Seth Balkrishan Memorial Bhilai Institute of Technology,Durg

39
Seth Balkrishan Memorial Bhilai Institute of Technology,Durg (An Autonomous Institute affiliated to CSVTU Bhilai) SCHEME OF TEACHING AND EXAMINATION (Effective from 2020 2021 Batch) M.Tech. (e-Security) First Semester Sl. No. Board of Studies (BOS) Courses (Subject) Course Code Period per Week Scheme of Examination Total Marks Credit L T P Theory/Lab ESE CT TA 1. Information Technology Mathematical Foundation of Information Security 225101IT 3 1 - 100 20 20 140 4 2. Information Technology Network System Architecture 225102 IT 3 1 - 100 20 20 140 4 3. Information Technology Data and Knowledge Security 225103 IT 3 1 - 100 20 20 140 4 4. Information Technology Coding Techniques for Secure Transaction 225104 IT 3 1 - 100 20 20 140 4 5. Information Technology Elective-I 3 1 - 100 20 20 140 4 6. Information Technology Data & Knowledge Security( Lab) 225191 IT - - 3 75 - 75 150 2 7. Information Technology Network Simulation (Lab) 225192 IT - - 3 75 - 75 150 2 Total Marks 15 5 6 650 100 250 1000 24 Elective-I Sl. No. Board of Studies (BOS) Courses (Subject) Course Code 1. Information Technology Security Issues In Operating System 225121 IT 2. Information Technology Distributed Systems 225122 IT 3. Information Technology E Commerce & Web Security 225123 IT Note: (a) Abbreviations used: L-Lecture, T-Tutorial, P-Practical, ESE-End Semester Exam, CT- Class Test, TA- Teacher's Assessment. (b) Choice of elective course once made for an examination cannot be changed in future examinations.

Transcript of Seth Balkrishan Memorial Bhilai Institute of Technology,Durg

Seth Balkrishan Memorial

Bhilai Institute of Technology,Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SCHEME OF TEACHING AND EXAMINATION (Effective from 2020 – 2021 Batch)

M.Tech. (e-Security) First Semester

Sl. N

o.

Board of Studies

(BOS) Courses (Subject)

Course

Code

Period per

Week

Scheme of

Examination To

tal

Ma

rks

Cred

it L T P Theory/Lab

ESE CT TA

1. Information

Technology

Mathematical

Foundation of

Information

Security

225101IT 3 1 - 100 20 20 140 4

2. Information

Technology Network System

Architecture 225102 IT 3 1 - 100 20 20 140 4

3. Information

Technology Data and

Knowledge Security 225103 IT 3 1 - 100 20 20 140 4

4.

Information

Technology Coding Techniques

for Secure

Transaction

225104 IT 3 1 - 100 20 20 140 4

5. Information

Technology Elective-I 3 1 - 100 20 20 140 4

6. Information

Technology Data & Knowledge

Security( Lab) 225191 IT - - 3 75 - 75 150 2

7. Information

Technology Network Simulation

(Lab) 225192 IT - - 3 75 - 75 150 2

Total Marks 15 5 6 650 100 250 1000 24

Elective-I

Sl. N

o.

Board of Studies (BOS) Courses (Subject) Course

Code

1. Information Technology Security Issues In Operating System 225121 IT

2. Information Technology Distributed Systems 225122 IT

3. Information Technology E – Commerce & Web Security 225123 IT

Note:

(a) Abbreviations used: L-Lecture, T-Tutorial, P-Practical, ESE-End Semester Exam, CT- Class Test, TA-

Teacher's Assessment.

(b) Choice of elective course once made for an examination cannot be changed in future examinations.

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e-Security) First Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

Sl. N

o.

Board of Studies

(BOS) Courses (Subject)

Course

Code

Period per

Week

Scheme of

Examination To

tal

Ma

rks

Cred

it L T P Theory/Lab

ESE CT TA

1. Information

Technology

Mathematical

Foundation of

Information

Security

225101IT 3 1 - 100 20 20 140 4

2. Information

Technology Network System

Architecture 225102 IT 3 1 - 100 20 20 140 4

3. Information

Technology Data and

Knowledge Security 225103 IT 3 1 - 100 20 20 140 4

4.

Information

Technology Coding Techniques

for Secure

Transaction

225104 IT 3 1 - 100 20 20 140 4

5. Information

Technology Elective-I 3 1 - 100 20 20 140 4

6. Information

Technology Data & Knowledge

Security( Lab) 225191 IT - - 3 75 - 75 150 2

7. Information

Technology Network Simulation

(Lab) 225192 IT - - 3 75 - 75 150 2

Total Marks 15 5 6 650 100 250 1000 24

Elective-I

Sl. N

o.

Board of Studies (BOS) Courses (Subject) Course

Code

1. Information Technology Security Issues In Operating System 225121 IT

2. Information Technology Distributed Systems 225122 IT

3. Information Technology E – Commerce & Web Security 225123 IT

Note:

(a) Abbreviations used: L-Lecture, T-Tutorial, P-Practical, ESE-End Semester Exam, CT- Class Test, TA-

Teacher's Assessment.

(b) Choice of elective course once made for an examination cannot be changed in future examinations.

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e-Security) First Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

MATHEMATICAL FOUNDATION OF INFORMATION SECURITY

Course Code 225101 IT L = 3 T = 1 P = 0 Credits = 4

Examination Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number of class tests to be conducted = 02 Minimum assignments = 02

Course Objectives Course Outcomes

The objective of Mathematical Foundation of

Information Security is to make the students

aware of set theory, graph theory and

hamming code technique which is helpful in

various areas like communication where data

security plays a important role.

On successful completion of the course, the

student will be able to:

CO1: Analyze the concept of set theory.

CO2: Apply the principles of circuits and tree.

CO3: Discuss the feature of group theory and

hamming code.

CO4: Analyze the importance of set theory.

CO5: Implement the concept of cryptography.

