Hill
2. Graph theory with Applications to Engineering and Computer Science
Narsingh Deo Prentice Hall of India
3. Discrete Mathematics for Computer Scientists and Mathematicians
J.L. Mott, A. Kandel, and T.P. Baker
Prentice Hall of India
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e-Security) First Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
NETWORK SYSTEM ARCHITECTURE
Course Code 225102 IT L = 3 T = 1 P = 0 Credits = 4
Examination Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number of class tests to be conducted = 02 Minimum assignments = 02
Course Objectives Course Outcomes
The objective of network system architecture
is to make the students aware of ISO layer
and working to different internet protocol
along with different network topology and its
implementation.
On successful completion of the course, the
student will be able to:
CO1: Analyze various ISO layer protocols.
CO2: Analyze working to data link layer.
CO3: Apply the feature of LAN and WAN and its
working
CO4: Discuss the importance of network security.
CO5: Implement the concept of IEEE protocol and
Bluetooth.
UNIT – I OSI:ISO Layer Protocols Application Layer Protocols-TCP/IP, HTTP, SHTTP, LDAP, MIME,-POP& POP3-RMON-SNTP-SNMP.
Presentation Layer Protocols-Light Weight Presentation Protocol Session layer protocols –RPC protocols-
transport layer protocols-ITOT,RDP,RUDP,TALI,TCP/UDP, compressed TCP. Network layer Protocols –
routing protocols-border gateway protocol-exterior gateway protocol-internet protocol IPv4- IPv6- Internet
Message Control Protocol- IRDP- Mobile IP – Mobile Support Protocol for IPv4 and IPv6 – Resource
Reservation Protocol. Multi-casting Protocol – VGMP – IGMP–MSDP. [10 Hrs]
UNIT – II Data Link layer Protocol ARP – In ARP – IPCP – IPv6CP – RARP – SLIP .Wide Area and Network Protocols- ATM protocols – Broadband Protocols – Point to Point Protocols – Other WAN Protocols- security issues. [8 Hrs]
UNIT – III Local Area Network and LAN Protocols ETHERNET Protocols – VLAN protocols – Wireless LAN Protocols – Metropolitan Area Network Protocol – Storage Area Network and SAN Protocols -FDMA, WIFI and WIMAX Protocols- security issues. [10 Hrs]
UNIT – IV Introduction to Number Theory AAA Protocols – Tunneling Protocols – Secured Routing Protocols – GRE- Generic Routing
Encapsulation – IPSEC – Security architecture for IP – IPSECAH – Authentication Header – ESP – IKE –
ISAKMP and Key management Protocol. IEEE 802.11 - Structure of 802.11 MAC – WEP- Problems with
WEP – Attacks and Risk- Station security – Access point Security – Gate way Security – Authentication and
Encryption. [10 Hrs]
UNIT – V Protocols and Services IEEE 802.15 and Bluetooth – WPAN Communication Protocols – IEEE 802.16- IEEE 802.16A.WCDMA – Services – WCDMA Products – Networks- device addressing – System Addressing – Radio Signaling Protocol – Multimedia Signaling Protocol. [10 Hrs]
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e-Security) First Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
Text Books:
S. No.
Title Author(s) Publisher
1. Networks Protocols Handbook Jawin Jawin Technologies Inc.
2. 802.11 Security Bruce Potter, Bob
Fleck O’Reilly Publications
Reference Books:
S. No.
Title Author(s) Publisher
1. Introduction to CDMA- Network services Technologies and Operations
Lawrence Harte, Althos Publishing,
2. Introduction to WIMAX Lawrence Harte Althos Publishing
3. Introduction to WCDMA Lawrence Harte, Althos Publishing
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e-Security) First Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
DATA & KNOWLEDGE SECURITY
Course Code 225103 IT L = 3 T = 1 P = 0 Credits = 4
Examination Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number of class tests to be conducted = 02 Minimum assignments = 02
Course Objectives Course Outcomes
The objective of data &knowledge security is to
make the students aware data security and
integrity and also interoperability of
database. Students should able to
understand importance of knowledgebase
and database.
On successful completion of the course, the
student will be able to:
CO1: Analyze the concept of data security.
CO2: Apply the concept of Distributed Database.
CO3: Analyze the role of database administrator.
CO4: Apply the concept of knowledge base.
CO5: Implement the concept of expert system.
UNIT – I Data Security Database systems- architectures- storage structures- storage issues in Database Management
Systems- Security of data at various levels of Database Management Systems. [10 Hrs]
UNIT – II Distributed Databases Distributed Data Processing- Distributed Database system- Distributed Database Management System
Architecture: Architectural models for Distributed Database Management System – Global directory issues – Distributed database design – distributed design issues – fragmentation –Allocation. [8 Hrs]
UNIT –III Semantic Data Control View Management – Data centralized Authorization control – Distributed Authorization control – centralized
Semantic Integrity Control - Centralized Semantic Integrity Control-Database interoperability-issues related
to security in database interoperability. [10 Hrs]
UNIT – IV Knowledge base systems Knowledge base system design – storage of knowledge – various formats – Levels of security issues in
Knowledge base system design – conceptual level – implementation level. [10 Hrs]
UNIT – V Expert Systems Design of Expert systems – Knowledge representation techniques in Expert system – structured,
semi structured and unstructured data – Knowledge Management and security issues. [10 Hrs]
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e-Security) First Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
Text Books:
S. No.
Title Author(s) Publisher
1. Security in Computing Charles P. Pfleeger and Shari Lawrence Pfleeger
Pearson Education
2. Principles of Distributed Database Systems, Second Edition
M.Tamer OZSU and Patrick Valdureiz
Pearson Education
Reference Books:
S. No.
Title Author(s) Publisher
1. Artificial Intelligence: A Modern approach Stuart Russel and Peter Norwig
Pearson Education
2. Knowledge Management Ganesh Natarajan and Sandhya Shekhar
Tata McGraw Hill
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e-Security) First Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
CODING TECHNIQUES FOR SECURE TRANSACTION
Course Code 225104 IT L = 3 T = 1 P = 0 Credits = 4
Examination Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number of class tests to be conducted = 02 Minimum assignments = 02
Course Objectives Course Outcomes
The objective of coding techniques for secure
transaction is to make the students aware of
different mathematical techniques of secure
channel transmission along with data and
video compression techniques.