UNIT – I Introduction to Set Theory

Basic concept of set theory, Rough Set theory, Relations, Properties of relation in a set, Equivalence relation,

Composition of relations, Partial order & total order relations, Lattices & Hasse diagram, Introduction to

function, Inverse, Identity, Injective, Surjective & Bijective functions, Composition of functions and some

special functions. [10 Hrs]

UNIT – II Introduction to Graph Theory

Introduction to graph theory, Walks, Paths & Circuits, Types of graphs, Shortest path problems, Euclidian and

Hamiltonian graphs, Basic concept of tree: Spanning tree, Minimum Spanning tree, Search tree, Rooted Binary

tree, Cut sets, Network flow, Matrix representation of graphs. [8 Hrs]

UNIT – III Group Theory and Coding

Basic concept of Group theory, Homomorphism and Isomorphism of groups, COSETS and Lagrange’s Theorem,

Elements of Coding theory, Group codes, Decoding, Hamming matrices, The Parity check and Generator

Matrices. [10 Hrs]

UNIT – IV Introduction to Number Theory

Facts from elementary number theory, Fundamental theorem of arithmetic, G.C.D., Modular Operator, Euclid’s

algorithm, Modular arithmetic, Fermat’s little theorem, Euler’s Theorem, Modular Multiplicative Inverse,

Primarily Testing. [10 Hrs]

UNIT – V Introduction to Cryptography

Introduction to Cryptography, Encryption, Decryption, Integer Factoring Problem, Discrete Logarithm Problem,

Hash Function, Digital Signature, Symmetric key Cryptosystem, Public key Cryptosystem, Diffie-Hellman Key

Exchange, RSA Cryptosystem, ElGamal Cryptosystem, Elliptic Curve Cryptosystem. [10 Hrs]

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e-Security) First Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

Text Books:

S. No.

Title Author(s) Publisher

1. Discrete Mathematical Structures with applications to Computer Science

J.P. Tremblay and R. Manohar

Tata McGraw-Hill

2. A Text Book of Discrete Mathematics Swapan Kumar Sarkar S. Chand & Company Ltd.

3. Elementary Number Theory Gareth A. Jones, Josephine Mary Jones

Springer-Verlag

Reference Books:

S. No.

Title Author(s) Publisher

1. Elements of Discrete Mathematics C.L. Liu Tata McGraw-Hill

2. Graph theory with Applications to Engineering and Computer Science

Narsingh Deo Prentice Hall of India

3. Discrete Mathematics for Computer Scientists and Mathematicians

J.L. Mott, A. Kandel, and T.P. Baker

Prentice Hall of India

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e-Security) First Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

NETWORK SYSTEM ARCHITECTURE

Course Code 225102 IT L = 3 T = 1 P = 0 Credits = 4

Examination Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number of class tests to be conducted = 02 Minimum assignments = 02

Course Objectives Course Outcomes

The objective of network system architecture

is to make the students aware of ISO layer

and working to different internet protocol

along with different network topology and its

implementation.

On successful completion of the course, the

student will be able to:

CO1: Analyze various ISO layer protocols.

CO2: Analyze working to data link layer.

CO3: Apply the feature of LAN and WAN and its

working

CO4: Discuss the importance of network security.

CO5: Implement the concept of IEEE protocol and

Bluetooth.

UNIT – I OSI:ISO Layer Protocols Application Layer Protocols-TCP/IP, HTTP, SHTTP, LDAP, MIME,-POP& POP3-RMON-SNTP-SNMP.

Presentation Layer Protocols-Light Weight Presentation Protocol Session layer protocols –RPC protocols-

transport layer protocols-ITOT,RDP,RUDP,TALI,TCP/UDP, compressed TCP. Network layer Protocols –

routing protocols-border gateway protocol-exterior gateway protocol-internet protocol IPv4- IPv6- Internet

Message Control Protocol- IRDP- Mobile IP – Mobile Support Protocol for IPv4 and IPv6 – Resource

Reservation Protocol. Multi-casting Protocol – VGMP – IGMP–MSDP. [10 Hrs]

UNIT – II Data Link layer Protocol ARP – In ARP – IPCP – IPv6CP – RARP – SLIP .Wide Area and Network Protocols- ATM protocols – Broadband Protocols – Point to Point Protocols – Other WAN Protocols- security issues. [8 Hrs]

UNIT – III Local Area Network and LAN Protocols ETHERNET Protocols – VLAN protocols – Wireless LAN Protocols – Metropolitan Area Network Protocol – Storage Area Network and SAN Protocols -FDMA, WIFI and WIMAX Protocols- security issues. [10 Hrs]

UNIT – IV Introduction to Number Theory AAA Protocols – Tunneling Protocols – Secured Routing Protocols – GRE- Generic Routing

Encapsulation – IPSEC – Security architecture for IP – IPSECAH – Authentication Header – ESP – IKE –

ISAKMP and Key management Protocol. IEEE 802.11 - Structure of 802.11 MAC – WEP- Problems with

WEP – Attacks and Risk- Station security – Access point Security – Gate way Security – Authentication and

Encryption. [10 Hrs]

UNIT – V Protocols and Services IEEE 802.15 and Bluetooth – WPAN Communication Protocols – IEEE 802.16- IEEE 802.16A.WCDMA – Services – WCDMA Products – Networks- device addressing – System Addressing – Radio Signaling Protocol – Multimedia Signaling Protocol. [10 Hrs]

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e-Security) First Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

Text Books:

S. No.

Title Author(s) Publisher

1. Networks Protocols Handbook Jawin Jawin Technologies Inc.

2. 802.11 Security Bruce Potter, Bob

Fleck O’Reilly Publications

Reference Books:

S. No.

Title Author(s) Publisher

1. Introduction to CDMA- Network services Technologies and Operations

Lawrence Harte, Althos Publishing,

2. Introduction to WIMAX Lawrence Harte Althos Publishing

3. Introduction to WCDMA Lawrence Harte, Althos Publishing

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e-Security) First Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

DATA & KNOWLEDGE SECURITY

Course Code 225103 IT L = 3 T = 1 P = 0 Credits = 4

Examination Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number of class tests to be conducted = 02 Minimum assignments = 02

Course Objectives Course Outcomes

The objective of data &knowledge security is to

make the students aware data security and

integrity and also interoperability of

database. Students should able to

understand importance of knowledgebase

and database.

On successful completion of the course, the

student will be able to:

CO1: Analyze the concept of data security.

CO2: Apply the concept of Distributed Database.

CO3: Analyze the role of database administrator.

CO4: Apply the concept of knowledge base.

CO5: Implement the concept of expert system.

UNIT – I Data Security Database systems- architectures- storage structures- storage issues in Database Management

Systems- Security of data at various levels of Database Management Systems. [10 Hrs]

UNIT – II Distributed Databases Distributed Data Processing- Distributed Database system- Distributed Database Management System

Architecture: Architectural models for Distributed Database Management System – Global directory issues – Distributed database design – distributed design issues – fragmentation –Allocation. [8 Hrs]

UNIT –III Semantic Data Control View Management – Data centralized Authorization control – Distributed Authorization control – centralized

Semantic Integrity Control - Centralized Semantic Integrity Control-Database interoperability-issues related

to security in database interoperability. [10 Hrs]

UNIT – IV Knowledge base systems Knowledge base system design – storage of knowledge – various formats – Levels of security issues in

Knowledge base system design – conceptual level – implementation level. [10 Hrs]

UNIT – V Expert Systems Design of Expert systems – Knowledge representation techniques in Expert system – structured,

semi structured and unstructured data – Knowledge Management and security issues. [10 Hrs]

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e-Security) First Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

Text Books:

S. No.

Title Author(s) Publisher

1. Security in Computing Charles P. Pfleeger and Shari Lawrence Pfleeger

Pearson Education

2. Principles of Distributed Database Systems, Second Edition

M.Tamer OZSU and Patrick Valdureiz

Pearson Education

Reference Books:

S. No.

Title Author(s) Publisher

1. Artificial Intelligence: A Modern approach Stuart Russel and Peter Norwig

Pearson Education

2. Knowledge Management Ganesh Natarajan and Sandhya Shekhar

Tata McGraw Hill

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e-Security) First Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

CODING TECHNIQUES FOR SECURE TRANSACTION

Course Code 225104 IT L = 3 T = 1 P = 0 Credits = 4

Examination Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number of class tests to be conducted = 02 Minimum assignments = 02

Course Objectives Course Outcomes

The objective of coding techniques for secure

transaction is to make the students aware of

different mathematical techniques of secure

channel transmission along with data and

video compression techniques.

On successful completion of the course, the

student will be able to:

CO1: Analyze the concept of various channel coding

techniques.

CO2: Analyze working to data encryption decryption

techniques.

CO3: Analyze the working of convolution code.

CO4: Apply the concept of compression techniques.

CO5: Implement the concept of video compression.

UNIT – I Channel capacity and coding Channel models, channel capacity, channel coding, information capacity theorem, random selection of

codes. Error control coding: linear block codes and their properties, decoding of linear block code, perfect

codes, hamming codes, optimal linear codes and MDS codes. [10 Hrs]

UNIT – II Cyclic codes Polynomials, division algorithm for polynomials, a method for generating cyclic codes, matrix description of cyclic codes, burst error correction, fire codes, golay codes, CRC codes, circuit implementation of cyclic codes. BCH codes: minimal polynomials, generator polynomial for BCH codes, decoding of BCH codes, Reed-Solomon codes and nested codes. [8 Hrs]

UNIT –III Convolution codes Tree codes and trellis codes, polynomial description of convolutional codes, distance notions for convolutional codes, generation function, matrix description of convolutional codes, viterbi decoding of convolutional codes, distance bounds for convolutional codes, turbo codes and turbo decoding. [10 Hrs]

UNIT – IV Compression Lossless and lossy, Huffman codes, Binary Image compression schemes; Run –length Encoding; CCITT group-3 1D compression; CCITT group-3 2D compression; CCITT group-4 2D compression. [10 Hrs]

UNIT – V Video Image Compression Requirement of full motion video compression; CCITT H 261video coding algorithm; MPEG compression methodology; MPEG-2 compression; Audio (Speech)compression [10 Hrs]

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e-Security) First Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

Text Books:

S. No.

Title Author(s) Publisher

1. Digital Communication Das, Mullick& Chatterjee

New Age Pub.

2. Digital Communication Proakis TMH

3. Information theory, coding and cryptography

Ranjan Bose Tata McGraw Hill

Reference Books:

S. No.

Title Author(s) Publisher

1. Information theory and coding

Viterbi, McGraw Hill

2. Digital Communications

John G. Proakis McGraw Hill

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e-Security) First Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

SECURITY ISSUES IN OS (Elective I) Course Code 225121 IT L = 3 T = 1 P = 0 Credits = 4

Examination Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number of class tests to be conducted = 02 Minimum assignments = 02

Course Objectives Course Outcomes

The objective of Security Issues in OS is to

make the students aware of different issues

of security and its solution to provide a

trusted platform for secure working.

On successful completion of the course, the

student will be able to:

CO1: Analyze the concept of operating system.

CO2: Discuss different security features of operating

system.

CO3: Analyze the working of system administrator.

CO4: Discuss different network services.

CO5: Apply different network protocols.

UNIT – I Overview Of Operating Systems Operating System concepts, Process Management and Scheduling, Memory Management:

Partitioning, Paging, Segmentation, Virtual memory, Device and File management, Introduction to

Operating System Security, Operating System Security Mechanism, Case studies : Linux and Windows.

[10 Hrs]

UNIT – II Protection and Security

Protection and Security-Preliminaries, Operating System Security Models, Vulnerability Analysis and

Common Unit Vulnerabilities, Data security, Cryptography: Model of cryptography, Conventional

cryptography, Modern cryptography, Private Key Cryptography, Data Encryption Standard, Public Key

Cryptography, Multiple Encryption, and Authentication in distributed systems. [10 Hrs]

UNIT –III System Administration Managing Users and Groups using command like adduser, userdel, groupadd, groupdel etc. Basic Network Setup, Setting hostname, IP address of the machine. Setting a dialup connection. Installing and removing packages. Using the RPM, source package installation, URPMI. Managing Partitions understanding the /etc/fstab. Boot loader management understanding the lilo and grub boot loader and its configuration files X-server configuration understanding the XF86config (overview), configure X using thexf86config Command. [8 Hrs]

UNIT – IV Configuring and Managing Services Starting and Stopping Services Identifying Core and Non-critical Services Configuring Basic Client Services Configuring Basic Internet Services Working with Modules Managing Network Services:

Identifying Networking Concepts Configuring Basic Network Services and Settings Managing Network Services Managing Remote Network Service. [10 Hrs]

UNIT – V Protocols and Communication Network protocols, layered protocol architecture, communication networks, LAN, WAN, internet, carrier ethernet, MPLS., application layer protocols (NFS, FTP, HTTP), real time communication and RTP, QoS technologies, diff serv, netlink sockets, iptables. [10 Hrs]

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e-Security) First Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

Text Books:

S. No.

Title Author(s) Publisher

1. Operating Systems 6th Edition

Stalling William, Pearson Education.

2. Operating System Concepts

Silbcrschatz A., Alvin

P., Gagne G. John Wiley and Sons

3. Unix Concepts and Applications Das Sumitabha Tata McGraw Hill

Reference Books:

S. No.

Title Author(s) Publisher

1. Operating Systems Concepts and Design

Milan Milenkovic TMGH

2. Modern Operating Systems

Andrew S. Tanenbaum PHI

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e-Security) First Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

DISTRIBUTED SYSTEMS (Elective I) Course Code 225122 IT L = 3 T = 1 P = 0 Credits = 4

Examination Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number of class tests to be conducted = 02 Minimum assignments = 02

Course Objectives Course Outcomes

The objective of distributed systems is to

make the students aware of different issues

of security and its solution to provide a

trusted platform for secure working.