On successful completion of the course, the
student will be able to:
CO1: Analyze the concept of various channel coding
techniques.
CO2: Analyze working to data encryption decryption
techniques.
CO3: Analyze the working of convolution code.
CO4: Apply the concept of compression techniques.
CO5: Implement the concept of video compression.
UNIT – I Channel capacity and coding Channel models, channel capacity, channel coding, information capacity theorem, random selection of
codes. Error control coding: linear block codes and their properties, decoding of linear block code, perfect
codes, hamming codes, optimal linear codes and MDS codes. [10 Hrs]
UNIT – II Cyclic codes Polynomials, division algorithm for polynomials, a method for generating cyclic codes, matrix description of cyclic codes, burst error correction, fire codes, golay codes, CRC codes, circuit implementation of cyclic codes. BCH codes: minimal polynomials, generator polynomial for BCH codes, decoding of BCH codes, Reed-Solomon codes and nested codes. [8 Hrs]
UNIT –III Convolution codes Tree codes and trellis codes, polynomial description of convolutional codes, distance notions for convolutional codes, generation function, matrix description of convolutional codes, viterbi decoding of convolutional codes, distance bounds for convolutional codes, turbo codes and turbo decoding. [10 Hrs]
UNIT – IV Compression Lossless and lossy, Huffman codes, Binary Image compression schemes; Run –length Encoding; CCITT group-3 1D compression; CCITT group-3 2D compression; CCITT group-4 2D compression. [10 Hrs]
UNIT – V Video Image Compression Requirement of full motion video compression; CCITT H 261video coding algorithm; MPEG compression methodology; MPEG-2 compression; Audio (Speech)compression [10 Hrs]
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e-Security) First Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
Text Books:
S. No.
Title Author(s) Publisher
1. Digital Communication Das, Mullick& Chatterjee
New Age Pub.
2. Digital Communication Proakis TMH
3. Information theory, coding and cryptography
Ranjan Bose Tata McGraw Hill
Reference Books:
S. No.
Title Author(s) Publisher
1. Information theory and coding
Viterbi, McGraw Hill
2. Digital Communications
John G. Proakis McGraw Hill
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e-Security) First Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
SECURITY ISSUES IN OS (Elective I) Course Code 225121 IT L = 3 T = 1 P = 0 Credits = 4
Examination Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number of class tests to be conducted = 02 Minimum assignments = 02
Course Objectives Course Outcomes
The objective of Security Issues in OS is to
make the students aware of different issues
of security and its solution to provide a
trusted platform for secure working.
On successful completion of the course, the
student will be able to:
CO1: Analyze the concept of operating system.
CO2: Discuss different security features of operating
system.
CO3: Analyze the working of system administrator.
CO4: Discuss different network services.
CO5: Apply different network protocols.
UNIT – I Overview Of Operating Systems Operating System concepts, Process Management and Scheduling, Memory Management:
Partitioning, Paging, Segmentation, Virtual memory, Device and File management, Introduction to
Operating System Security, Operating System Security Mechanism, Case studies : Linux and Windows.
[10 Hrs]
UNIT – II Protection and Security
Protection and Security-Preliminaries, Operating System Security Models, Vulnerability Analysis and
Common Unit Vulnerabilities, Data security, Cryptography: Model of cryptography, Conventional
cryptography, Modern cryptography, Private Key Cryptography, Data Encryption Standard, Public Key
Cryptography, Multiple Encryption, and Authentication in distributed systems. [10 Hrs]
UNIT –III System Administration Managing Users and Groups using command like adduser, userdel, groupadd, groupdel etc. Basic Network Setup, Setting hostname, IP address of the machine. Setting a dialup connection. Installing and removing packages. Using the RPM, source package installation, URPMI. Managing Partitions understanding the /etc/fstab. Boot loader management understanding the lilo and grub boot loader and its configuration files X-server configuration understanding the XF86config (overview), configure X using thexf86config Command. [8 Hrs]
UNIT – IV Configuring and Managing Services Starting and Stopping Services Identifying Core and Non-critical Services Configuring Basic Client Services Configuring Basic Internet Services Working with Modules Managing Network Services:
Identifying Networking Concepts Configuring Basic Network Services and Settings Managing Network Services Managing Remote Network Service. [10 Hrs]
UNIT – V Protocols and Communication Network protocols, layered protocol architecture, communication networks, LAN, WAN, internet, carrier ethernet, MPLS., application layer protocols (NFS, FTP, HTTP), real time communication and RTP, QoS technologies, diff serv, netlink sockets, iptables. [10 Hrs]
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e-Security) First Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
Text Books:
S. No.
Title Author(s) Publisher
1. Operating Systems 6th Edition
Stalling William, Pearson Education.
2. Operating System Concepts
Silbcrschatz A., Alvin
P., Gagne G. John Wiley and Sons
3. Unix Concepts and Applications Das Sumitabha Tata McGraw Hill
Reference Books:
S. No.
Title Author(s) Publisher
1. Operating Systems Concepts and Design
Milan Milenkovic TMGH
2. Modern Operating Systems
Andrew S. Tanenbaum PHI
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e-Security) First Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
DISTRIBUTED SYSTEMS (Elective I) Course Code 225122 IT L = 3 T = 1 P = 0 Credits = 4
Examination Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number of class tests to be conducted = 02 Minimum assignments = 02
Course Objectives Course Outcomes
The objective of distributed systems is to
make the students aware of different issues
of security and its solution to provide a
trusted platform for secure working.
On successful completion of the course, the
student will be able to:
CO1: Analyze the concept of distributed systems.
CO2:Apply the concept of inter process
communication.
CO3: Apply the concept of distributed file systems.
CO4: Implement distributed algorithms.
CO5: Analyze the working of distributed shared
memory.
UNIT – I Introduction Distributed Systems: Introduction, Examples, Resource Sharing and the Web – Challenges. Distributed
System Models: Introduction, Architectural Models, Functional Models. Characterization of Distributed
Systems, Client-Server Communication, Distributed Objects and Remote Invocation, Communication
between Distributed Objects, Remote Procedure Call, Events and Notifications. [10 Hrs]
UNIT – II Inter-process Communication API for Internet protocols, External data representation and Marshalling, Client-Server communication and Group communication, Distributed Objects and Remote Invocation, Communication between distributed objects, Remote Procedure Call, Remote Object Invocation. Events and notification. Message and Stream-oriented communication. Case study: CORBA and RMI. [10 Hrs]
UNIT –III Resource Management Distributed Resource Management, Distributed File systems: Architecture, Mechanisms, Design Issues. Distributed Shared Memory: Architecture, Algorithm, Protocols, Design Issues. Distributed Scheduling: Issues, Components, and Algorithms. [10 Hrs]
UNIT – IV Distributed Algorithms Distributed Algorithm: Introduction, Kinds of Distributed Algorithm, Timing Models. Synchronous Network Algorithms: Synchronous Network Model, Leader Election in a synchronous Ring, Algorithms in a General Synchronous Networks, Distributed Consensus with Link Failures, Distributed Consensus with Process failures, More Consensus problems. [10 Hrs]
UNIT – V Distributed Shared Memory and Distributed File System Types of shared memory multiprocessors, Structure of Shared Memory Space, Consistency models, Distributed shared memory types: Page based, Shared variable and Object based types, Thrashing, Distributed System features, File accessing model, File sharing semantics, File catching scheme, Fault Tolerance in Real Time Systems. [8 Hrs]
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e-Security) First Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
Text Books:
S. No.
Title Author(s) Publisher
1. Distributed Systems Concepts
and Design
George Coulouris, Jean Dellimore
and Tim Kindberg
Pearson Education
2.
Distributed Operating System
Concepts and Design
Sinha PHI
3.
Distributed Computing–Principles.
Ajay D. Kshemkalyani and Mukesh
Singhal PHI
Reference Books:
S. No.
Title Author(s) Publisher
1. IT Infrastructure And Its Management
Gupta Tata McGraw Hill
2. Distributed Algorithms Nancy A. Lynch Morgan Kaufmann
Publisher
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e-Security) First Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
E COMMERCE & WEB SECURITY(Elective I) Course Code 225123 IT L = 3 T = 1 P = 0 Credits = 4
Examination Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number of class tests to be conducted = 02 Minimum assignments = 02
Course Objectives Course Outcomes
The objective of E Commerce & Web Security
is to make the students aware of different
web based security threats and working of e
commerce companies and their different
issues.
On successful completion of the course, the
student will be able to:
CO1:Analyse different web based security threats
CO2:Apply the concept of different trusted platform
for e commerce
CO3: Implement web based tools for web hosting.
CO4: Apply concept of security technologies for e
commerce.
CO5: Discuss different e payment systems.
UNIT – I Security and Encryption E-Commerce Security Environment – Security threats in E-Commerce environment – Policies, Procedures and Laws. Inter-organizational trust in E-Commerce: Need – Trading partner trust – Perceived benefits and risks of E-Commerce – Technology trust mechanism in E-Commerce – Perspectives of organizational, economic and political theories of inter- organizational trust – Conceptual model of inter-organizational trust in E-Commerce participation. [10 Hrs]
UNIT – II Introduction to trusted computing platform Overview – Usage Scenarios – Key components of trusted platform – Trust mechanisms in a trusted platform. Trusted platforms for organizations and individuals – Trust models and the E-Commerce domain. [8 Hrs]
UNIT –III Web based tools for E-Commerce Web server hardware and software, web portals E-Commerce Software, web hosting services and packages,
managerial tools for decision-making. [10 Hrs]
UNIT – IV Security Technologies Security threats to E-Commerce, Encryption, Digital signatures, certifying authorities, public key cryptography, security protocols; secure socket layer, (SSL), secured electronic Transaction (SET),PKI. [10 Hrs]
UNIT – V Electronic Payment Systems Secure online Transaction models, e-cash, digital money, smart cards, credit and charge cards, e-wallet. Electronic Data Interchange (EDI): EDI basics, EDI on the Internet, supply chain management, software for purchasing, logistics and support activities. Cyber Law for E-Commerce, Legal, ethical and Tax issues, Case Studies. [10 Hrs]
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e-Security) First Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
Text Books:
S. No.
Title Author(s) Publisher
1. Electronic Commerce Pete Loshin and
P.A.Murphy
Jaico Publishing House
2. Electronic Commerce Gary Schneider and
James T. Perry Thomson learning
3. Designing systems for Internet
Commerce Treese
Addison Wesley
Reference Books:
S. No.
Title Author(s) Publisher
1. Frontiers of E-Commerce
Kalakota Addition Wesley
2. E-Commerce: The cutting edge of
Business
Nag, Kamlesh Bajaj &
Debjani Tata McGraw Hill
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e-Security) First Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
DATA & KNOWLEDGE SECURITY LABORATORY
Course Code 225191 IT L = 0 T = 0 P = 3 Credits = 2
Examination Scheme
ESE CT TA Total ESE Duration
75 - 75 150 -
Course Objectives Course Outcomes
The objective of data & knowledge security
laboratory is to make the students aware of
different open source operating system and
implementation of different network
topologies and configuration.
On successful completion of the course, the
student will be able to:
CO1: Implement installation of different operating
system.
CO2: Apply different tools for network management.
CO3: Apply different types of security threats.
Experiment No.1 Operating System Installation, Network Reconnaissance, Network Mapping, and Vulnerability Assessment lab. Installing VMWare so that students may run multiple operating systems
including initially Windows XP and Red Hat 7.2 versions. Vmware is a commercial software package that allows one physical machine to run multiple virtual machines simultaneously
Additionally, the first lab includes installation of initial network security tools. The initial tools
that are loaded include a network management tool for mapping and monitoring networks
(Cheops-NG), a security auditing and network mapping tool (nmap) , a vulnerability-scanning
tool (nessus) , a Windows XP scanning tool (Super Scan 4) , and a Windows reconnaissance
tool (Sam Spade). Lab highlights the need to carefully consider how much and what
information an organization should expose to the Internet in order to minimize exploitation.
Experiment No.2:
Experimenting with some of the password cracking tools available for Windows and Linux as
well as using a network sniffer named ethereal to sniff the network connection between Linux
and Windows computers. In addition, address resolution protocol (ARP) and ettercap tools
are used to examine how hackers carry out a Man-in-the-Middle attack. To crack passwords
on the Windows system, we use a program called L0phtCrack For the Linux system, we use
the software “John the Ripper” to crack the passwords. Ethereal is used to watch a telnet
session, capture packets from an SSH session, and to watch the network mapping tool nmap
work. In the second part of this lab, Address Resolution Protocol is explored and the theory of
address resolution protocol poisoning is experimented with. In addition, the tool hunt is used
to hijack a TCP session.