On successful completion of the course, the

student will be able to:

CO1: Analyze the concept of distributed systems.

CO2:Apply the concept of inter process

communication.

CO3: Apply the concept of distributed file systems.

CO4: Implement distributed algorithms.

CO5: Analyze the working of distributed shared

memory.

UNIT – I Introduction Distributed Systems: Introduction, Examples, Resource Sharing and the Web – Challenges. Distributed

System Models: Introduction, Architectural Models, Functional Models. Characterization of Distributed

Systems, Client-Server Communication, Distributed Objects and Remote Invocation, Communication

between Distributed Objects, Remote Procedure Call, Events and Notifications. [10 Hrs]

UNIT – II Inter-process Communication API for Internet protocols, External data representation and Marshalling, Client-Server communication and Group communication, Distributed Objects and Remote Invocation, Communication between distributed objects, Remote Procedure Call, Remote Object Invocation. Events and notification. Message and Stream-oriented communication. Case study: CORBA and RMI. [10 Hrs]

UNIT –III Resource Management Distributed Resource Management, Distributed File systems: Architecture, Mechanisms, Design Issues. Distributed Shared Memory: Architecture, Algorithm, Protocols, Design Issues. Distributed Scheduling: Issues, Components, and Algorithms. [10 Hrs]

UNIT – IV Distributed Algorithms Distributed Algorithm: Introduction, Kinds of Distributed Algorithm, Timing Models. Synchronous Network Algorithms: Synchronous Network Model, Leader Election in a synchronous Ring, Algorithms in a General Synchronous Networks, Distributed Consensus with Link Failures, Distributed Consensus with Process failures, More Consensus problems. [10 Hrs]

UNIT – V Distributed Shared Memory and Distributed File System Types of shared memory multiprocessors, Structure of Shared Memory Space, Consistency models, Distributed shared memory types: Page based, Shared variable and Object based types, Thrashing, Distributed System features, File accessing model, File sharing semantics, File catching scheme, Fault Tolerance in Real Time Systems. [8 Hrs]

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e-Security) First Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

Text Books:

S. No.

Title Author(s) Publisher

1. Distributed Systems Concepts

and Design

George Coulouris, Jean Dellimore

and Tim Kindberg

Pearson Education

2.

Distributed Operating System

Concepts and Design

Sinha PHI

3.

Distributed Computing–Principles.

Ajay D. Kshemkalyani and Mukesh

Singhal PHI

Reference Books:

S. No.

Title Author(s) Publisher

1. IT Infrastructure And Its Management

Gupta Tata McGraw Hill

2. Distributed Algorithms Nancy A. Lynch Morgan Kaufmann

Publisher

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e-Security) First Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

E COMMERCE & WEB SECURITY(Elective I) Course Code 225123 IT L = 3 T = 1 P = 0 Credits = 4

Examination Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number of class tests to be conducted = 02 Minimum assignments = 02

Course Objectives Course Outcomes

The objective of E Commerce & Web Security

is to make the students aware of different

web based security threats and working of e

commerce companies and their different

issues.

On successful completion of the course, the

student will be able to:

CO1:Analyse different web based security threats

CO2:Apply the concept of different trusted platform

for e commerce

CO3: Implement web based tools for web hosting.

CO4: Apply concept of security technologies for e

commerce.

CO5: Discuss different e payment systems.

UNIT – I Security and Encryption E-Commerce Security Environment – Security threats in E-Commerce environment – Policies, Procedures and Laws. Inter-organizational trust in E-Commerce: Need – Trading partner trust – Perceived benefits and risks of E-Commerce – Technology trust mechanism in E-Commerce – Perspectives of organizational, economic and political theories of inter- organizational trust – Conceptual model of inter-organizational trust in E-Commerce participation. [10 Hrs]

UNIT – II Introduction to trusted computing platform Overview – Usage Scenarios – Key components of trusted platform – Trust mechanisms in a trusted platform. Trusted platforms for organizations and individuals – Trust models and the E-Commerce domain. [8 Hrs]

UNIT –III Web based tools for E-Commerce Web server hardware and software, web portals E-Commerce Software, web hosting services and packages,

managerial tools for decision-making. [10 Hrs]

UNIT – IV Security Technologies Security threats to E-Commerce, Encryption, Digital signatures, certifying authorities, public key cryptography, security protocols; secure socket layer, (SSL), secured electronic Transaction (SET),PKI. [10 Hrs]

UNIT – V Electronic Payment Systems Secure online Transaction models, e-cash, digital money, smart cards, credit and charge cards, e-wallet. Electronic Data Interchange (EDI): EDI basics, EDI on the Internet, supply chain management, software for purchasing, logistics and support activities. Cyber Law for E-Commerce, Legal, ethical and Tax issues, Case Studies. [10 Hrs]

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e-Security) First Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

Text Books:

S. No.

Title Author(s) Publisher

1. Electronic Commerce Pete Loshin and

P.A.Murphy

Jaico Publishing House

2. Electronic Commerce Gary Schneider and

James T. Perry Thomson learning

3. Designing systems for Internet

Commerce Treese

Addison Wesley

Reference Books:

S. No.

Title Author(s) Publisher

1. Frontiers of E-Commerce

Kalakota Addition Wesley

2. E-Commerce: The cutting edge of

Business

Nag, Kamlesh Bajaj &

Debjani Tata McGraw Hill

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e-Security) First Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

DATA & KNOWLEDGE SECURITY LABORATORY

Course Code 225191 IT L = 0 T = 0 P = 3 Credits = 2

Examination Scheme

ESE CT TA Total ESE Duration

75 - 75 150 -

Course Objectives Course Outcomes

The objective of data & knowledge security

laboratory is to make the students aware of

different open source operating system and

implementation of different network

topologies and configuration.

On successful completion of the course, the

student will be able to:

CO1: Implement installation of different operating

system.

CO2: Apply different tools for network management.

CO3: Apply different types of security threats.

Experiment No.1 Operating System Installation, Network Reconnaissance, Network Mapping, and Vulnerability Assessment lab. Installing VMWare so that students may run multiple operating systems

including initially Windows XP and Red Hat 7.2 versions. Vmware is a commercial software package that allows one physical machine to run multiple virtual machines simultaneously

Additionally, the first lab includes installation of initial network security tools. The initial tools

that are loaded include a network management tool for mapping and monitoring networks

(Cheops-NG), a security auditing and network mapping tool (nmap) , a vulnerability-scanning

tool (nessus) , a Windows XP scanning tool (Super Scan 4) , and a Windows reconnaissance

tool (Sam Spade). Lab highlights the need to carefully consider how much and what

information an organization should expose to the Internet in order to minimize exploitation.