The goals of this lab include making students aware of how easy it is to obtain passwords,
sniff network traffic, and how attackers can exploit the characteristics of address resolution
protocol to take over sessions in the network. In this lab one computer with three virtual
machines is used to implement a LAN with three computers attached. The host computer has
Red Hat 8.0 (RH 8.0) installed with VMware.
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e-Security) First Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
The host computer uses VMware to implement two other Red Hat 7.2 computers and a Windows XP computer all on the same network Defense mechanisms such as password choices and defensive networks canning are used.
Experiment No.3
To implement the concept of falsifying identity upon a network. Both Ethernet Medium Access Control
addresses (MAC) as well as Internet Protocol (IP) address spoofing are examined and experimented
with. After successfully spoofing addresses, this lab also allows examination of how attackers may use
spoofing for several kinds of denial of service attacks. In particular, a Domain Name System Spoofing
tool (DNS spoof from the dsniff tools) is examined. In addition, a tool named dsniff , which includes the
capability to kill tcp sessions, is examined. To counter these types of attacks, the tool arp watch ,
which helps to detect spoofing attacks, is examined for effectiveness. The tool suite data pool , which
contains approximately 100 denial of service types of attacks, is also employed in this lab.
Experiment No.4: Experimenting With Network sniffer and password cracking tools such as
(a) Etherial (b) Wireshark (c) LAN tool (d) Packet analyzer (e) IP Watcher (f) Ether scan (g) PRTG Monitor (h) CAIN ANDABEL Experiment No.5: Experimenting With Cryptography Techniques
(a) Symmetric Encryption Scheme - Stream CipherRC4 (b) Symmetric Encryption Scheme - Block Cipher – SDES &3DES (c) Asymmetric Encryption Scheme – Block Cipher RSA (d) Block Cipher Modes-ECB,CBC,CFB,OFB (e) Hashing Schemes Experiment No.6: Experimenting With Web Services using crypto techniques
(a) Public Key Infrastructure (b) Authentication Schemes (c) Steganography Experiment No.7: Exercising with Network Enumeration (Identification) for
(a) System Identification (b) OS Detection (c) Port scanning and Services identification
Experiment No.08: Experimenting with Network System Threats
(a) Denial of Service DOS (b) Distributed Denial of Service DDOS (c) Sniffer
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e-Security) First Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
Experiment No.09: Experimenting with Malware tools
(a) Trojans and Backdoors (b) Virus and Antivirus Method
Experiment No.10: Experimenting with Web Vulnerabilities
(a) Web based password Capturing (b) SQL Injection (c) Buffer Overflow (d) Honey pots – FTP, Telnet
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e-Security) First Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
NETWORK SIMULATION LABORATORY
Course Code 225192 IT L = 0 T = 0 P = 3 Credits = 2
Examination Scheme
ESE CT TA Total ESE Duration
75 - 75 150 -
Course Objectives Course Outcomes
The objective of network simulation laboratory
is to make the students aware of different
network simulators which are helpful to
simulate network topology and testing
routing protocols.
On successful completion of the course, the
student will be able to:
CO1: Implement working of client server architecture
CO2: Apply different tools for testing network
topology.
CO3: Analyze different types file transfer protocol and
routing protocols.
LIST OF EXPERIMENTS
1. All the Programs to be written using C in UNIX Environment or simulators like NS2/NS3, Glomosim, Omnet PP, and Qualnet.
2. Simulation of ARP /RARP. 3. Develop a client that contacts a given DNS server to resolve a given hostname. 4. Simulation of OSPF routing protocol. 5. Develop a client server application for chat. 6. Develop a trace route program. 7. Signal handling and handling zombie. 8. Implementation of RPC. 9. Write a client to download a file from HTTP server. 10. Implementation of FTP. 11. Multiplexed TCP server and client. 12. Study of NS2 /Glomosim.
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SCHEME OF TEACHING AND EXAMINATION (Effective from 2020 – 2021 Batch)
M. Tech. (e Security) Second Semester
Sl. N
o.
Board of Studies
(BOS) Courses (Subject)
Course
Code
Period per
Week
Scheme of
Examination To
tal
Ma
rks
Cred
it L T P Theory/Lab
ESE CT TA
1. Information
Technology Trusted Internet 225201 IT 3 1 - 100 20 20 140 4
2. Information
Technology Business Ethics
and Cyber Laws
225202 IT 3 1 - 100 20 20 140 4
3. Information
Technology Advanced
Cryptography
225203 IT 3 1 - 100 20 20 140 4
4. Information
Technology Security Threats
and Management
225204IT 3 1 - 100 20 20 140 4
5. Information
Technology Elective – II 3 1 - 100 20 20 140 4
6. Information
Technology Secured Operating
System (Lab)
225291IT - - 3 75 - 75 150 2
7. Information
Technology Image Processing
and Security (Lab)
225292IT - - 3 75 - 75 150 2
Total Marks 15 5 6 650 100 250 1000 24
Elective-I
Sl. N
o.
Board of Studies (BOS) Courses (Subject) Course
Code
1. Information Technology Mobile Wireless Security 225221IT
2. Information Technology Grid Computing 225222IT
3. Information Technology Steganography & Water Marking 225223IT
Note:
(a) Abbreviations used: L-Lecture, T-Tutorial, P-Practical, ESE-End Semester Exam, CT- Class Test, TA-
Teacher's Assessment.
(b) Choice of elective course once made for an examination cannot be changed in future examinations.
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e Security) Second Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
Sl. N
o.
Board of Studies
(BOS) Courses (Subject)
Course
Code
Period per
Week
Scheme of
Examination To
tal
Ma
rks
Cred
it L T P Theory/Lab
ESE CT TA
1. Information
Technology Trusted Internet 225201 IT 3 1 - 100 20 20 140 4
2. Information
Technology Business Ethics
and Cyber Laws
225202 IT 3 1 - 100 20 20 140 4
3. Information
Technology Advanced
Cryptography
225203 IT 3 1 - 100 20 20 140 4
4. Information
Technology Security Threats
and Management
225204IT 3 1 - 100 20 20 140 4
5. Information
Technology Elective – II 3 1 - 100 20 20 140 4
6. Information
Technology Secured Operating
System (Lab)
225291IT - - 3 75 - 75 150 2
7. Information
Technology Image Processing
and Security (Lab)
225292IT - - 3 75 - 75 150 2
Total Marks 15 5 6 650 100 250 1000 24
Elective-I
Sl. N
o.
Board of Studies (BOS) Courses (Subject) Course
Code
1. Information Technology Mobile Wireless Security 225221IT
2. Information Technology Grid Computing 225222IT
3. Information Technology Steganography & Water Marking 225223IT
Note:
(a) Abbreviations used: L-Lecture, T-Tutorial, P-Practical, ESE-End Semester Exam, CT- Class Test, TA-
Teacher's Assessment.
(b) Choice of elective course once made for an examination cannot be changed in future examinations.
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e Security) Second Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
TRUSTED INTERNET
Course Code 225201 IT L = 3 T = 1 P = 0 Credits = 4
Examination Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number of class tests to be conducted = 02 Minimum assignments = 02
Course Objectives Course Outcomes
The objective of Trusted Internet is to make
the students aware of internet protocols,
different type of cyber-attack, its prevention
and data security techniques.
On successful completion of the course, the
student will be able to:
CO1: Apply concept of internet protocols.
CO2: Apply concept of cyber-attack.
CO3:Analyze concept of firewall and other
Security tools.
CO4: Analyze different data security techniques.
CO5:Apply concept of trusted operating
System.
UNIT – I Internet Understanding the Internet, Hardware Requirements to connect to the internet, Software requirements
and Internet Service Providers(ISP), Internet Addressing, Internet Protocol: Routing Information
Protocol (RIP), User Datagram Protocol (UDP), Transmission Control Protocol (TCP), Domain Name
Service (DNS), Basic Connectivity: Telnet, FTP, Internet Relay Chat (IRC). [10 Hrs]
UNIT – II Access Attacks
Hacker Techniques – Snooping, Eavesdropping, interception, Hacker’s motivation, Historical Hacking
Techniques; Advance Techniques, Targeted Hacker, Information Security Services–Confidentiality
,Integrity, Availability and Accountability. [8 Hrs]
UNIT – III Firewalls
Concepts, Types of Firewalls, Firewall Configuration, Design a Firewall Rule set, Purpose of Firewall,
Security role of a Firewall, Advantages and disadvantages of firewall, Firewall Components,
Procuring a Firewall, Administrating a firewall, firewall toolkits. [10 Hrs]
UNIT – IV Encryption Basic Concepts, Private Key Encryption, Public Key Encryption, Digital Signature, Trust in the System,
Encryption Algorithm–RSA Encryption, Blowfish Encryption. [10 Hrs]
UNIT – V Security Mechanism User Authentication, Attacks from inside the system, Attacks from outside the system, Protection
Mechanism: Snooping, Eavesdropping, interception, Trusted Systems, Trusted Computing Base,
Formal Models of Secure system, Multi-level security, designing trusted Operating System. [10 Hrs]
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e Security) Second Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
Text Books:
S. No.
Title Author(s) Publisher
1. Firewalls - A Complete Guide Marcus Goncalves Tata McGraw-Hill
2. The Internet – Complete Reference
Harley Hahn Tata McGraw-Hill
3. Cryptography and Network Security
William Stallings Pearson Education
Reference Books:
S. No.
Title Author(s) Publisher
1. Modern Operating Systems Andrew S. Tanenbaum Pearson Education
2. Unofficial Guide to Ethical Hacking
Ankit Fadia Macmillan India Ltd
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e Security) Second Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
BUSINESS ETHICS AND CYBER LAWS
Course Code 225202 IT L = 3 T = 1 P = 0 Credits = 4
Examination Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number of class tests to be conducted = 02 Minimum assignments = 02
Course Objectives Course Outcomes
The objective of Business Ethics and Cyber Laws
is to make the students aware of the concept of
business ethics and types of cybercrime, its
investigation and legal aspects of intellectual
property rights.
On successful completion of the course, the student will
be able to:
CO1: Analyze business ethics and corporate
responsibilities.
CO2: Apply different ethical practices in different
departments of organization.
CO3: Analyze cyber crime and its legal aspects.
CO4: Discuss IT act of India and legal jurisdiction.
CO5: Discuss different copyright issues.
UNIT – I Business Ethics Principles of Business Ethics- Ethical philosophies, Ethical management. Corporate Governance -
principles, mechanisms and control. Corporate Social Responsibility – approaches, social accounting,
auditing and reporting, Benefits of Corporate Social Responsibility. [10 Hrs]
UNIT – II Ethical Practices Creating an ethical organization. Workplace Ethics, Environment and Ethics, Ethics in Marketing and Consumer
Protection, Ethics in Accounting and Finance, Ethics in Human Resource Management, intellectual property and
skills. [8 Hrs]
UNIT – III Cyber Crimes:
Related concepts, distinction between cyber crimes and conventional crimes, Cyber criminals and their
objectives, Kinds of cyber crimes cyber-stalking, cyber pornography, forgery and fraud, crime related
to IPRs, cyber terrorism, computer vandalism etc. Cyber forensics, digital forensics and the law,
forensic evidence, digital forensic tools. [10 Hrs]
UNIT – IV Legal Issues in Cyber Crime Issues relating to investigation, issues relating to jurisdiction, issues relating to evidence, relevant
provisions under Information Technology Act 2000, Indian penal code, Pornography Act and Indian
Evidence Act. [10 Hrs]
UNIT – V Copyright Issues Linking, framing, protection of content on web site, international treaties, trade mark issues in
cyberspace, domain name dispute, cyber squatting, uniform dispute resolution policy, computer
software and related IPR (Intellectual Property Rights) issues. [10 Hrs]
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e Security) Second Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
Text Books:
S. No.
Title Author(s) Publisher
1. Business: Its Legal, Ethical, and Global Environment
Marianne Moody Jennings
Cengage Learning India
2. Cyber Law: The Law of the Internet
Jonathan Rosenoer Springer
Reference Books:
S. No.
Title Author(s) Publisher
1. Computer Forensics and Investigations
Nelson, Phillips Cengage Learning India.