Experiment No.2:

Experimenting with some of the password cracking tools available for Windows and Linux as

well as using a network sniffer named ethereal to sniff the network connection between Linux

and Windows computers. In addition, address resolution protocol (ARP) and ettercap tools

are used to examine how hackers carry out a Man-in-the-Middle attack. To crack passwords

on the Windows system, we use a program called L0phtCrack For the Linux system, we use

the software “John the Ripper” to crack the passwords. Ethereal is used to watch a telnet

session, capture packets from an SSH session, and to watch the network mapping tool nmap

work. In the second part of this lab, Address Resolution Protocol is explored and the theory of

address resolution protocol poisoning is experimented with. In addition, the tool hunt is used

to hijack a TCP session.

The goals of this lab include making students aware of how easy it is to obtain passwords,

sniff network traffic, and how attackers can exploit the characteristics of address resolution

protocol to take over sessions in the network. In this lab one computer with three virtual

machines is used to implement a LAN with three computers attached. The host computer has

Red Hat 8.0 (RH 8.0) installed with VMware.

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e-Security) First Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

The host computer uses VMware to implement two other Red Hat 7.2 computers and a Windows XP computer all on the same network Defense mechanisms such as password choices and defensive networks canning are used.

Experiment No.3

To implement the concept of falsifying identity upon a network. Both Ethernet Medium Access Control

addresses (MAC) as well as Internet Protocol (IP) address spoofing are examined and experimented

with. After successfully spoofing addresses, this lab also allows examination of how attackers may use

spoofing for several kinds of denial of service attacks. In particular, a Domain Name System Spoofing

tool (DNS spoof from the dsniff tools) is examined. In addition, a tool named dsniff , which includes the

capability to kill tcp sessions, is examined. To counter these types of attacks, the tool arp watch ,

which helps to detect spoofing attacks, is examined for effectiveness. The tool suite data pool , which

contains approximately 100 denial of service types of attacks, is also employed in this lab.

Experiment No.4: Experimenting With Network sniffer and password cracking tools such as

(a) Etherial (b) Wireshark (c) LAN tool (d) Packet analyzer (e) IP Watcher (f) Ether scan (g) PRTG Monitor (h) CAIN ANDABEL Experiment No.5: Experimenting With Cryptography Techniques

(a) Symmetric Encryption Scheme - Stream CipherRC4 (b) Symmetric Encryption Scheme - Block Cipher – SDES &3DES (c) Asymmetric Encryption Scheme – Block Cipher RSA (d) Block Cipher Modes-ECB,CBC,CFB,OFB (e) Hashing Schemes Experiment No.6: Experimenting With Web Services using crypto techniques

(a) Public Key Infrastructure (b) Authentication Schemes (c) Steganography Experiment No.7: Exercising with Network Enumeration (Identification) for

(a) System Identification (b) OS Detection (c) Port scanning and Services identification

Experiment No.08: Experimenting with Network System Threats

(a) Denial of Service DOS (b) Distributed Denial of Service DDOS (c) Sniffer

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e-Security) First Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

Experiment No.09: Experimenting with Malware tools

(a) Trojans and Backdoors (b) Virus and Antivirus Method

Experiment No.10: Experimenting with Web Vulnerabilities

(a) Web based password Capturing (b) SQL Injection (c) Buffer Overflow (d) Honey pots – FTP, Telnet

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e-Security) First Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

NETWORK SIMULATION LABORATORY

Course Code 225192 IT L = 0 T = 0 P = 3 Credits = 2

Examination Scheme

ESE CT TA Total ESE Duration

75 - 75 150 -

Course Objectives Course Outcomes

The objective of network simulation laboratory

is to make the students aware of different

network simulators which are helpful to

simulate network topology and testing

routing protocols.

On successful completion of the course, the

student will be able to:

CO1: Implement working of client server architecture

CO2: Apply different tools for testing network

topology.

CO3: Analyze different types file transfer protocol and

routing protocols.

LIST OF EXPERIMENTS

1. All the Programs to be written using C in UNIX Environment or simulators like NS2/NS3, Glomosim, Omnet PP, and Qualnet.

2. Simulation of ARP /RARP. 3. Develop a client that contacts a given DNS server to resolve a given hostname. 4. Simulation of OSPF routing protocol. 5. Develop a client server application for chat. 6. Develop a trace route program. 7. Signal handling and handling zombie. 8. Implementation of RPC. 9. Write a client to download a file from HTTP server. 10. Implementation of FTP. 11. Multiplexed TCP server and client. 12. Study of NS2 /Glomosim.

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SCHEME OF TEACHING AND EXAMINATION (Effective from 2020 – 2021 Batch)

M. Tech. (e Security) Second Semester

Sl. N

o.

Board of Studies

(BOS) Courses (Subject)

Course

Code

Period per

Week

Scheme of

Examination To

tal

Ma

rks

Cred

it L T P Theory/Lab

ESE CT TA

1. Information

Technology Trusted Internet 225201 IT 3 1 - 100 20 20 140 4

2. Information

Technology Business Ethics

and Cyber Laws

225202 IT 3 1 - 100 20 20 140 4

3. Information

Technology Advanced

Cryptography

225203 IT 3 1 - 100 20 20 140 4

4. Information

Technology Security Threats

and Management

225204IT 3 1 - 100 20 20 140 4

5. Information

Technology Elective – II 3 1 - 100 20 20 140 4

6. Information

Technology Secured Operating

System (Lab)

225291IT - - 3 75 - 75 150 2

7. Information

Technology Image Processing

and Security (Lab)

225292IT - - 3 75 - 75 150 2

Total Marks 15 5 6 650 100 250 1000 24

Elective-I

Sl. N

o.

Board of Studies (BOS) Courses (Subject) Course

Code

1. Information Technology Mobile Wireless Security 225221IT

2. Information Technology Grid Computing 225222IT

3. Information Technology Steganography & Water Marking 225223IT

Note:

(a) Abbreviations used: L-Lecture, T-Tutorial, P-Practical, ESE-End Semester Exam, CT- Class Test, TA-

Teacher's Assessment.

(b) Choice of elective course once made for an examination cannot be changed in future examinations.

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e Security) Second Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

Sl. N

o.

Board of Studies

(BOS) Courses (Subject)

Course

Code

Period per

Week

Scheme of

Examination To

tal

Ma

rks

Cred

it L T P Theory/Lab

ESE CT TA

1. Information

Technology Trusted Internet 225201 IT 3 1 - 100 20 20 140 4

2. Information

Technology Business Ethics

and Cyber Laws

225202 IT 3 1 - 100 20 20 140 4

3. Information

Technology Advanced

Cryptography

225203 IT 3 1 - 100 20 20 140 4

4. Information

Technology Security Threats

and Management

225204IT 3 1 - 100 20 20 140 4

5. Information

Technology Elective – II 3 1 - 100 20 20 140 4

6. Information

Technology Secured Operating

System (Lab)

225291IT - - 3 75 - 75 150 2

7. Information

Technology Image Processing

and Security (Lab)

225292IT - - 3 75 - 75 150 2

Total Marks 15 5 6 650 100 250 1000 24

Elective-I

Sl. N

o.

Board of Studies (BOS) Courses (Subject) Course

Code

1. Information Technology Mobile Wireless Security 225221IT

2. Information Technology Grid Computing 225222IT

3. Information Technology Steganography & Water Marking 225223IT

Note:

(a) Abbreviations used: L-Lecture, T-Tutorial, P-Practical, ESE-End Semester Exam, CT- Class Test, TA-

Teacher's Assessment.

(b) Choice of elective course once made for an examination cannot be changed in future examinations.

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e Security) Second Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

TRUSTED INTERNET

Course Code 225201 IT L = 3 T = 1 P = 0 Credits = 4

Examination Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number of class tests to be conducted = 02 Minimum assignments = 02

Course Objectives Course Outcomes

The objective of Trusted Internet is to make

the students aware of internet protocols,

different type of cyber-attack, its prevention

and data security techniques.

On successful completion of the course, the

student will be able to:

CO1: Apply concept of internet protocols.

CO2: Apply concept of cyber-attack.

CO3:Analyze concept of firewall and other

Security tools.

CO4: Analyze different data security techniques.

CO5:Apply concept of trusted operating

System.

UNIT – I Internet Understanding the Internet, Hardware Requirements to connect to the internet, Software requirements

and Internet Service Providers(ISP), Internet Addressing, Internet Protocol: Routing Information

Protocol (RIP), User Datagram Protocol (UDP), Transmission Control Protocol (TCP), Domain Name

Service (DNS), Basic Connectivity: Telnet, FTP, Internet Relay Chat (IRC). [10 Hrs]

UNIT – II Access Attacks

Hacker Techniques – Snooping, Eavesdropping, interception, Hacker’s motivation, Historical Hacking

Techniques; Advance Techniques, Targeted Hacker, Information Security Services–Confidentiality

,Integrity, Availability and Accountability. [8 Hrs]

UNIT – III Firewalls

Concepts, Types of Firewalls, Firewall Configuration, Design a Firewall Rule set, Purpose of Firewall,

Security role of a Firewall, Advantages and disadvantages of firewall, Firewall Components,

Procuring a Firewall, Administrating a firewall, firewall toolkits. [10 Hrs]

UNIT – IV Encryption Basic Concepts, Private Key Encryption, Public Key Encryption, Digital Signature, Trust in the System,

Encryption Algorithm–RSA Encryption, Blowfish Encryption. [10 Hrs]

UNIT – V Security Mechanism User Authentication, Attacks from inside the system, Attacks from outside the system, Protection

Mechanism: Snooping, Eavesdropping, interception, Trusted Systems, Trusted Computing Base,

Formal Models of Secure system, Multi-level security, designing trusted Operating System. [10 Hrs]

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e Security) Second Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

Text Books:

S. No.

Title Author(s) Publisher

1. Firewalls - A Complete Guide Marcus Goncalves Tata McGraw-Hill

2. The Internet – Complete Reference

Harley Hahn Tata McGraw-Hill

3. Cryptography and Network Security

William Stallings Pearson Education

Reference Books:

S. No.

Title Author(s) Publisher

1. Modern Operating Systems Andrew S. Tanenbaum Pearson Education

2. Unofficial Guide to Ethical Hacking

Ankit Fadia Macmillan India Ltd

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e Security) Second Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

BUSINESS ETHICS AND CYBER LAWS

Course Code 225202 IT L = 3 T = 1 P = 0 Credits = 4

Examination Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number of class tests to be conducted = 02 Minimum assignments = 02

Course Objectives Course Outcomes

The objective of Business Ethics and Cyber Laws

is to make the students aware of the concept of

business ethics and types of cybercrime, its

investigation and legal aspects of intellectual

property rights.

On successful completion of the course, the student will

be able to:

CO1: Analyze business ethics and corporate

responsibilities.

CO2: Apply different ethical practices in different

departments of organization.

CO3: Analyze cyber crime and its legal aspects.

CO4: Discuss IT act of India and legal jurisdiction.

CO5: Discuss different copyright issues.

UNIT – I Business Ethics Principles of Business Ethics- Ethical philosophies, Ethical management. Corporate Governance -

principles, mechanisms and control. Corporate Social Responsibility – approaches, social accounting,

auditing and reporting, Benefits of Corporate Social Responsibility. [10 Hrs]

UNIT – II Ethical Practices Creating an ethical organization. Workplace Ethics, Environment and Ethics, Ethics in Marketing and Consumer

Protection, Ethics in Accounting and Finance, Ethics in Human Resource Management, intellectual property and

skills. [8 Hrs]

UNIT – III Cyber Crimes:

Related concepts, distinction between cyber crimes and conventional crimes, Cyber criminals and their

objectives, Kinds of cyber crimes cyber-stalking, cyber pornography, forgery and fraud, crime related

to IPRs, cyber terrorism, computer vandalism etc. Cyber forensics, digital forensics and the law,

forensic evidence, digital forensic tools. [10 Hrs]

UNIT – IV Legal Issues in Cyber Crime Issues relating to investigation, issues relating to jurisdiction, issues relating to evidence, relevant

provisions under Information Technology Act 2000, Indian penal code, Pornography Act and Indian

Evidence Act. [10 Hrs]

UNIT – V Copyright Issues Linking, framing, protection of content on web site, international treaties, trade mark issues in

cyberspace, domain name dispute, cyber squatting, uniform dispute resolution policy, computer

software and related IPR (Intellectual Property Rights) issues. [10 Hrs]

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e Security) Second Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

Text Books:

S. No.

Title Author(s) Publisher

1. Business: Its Legal, Ethical, and Global Environment

Marianne Moody Jennings

Cengage Learning India

2. Cyber Law: The Law of the Internet

Jonathan Rosenoer Springer

Reference Books:

S. No.

Title Author(s) Publisher

1. Computer Forensics and Investigations

Nelson, Phillips Cengage Learning India.