2. Managing Intellectual Property Vinod V.Sople PHI Learning Private Limited.
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e Security) Second Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
ADVANCED CRYPTOGRAPHY
Course Code 225203 IT L = 3 T = 1 P = 0 Credits = 4
Examination Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number of class tests to be conducted = 02 Minimum assignments = 02
Course Objectives Course Outcomes
The objective of Advanced Cryptography is to
make the students aware different encryption and
decryption techniques, requirement of
authentication and future trends in cryptography.
On successful completion of the course, the student will
be able to:
CO1: Apply the concept of data security.
CO2: Analyze working to cryptographic techniques.
CO3: Analyze the feature of authentication requirement
for network.
CO4: Apply the concept of quantum
Cryptography.
CO5: Discuss the future trends in cryptography.
UNIT – I OSI security architecture
Classical encryption techniques , Cipher principles ,Data encryption standard , Block cipher design
principles and modes of operation ,Evaluation criteria for AES , AES cipher, Triple DES, Placement of
encryption function, Traffic confidentiality. [10 Hrs]
UNIT – II Key management
Diffie Hellman key exchange, Elliptic curve architecture and cryptography, Introduction to number
theory, Confidentiality using symmetric encryption, Public key cryptography and RSA. [8 Hrs]
UNIT –III Authentication requirements
Authentication functions, Message authentication codes, Hash functions, Security of hash functions
and MACS, MD5 Message Digest algorithm , Secure hash algorithm , Rip end , HMAC digital
signatures , Authentication protocols. [10 Hrs]
UNIT – IV Quantum Cryptography and Quantum Teleportation
Heisenberg uncertainty principle, polarization states of photons, quantum cryptography using polarized
photons, local vs. non local interactions, entanglements, EPR paradox, Bell’s theorem, Bell basis,
teleportation of a single qubit – theory and experiments. [10 Hrs]
UNIT – V Future trends
Review of recent experimental achievements, study on technological feasibility of a quantum
computer, candidate physical systems and limitations imposed by noise. [10 Hrs]
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e Security) Second Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
Text Books:
S. No.
Title Author(s) Publisher
1. Cryptography and Network Security - Principles and Practices
William Stallings Prentice Hall of India
2. Cryptography and Network Security
Atul Kahate Tata McGraw Hill
Reference Books:
S. No.
Title Author(s) Publisher
1. Feynman lectures on computation
R.P. Feynman, Penguin Books
2. Introduction to quantum computers
Gennady P. Berman, Gary D. Doolen, Ronnie Mainiri & ValdmisItri Frinovich,
World Scientific, Singapore
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e Security) Second Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
SECURITY THREATS AND MANAGEMENT
Course Code 225204 IT L = 3 T = 1 P = 0 Credits = 4
Examination Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number of class tests to be conducted = 02 Minimum assignments = 02
Course Objectives Course Outcomes
The objective of Security Threats and
Management is to make the students aware
of different security threats in cyber world,
importance of security privileges and
intrusion detection system.
On successful completion of the course, the
student will be able to:
CO1: Apply the concept of security threats in cyber
world.
CO2: Analyze different network threats.
CO3: Analyze the working of security threat
management.
CO4: Analyze security privileges threat.
CO5: Apply the concept of Firewall.
UNIT – I Introduction
Security threats, Sources of security threats, Motives, Target Assets and vulnerabilities, Consequences
of threats, E-mail threats, Web-threats, Intruders and Hackers, Cyber crimes. [10 Hrs]
UNIT – II Network Threats
Active/ Passive , Interference , Interception , Impersonation , Worms , Virus , Spams , Adware , Spy
ware , Trojans , Backdoors , Bots, IP Spoofing , ARP spoofing , Session Hijacking , Sabotage-Internal
treats, Environmental threats , Threats to Server security. [8 Hrs]
UNIT –III Security Threat Management
Tree codes and trellis codes, polynomial description of convolution codes, distance notions for
convolutional codes, generation function, matrix description of convolution codes, viterbi decoding of
convolutional codes, distance bounds for convolutional codes, turbo codes and turbo decoding. [10 Hrs]
UNIT – IV Security Privileges and Credentials
Risk Assessment, Forensic Analysis, Security threat correlation , Threat awareness , Vulnerability
sources and assessment, Vulnerability assessment tools ,Threat identification, Threat Analysis,
Threat Modeling, Model for Information Security Panning. [10 Hrs]
UNIT – V Firewalls & Intrusion Detection Systems
Firewalls, Types, Dynamic packet filtering content filtering , Crypto capable Routers, VPNs , Secure
Modems , Intrusion Detection Systems , Types , Intrusion Detection Tools , Penetration testing,
Intrusion Analysis, Log file Monitors , Honey pots , Intrusion Prevention Systems , Trusted Systems.
[10 Hrs]
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e Security) Second Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
Text Books:
S. No.
Title Author(s) Publisher
1. Computer Network Security
Joseph M Kizza Springer
2. Threat Modeling
Swiderski, Frank,
Syndex Microsoft Press
3.
IT Security Management: IT Securities -
Setting up an IT Security Function
Alberto Partida, Diego
Andina Springer
Reference Books:
S. No.
Title Author(s) Publisher
1. Information Security Intelligence:
Cryptographic Principles & Application
Thomas Calabrese,Tom
Calabrese
Thomson Delmar Learning
2. Firewalls & Internet Security
William. R Cheswick,
Steven M. Bellowin,
Aviel D Rubin
Addison Wesley Professional
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e Security) Second Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
MOBILE WIRELESS SECURITY(ELECTIVE II)
Course Code 225221IT L = 3 T = 1 P = 0 Credits = 4
Examination Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number of class tests to be conducted = 02 Minimum assignments = 02
Course Objectives Course Outcomes
The objective of Mobile Wireless Security is to
make the students aware of wireless
network, different policy issues of network
along with different security threats and
possible solutions.
On successful completion of the course, the
student will be able to:
CO1: Apply different concepts of wireless network.
CO2: Discuss possible network solutions.
CO3: Analyze the importance of wireless network
security.
CO4: Apply concept of network services
CO5: Apply the concept of mobile commerce.