2. Managing Intellectual Property Vinod V.Sople PHI Learning Private Limited.

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e Security) Second Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

ADVANCED CRYPTOGRAPHY

Course Code 225203 IT L = 3 T = 1 P = 0 Credits = 4

Examination Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number of class tests to be conducted = 02 Minimum assignments = 02

Course Objectives Course Outcomes

The objective of Advanced Cryptography is to

make the students aware different encryption and

decryption techniques, requirement of

authentication and future trends in cryptography.

On successful completion of the course, the student will

be able to:

CO1: Apply the concept of data security.

CO2: Analyze working to cryptographic techniques.

CO3: Analyze the feature of authentication requirement

for network.

CO4: Apply the concept of quantum

Cryptography.

CO5: Discuss the future trends in cryptography.

UNIT – I OSI security architecture

Classical encryption techniques , Cipher principles ,Data encryption standard , Block cipher design

principles and modes of operation ,Evaluation criteria for AES , AES cipher, Triple DES, Placement of

encryption function, Traffic confidentiality. [10 Hrs]

UNIT – II Key management

Diffie Hellman key exchange, Elliptic curve architecture and cryptography, Introduction to number

theory, Confidentiality using symmetric encryption, Public key cryptography and RSA. [8 Hrs]

UNIT –III Authentication requirements

Authentication functions, Message authentication codes, Hash functions, Security of hash functions

and MACS, MD5 Message Digest algorithm , Secure hash algorithm , Rip end , HMAC digital

signatures , Authentication protocols. [10 Hrs]

UNIT – IV Quantum Cryptography and Quantum Teleportation

Heisenberg uncertainty principle, polarization states of photons, quantum cryptography using polarized

photons, local vs. non local interactions, entanglements, EPR paradox, Bell’s theorem, Bell basis,

teleportation of a single qubit – theory and experiments. [10 Hrs]

UNIT – V Future trends

Review of recent experimental achievements, study on technological feasibility of a quantum

computer, candidate physical systems and limitations imposed by noise. [10 Hrs]

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e Security) Second Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

Text Books:

S. No.

Title Author(s) Publisher

1. Cryptography and Network Security - Principles and Practices

William Stallings Prentice Hall of India

2. Cryptography and Network Security

Atul Kahate Tata McGraw Hill

Reference Books:

S. No.

Title Author(s) Publisher

1. Feynman lectures on computation

R.P. Feynman, Penguin Books

2. Introduction to quantum computers

Gennady P. Berman, Gary D. Doolen, Ronnie Mainiri & ValdmisItri Frinovich,

World Scientific, Singapore

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e Security) Second Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

SECURITY THREATS AND MANAGEMENT

Course Code 225204 IT L = 3 T = 1 P = 0 Credits = 4

Examination Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number of class tests to be conducted = 02 Minimum assignments = 02

Course Objectives Course Outcomes

The objective of Security Threats and

Management is to make the students aware

of different security threats in cyber world,

importance of security privileges and

intrusion detection system.

On successful completion of the course, the

student will be able to:

CO1: Apply the concept of security threats in cyber

world.

CO2: Analyze different network threats.

CO3: Analyze the working of security threat

management.

CO4: Analyze security privileges threat.

CO5: Apply the concept of Firewall.

UNIT – I Introduction

Security threats, Sources of security threats, Motives, Target Assets and vulnerabilities, Consequences

of threats, E-mail threats, Web-threats, Intruders and Hackers, Cyber crimes. [10 Hrs]

UNIT – II Network Threats

Active/ Passive , Interference , Interception , Impersonation , Worms , Virus , Spams , Adware , Spy

ware , Trojans , Backdoors , Bots, IP Spoofing , ARP spoofing , Session Hijacking , Sabotage-Internal

treats, Environmental threats , Threats to Server security. [8 Hrs]

UNIT –III Security Threat Management

Tree codes and trellis codes, polynomial description of convolution codes, distance notions for

convolutional codes, generation function, matrix description of convolution codes, viterbi decoding of

convolutional codes, distance bounds for convolutional codes, turbo codes and turbo decoding. [10 Hrs]

UNIT – IV Security Privileges and Credentials

Risk Assessment, Forensic Analysis, Security threat correlation , Threat awareness , Vulnerability

sources and assessment, Vulnerability assessment tools ,Threat identification, Threat Analysis,

Threat Modeling, Model for Information Security Panning. [10 Hrs]

UNIT – V Firewalls & Intrusion Detection Systems

Firewalls, Types, Dynamic packet filtering content filtering , Crypto capable Routers, VPNs , Secure

Modems , Intrusion Detection Systems , Types , Intrusion Detection Tools , Penetration testing,

Intrusion Analysis, Log file Monitors , Honey pots , Intrusion Prevention Systems , Trusted Systems.

[10 Hrs]

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e Security) Second Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

Text Books:

S. No.

Title Author(s) Publisher

1. Computer Network Security

Joseph M Kizza Springer

2. Threat Modeling

Swiderski, Frank,

Syndex Microsoft Press

3.

IT Security Management: IT Securities -

Setting up an IT Security Function

Alberto Partida, Diego

Andina Springer

Reference Books:

S. No.

Title Author(s) Publisher

1. Information Security Intelligence:

Cryptographic Principles & Application

Thomas Calabrese,Tom

Calabrese

Thomson Delmar Learning

2. Firewalls & Internet Security

William. R Cheswick,

Steven M. Bellowin,

Aviel D Rubin

Addison Wesley Professional

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e Security) Second Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

MOBILE WIRELESS SECURITY(ELECTIVE II)

Course Code 225221IT L = 3 T = 1 P = 0 Credits = 4

Examination Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number of class tests to be conducted = 02 Minimum assignments = 02

Course Objectives Course Outcomes

The objective of Mobile Wireless Security is to

make the students aware of wireless

network, different policy issues of network

along with different security threats and

possible solutions.

On successful completion of the course, the

student will be able to:

CO1: Apply different concepts of wireless network.

CO2: Discuss possible network solutions.

CO3: Analyze the importance of wireless network

security.

CO4: Apply concept of network services

CO5: Apply the concept of mobile commerce.

UNIT – I Wireless Fundamentals Wireless Hardware, Wireless Network Protocols, Wireless Programming, Wired Equivalent Privacy

(WEP) Security. Wireless Cellular Technologies, concepts, Wireless reality, Security essentials,

Information classification standards, Wireless Threats: Cracking WEP - Hacking Techniques,

Wireless Attacks, Air borne Viruses. [10 Hrs]

UNIT – II Standards and Policy Solutions

Network Solutions, Software Solutions, Physical Hardware Security, Wireless Security, Securing

WLAN, Virtual Private Networks , Intrusion Detection System, Wireless Public Key infrastructure,

Tools , Auditing tools , Pocket PC hacking , wireless hack walkthrough. [8 Hrs]

UNIT –III Security Issues

Authentication, Access control and Authorization, Non-repudation, privacy and Confidentiality,

Integrity and Auditing, Security analysis process. Privacy in Wireless World, Legislation and Policy,

Identify targets and roles analysis, Attacks and vulnerabilities, Analyze mitigations and protection.