UNIT – I Wireless Fundamentals Wireless Hardware, Wireless Network Protocols, Wireless Programming, Wired Equivalent Privacy
(WEP) Security. Wireless Cellular Technologies, concepts, Wireless reality, Security essentials,
Information classification standards, Wireless Threats: Cracking WEP - Hacking Techniques,
Wireless Attacks, Air borne Viruses. [10 Hrs]
UNIT – II Standards and Policy Solutions
Network Solutions, Software Solutions, Physical Hardware Security, Wireless Security, Securing
WLAN, Virtual Private Networks , Intrusion Detection System, Wireless Public Key infrastructure,
Tools , Auditing tools , Pocket PC hacking , wireless hack walkthrough. [8 Hrs]
UNIT –III Security Issues
Authentication, Access control and Authorization, Non-repudation, privacy and Confidentiality,
Integrity and Auditing, Security analysis process. Privacy in Wireless World, Legislation and Policy,
Identify targets and roles analysis, Attacks and vulnerabilities, Analyze mitigations and protection.
[10 Hrs]
UNIT – IV Implementation Issues WLAN Configuration, IEEE 802.11, Physical layer ,media access frame format , systematic exploitation of
802.11b, WLAN, WEP – WEP Decryption script , overview of WEP attack , Implementation ,
Analyses of WEP attacks. [10 Hrs]
UNIT – V Mobile Commerce
Reputation and Thrust, Intrusion detection , Vulnerabilities analysis of mobile commerce platform,
Secure authentication for mobile users , Mobile Commerce security , Payment methods, Mobile
Coalition key evolving Digital Signatures scheme for wireless mobile networks. [10 Hrs]
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e Security) Second Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
Text Books:
S. No.
Title Author(s) Publisher
1. Wireless Security Essentials: Defending
Mobile from Data Piracy Russel Dean Vines
John Wiley&Sons
2. Maximum Wireless Security
Cyrus , Peikari, Seth
Fogie. SAMS Publishing
3.
Mobile and Wireless Network Security
and Privacy
S. Kami Makki Springer
Reference Books:
S. No.
Title Author(s) Publisher
1.
Wireless Security and Privacy- Best
Practices and Design Techniques
Tara M. Swaminathan,
Charles R. Eldon Addison Wesley
2. 802.11 Security
Bruce Potter, Bob Fleck O’Reilly Publications
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e Security) Second Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
GRID COMPUTING (ELECTIVE II)
Course Code 225222IT L = 3 T = 1 P = 0 Credits = 4
Examination Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number of class tests to be conducted = 02 Minimum assignments = 02
Course Objectives Course Outcomes
The objective of Grid Computing is to make
the students aware of basic concept of grid
computing, grid computing architecture and
new trends in grid computing.
On successful completion of the course, the
student will be able to:
CO1: Analyze grid computing concept.
CO2: Discuss challenges of grid computing.
CO3:Analyze the working of system architecture of
grid computing
CO4: Discuss different computing paradigms
CO5: Discuss different emerging areas in grid
computing.
UNIT – I Introduction Grid Computing: values and risks – History of Grid computing, Grid computing model and protocols,
Overview and types of Grids. [10 Hrs]
UNIT – II Desktop Grids
Background, Definition, Challenges, Technology, Suitability, Grid server and practical uses, Clusters
and Cluster Grids, HPC Grids, Scientific in sight, Application and Architecture, HPC application,
Development Environment and HPC Grids, Data Grids, Alternatives to Data Grid, Data Grid
architecture. [8 Hrs]
UNIT –III Architecture and Services
The open Grid services Architecture, Analogy, Evolution, Overview, Building on the OGSA platform,
Implementing OGSA based Grids, Creating and Managing services, Services and the Grid, Service
Discovery, Tools and Toolkits, Universal Description Discovery and Integration(UDDI). [ 10 Hrs]
UNIT – IV Computing Paradigms Desktop Supercomputing, Parallel Computing, Parallel Programming Paradigms, Problems of Current
parallel Programming Paradigms, Desktop Supercomputing Programming Paradigms, Parallelizing
Existing Applications, Grid Enabling Software Applications, Needs of the Grid users, methods of Grid
Deployment, Requirements for Grid enabling Software, Grid Enabling Software Applications. [10 Hrs]
UNIT – V Emerging Areas
Application integration, Application classification, Grid requirements, Integrating applications with
Middleware platforms, Grid enabling Network services, Managing Grid environments, Managing
Grids, Management reporting, Monitoring, Data catalogs and
replicamanagement,Portals,DifferentapplicationareasofGridcomputing. [10 Hrs]
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e Security) Second Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
Text Books:
S. No.
Title Author(s) Publisher
1. Grid Computing: A Practical Guide to
Technology and Applications Ahmar Abbas
Firewall Media
2. Grid Computing
Joshy Joseph and Craig Fellenstein
Pearson Education
Reference Books:
S. No.
Title Author(s) Publisher
1. Grid Blue Print for New Computing Infrastructure
Ian Foster and Carl Kesselman
Morgan Kaufmann
2. Grid Computing: Making the Global Infrastructure a Reality
Fran Berman, Geoffrey Fox and Anthony J. G. Hey
Willy Publisher
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e Security) Second Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
STEGANOGRAPHY & WATER MARKING(ELECTIVE II) Course Code 225223IT L = 3 T = 1 P = 0 Credits = 4
Examination Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number of class tests to be conducted = 02 Minimum assignments = 02
Course Objectives Course Outcomes
The objective of Steganography & Water
Marking is to make the students aware of
different information hiding techniques, tools
used in information hiding along with legal
aspects.
On successful completion of the course, the
student will be able to:
CO1: Analyze the basic concept of information hiding.
CO2: Implement different algorithms used in
information hiding.
CO3: Apply of hidden information retrieving concept.
CO4: Apply different watermarking techniques.
CO5:Discuss different application areas of
watermarking.
UNIT – I Introduction to Information hiding Brief history and applications of information hiding, Principles of Steganography, Frameworks for
secret communication , Security of Steganography systems , Information hiding in noisy data,
Adaptive versus non adaptive algorithms , Laplace filtering Using cover models, Active and malicious
attackers, Information hiding in written text, Examples of invisible communications. [10 Hrs]
UNIT – II Survey of Steganographic techniques
Substitution system and bit plane tools, Transform domain techniques, Spread spectrum and
information hiding, Statistical Steganography, Distortion and code generation techniques, Automated
generation of English text. [8 Hrs]
UNIT –III Steganalysis
Detecting hidden information: text, audio, video and images, Extracting hidden information, Disabling
hidden information, Watermarking techniques, Basic Message Coding, Error Correction coding ,
Information Theoretic analysis and design issues, Evaluation and benchmarking of watermarking
system. [10 Hrs]
UNIT – IV Survey of current watermarking techniques Cryptographic and psycho visual aspects, Choice of a workspace: binary image, audio, video. Formatting
the watermark beds - Digital watermarking schemes: Spread Spectrum, DCT(Discrete Cosine Transform),
Domain and Quantization schemes, Watermarking with side information , Robustness to temporal and
geometric distortions. [10 Hrs]
UNIT – V Data Right Management
DRM Products and Laws, Fingerprints – Examples, Protocols and Codes– Boneh-Shaw finger printing
Scheme ,Steganography and watermarking applications –Military, Digital copyright protection and
Protection of intellectual property. [10 Hrs]
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e Security) Second Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
Text Books:
S. No.
Title Author(s) Publisher
1.
Information hiding techniques for
Steganography and Digital
Watermarking,
Stefan Katzenbelsser
and Fabien A. P.
Petitcolas,
ARTECH House Publishers
2. Digital Water Marking and
Steganography,
I.J. Cox, M.L. Miller,
J.Fridrich and T.Kalker,
2ndEdition, Morgan
Kauffman Publishers
3.
Information Hiding: Steganography and
Watermarking - Attacks and
Countermeasures
Johnson, Neil F. ,Duric,
Zoran,Jajodia, Sushil G
Advances in Information
Security
Reference Books:
S. No.
Title Author(s) Publisher
1.
Disappearing Cryptography:
Information Hiding, Steganography
and Watermarking
Peter Wayner Elsevier
2. N. Ferguson and B.Schneier
Practical Cryptography Wiley Publishing Inc.
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e Security) Second Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
SECURED OPERATING SYSTEM LABORATORY
Course Code 225291IT L = 0 T = 0 P = 3 Credits = 2
Examination Scheme
ESE CT TA Total ESE Duration
75 - 75 150 -
Course Objectives Course Outcomes
The objective of secured operating system
laboratory is to make the students aware of
importance of open source operating
system and different security threats and
possible solutions to counter them.
On successful completion of the course, the
student will be able to:
CO1: Implement installation of different operating
system.
CO2: Apply different tools for network management.
CO3: Discuss different types of security threats.
List of Experiments:
(Implement the following on LINUX platform. Use C for high level language implementation)
1. Shell programming
–command syntax
2. write simple functions
–basic tests
3. Shell programming
-loops
-patterns
-expansions
-substitutions
4. Write programs using the following system calls of UNIX operating system: fork, exec, get
pid, exit, wait, close , stat, open dir, read dir
5. Write programs using the I/O system calls of UNIX operating system (open, read,
6. Write, etc.)
7. Write C programs to simulate UNIX commands like ls, grep etc.
8. Given the list of processes, their CPU burst times and arrival times, display/print the Gantt
chart for FCFS and SJF. For each of the scheduling policies, compute and print the average
waiting time and average turnaround time
9. Given the list of processes, their CPU burst times and arrival times, display/print the Gantt
chart for Priority and Round robin. For each of the scheduling policies, compute and print the
average waiting time and average turnaround time
10. Implement the Producer – Consumer problem using semaphores.
11. Write a shell script to scan current operating system security settings.
12. Write a program to create a secured pipe for Inter-Process Communication.
13. Identify Vulnerabilities (Potential Threats) of Operating System and Security features.
14. Identify and analyze Buffer over flow problem.
15. Implement some memory management schemes
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e Security) Second Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
16. Free space is maintained as a linked list of nodes with each node having the starting byte
address and the ending byte address of a free block. Each memory request consists of the process-
id and the amount of storage space required in bytes. Allocated memory space is again maintained
as a linked list of nodes with each node having the process-id, starting byte address and the
ending byte address of the allocated space.
17. Implement some memory management schemes – II for e.g. When a process finishes (taken as input) the appropriate node from the allocated list should be deleted and this free disk space should be added to the free space list. Care should be taken to merge contiguous free blocks into one single block. This results in deleting more than one node from the free space list and changing the start and end address in the appropriate node. For allocation use first fit, worst fit and best fit.
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)
SYLLABUS
M. Tech. (e Security) Second Semester
November 2020 1.00 Applicable for
AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version
IMAGE PROCESSING & SECURITY LABORATORY
Course Code 225192 IT L = 0 T = 0 P = 3 Credits = 2
Examination Scheme
ESE CT TA Total ESE Duration
75 - 75 150 -
Course Objectives Course Outcomes
The objective of image processing &security
laboratory is to make the students aware of
importance of image processing and different
tools and algorithm used in image
processing.
On successful completion of the course, the
student will be able to:
CO1: Implement installation of image processing
software.
CO2: Apply different tools used for image processing.
CO3: Apply different image filtering and
transformation concepts.
LIST OF EXPERIMENTS
1. Study and Analyze important Image Processing toolbox functions with at least two standard images like
Cameraman, Lena, Monkey, and others.
2. Write a program for Image reading and displaying the results in matrix form and hence changing the
matrix elements by multiplying with the factor 0.001 and hence writing to a file with extension .jpeg
format and hence plot a histogram.
3. Write a program for performing Point-to-point transformation.
4. Write a program for performing Morphological operations .(The operations that can be performed are
erosion, dilation, opening, closing, open-close, close-open.)
5. Write a program to hide a word in an image file and retrieve it (Stenography).
6. Histogram equalization. This experiment illustrates the relationship among the intensities (gray levels) of
an image and its histogram. It shows how to improve the image by equalizing the histogram.
7. Write a program for performing Geometric transformations by using translation , rotation scaling of
given image.
8. Write a program for performing Linear filtering using convolution. After completing this experiment
every student should understand the concepts of filtering using linear convolution.
9. Write a program for applying highly selective filters upon input images. In this experiment students
appreciate the effects on an image after a highly selective filter is applied to it.
10. Write a program for performing Non Linear filtering upon input images using convolution masks. This
experiment allows students to understand the effects of a median filter on an image corrupted with
impulsive noise.
11. Write a program to use Entropy as a compression measure upon input images. This experiment
introduces students to entropy as compression measurement to the DPCM compression measure.
12. Write a program for performing Edge detection upon input images. This experiment enables students to
understand the concept of edge detectors and their operation in noisy images.
13. Write a program for Converting Color to Gray Scale and hence enhancement with segmentation.