[10 Hrs]

UNIT – IV Implementation Issues WLAN Configuration, IEEE 802.11, Physical layer ,media access frame format , systematic exploitation of

802.11b, WLAN, WEP – WEP Decryption script , overview of WEP attack , Implementation ,

Analyses of WEP attacks. [10 Hrs]

UNIT – V Mobile Commerce

Reputation and Thrust, Intrusion detection , Vulnerabilities analysis of mobile commerce platform,

Secure authentication for mobile users , Mobile Commerce security , Payment methods, Mobile

Coalition key evolving Digital Signatures scheme for wireless mobile networks. [10 Hrs]

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e Security) Second Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

Text Books:

S. No.

Title Author(s) Publisher

1. Wireless Security Essentials: Defending

Mobile from Data Piracy Russel Dean Vines

John Wiley&Sons

2. Maximum Wireless Security

Cyrus , Peikari, Seth

Fogie. SAMS Publishing

3.

Mobile and Wireless Network Security

and Privacy

S. Kami Makki Springer

Reference Books:

S. No.

Title Author(s) Publisher

1.

Wireless Security and Privacy- Best

Practices and Design Techniques

Tara M. Swaminathan,

Charles R. Eldon Addison Wesley

2. 802.11 Security

Bruce Potter, Bob Fleck O’Reilly Publications

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e Security) Second Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

GRID COMPUTING (ELECTIVE II)

Course Code 225222IT L = 3 T = 1 P = 0 Credits = 4

Examination Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number of class tests to be conducted = 02 Minimum assignments = 02

Course Objectives Course Outcomes

The objective of Grid Computing is to make

the students aware of basic concept of grid

computing, grid computing architecture and

new trends in grid computing.

On successful completion of the course, the

student will be able to:

CO1: Analyze grid computing concept.

CO2: Discuss challenges of grid computing.

CO3:Analyze the working of system architecture of

grid computing

CO4: Discuss different computing paradigms

CO5: Discuss different emerging areas in grid

computing.

UNIT – I Introduction Grid Computing: values and risks – History of Grid computing, Grid computing model and protocols,

Overview and types of Grids. [10 Hrs]

UNIT – II Desktop Grids

Background, Definition, Challenges, Technology, Suitability, Grid server and practical uses, Clusters

and Cluster Grids, HPC Grids, Scientific in sight, Application and Architecture, HPC application,

Development Environment and HPC Grids, Data Grids, Alternatives to Data Grid, Data Grid

architecture. [8 Hrs]

UNIT –III Architecture and Services

The open Grid services Architecture, Analogy, Evolution, Overview, Building on the OGSA platform,

Implementing OGSA based Grids, Creating and Managing services, Services and the Grid, Service

Discovery, Tools and Toolkits, Universal Description Discovery and Integration(UDDI). [ 10 Hrs]

UNIT – IV Computing Paradigms Desktop Supercomputing, Parallel Computing, Parallel Programming Paradigms, Problems of Current

parallel Programming Paradigms, Desktop Supercomputing Programming Paradigms, Parallelizing

Existing Applications, Grid Enabling Software Applications, Needs of the Grid users, methods of Grid

Deployment, Requirements for Grid enabling Software, Grid Enabling Software Applications. [10 Hrs]

UNIT – V Emerging Areas

Application integration, Application classification, Grid requirements, Integrating applications with

Middleware platforms, Grid enabling Network services, Managing Grid environments, Managing

Grids, Management reporting, Monitoring, Data catalogs and

replicamanagement,Portals,DifferentapplicationareasofGridcomputing. [10 Hrs]

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e Security) Second Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

Text Books:

S. No.

Title Author(s) Publisher

1. Grid Computing: A Practical Guide to

Technology and Applications Ahmar Abbas

Firewall Media

2. Grid Computing

Joshy Joseph and Craig Fellenstein

Pearson Education

Reference Books:

S. No.

Title Author(s) Publisher

1. Grid Blue Print for New Computing Infrastructure

Ian Foster and Carl Kesselman

Morgan Kaufmann

2. Grid Computing: Making the Global Infrastructure a Reality

Fran Berman, Geoffrey Fox and Anthony J. G. Hey

Willy Publisher

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e Security) Second Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

STEGANOGRAPHY & WATER MARKING(ELECTIVE II) Course Code 225223IT L = 3 T = 1 P = 0 Credits = 4

Examination Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number of class tests to be conducted = 02 Minimum assignments = 02

Course Objectives Course Outcomes

The objective of Steganography & Water

Marking is to make the students aware of

different information hiding techniques, tools

used in information hiding along with legal

aspects.

On successful completion of the course, the

student will be able to:

CO1: Analyze the basic concept of information hiding.

CO2: Implement different algorithms used in

information hiding.

CO3: Apply of hidden information retrieving concept.

CO4: Apply different watermarking techniques.

CO5:Discuss different application areas of

watermarking.

UNIT – I Introduction to Information hiding Brief history and applications of information hiding, Principles of Steganography, Frameworks for

secret communication , Security of Steganography systems , Information hiding in noisy data,

Adaptive versus non adaptive algorithms , Laplace filtering Using cover models, Active and malicious

attackers, Information hiding in written text, Examples of invisible communications. [10 Hrs]

UNIT – II Survey of Steganographic techniques

Substitution system and bit plane tools, Transform domain techniques, Spread spectrum and

information hiding, Statistical Steganography, Distortion and code generation techniques, Automated

generation of English text. [8 Hrs]

UNIT –III Steganalysis

Detecting hidden information: text, audio, video and images, Extracting hidden information, Disabling

hidden information, Watermarking techniques, Basic Message Coding, Error Correction coding ,

Information Theoretic analysis and design issues, Evaluation and benchmarking of watermarking

system. [10 Hrs]

UNIT – IV Survey of current watermarking techniques Cryptographic and psycho visual aspects, Choice of a workspace: binary image, audio, video. Formatting

the watermark beds - Digital watermarking schemes: Spread Spectrum, DCT(Discrete Cosine Transform),

Domain and Quantization schemes, Watermarking with side information , Robustness to temporal and

geometric distortions. [10 Hrs]

UNIT – V Data Right Management

DRM Products and Laws, Fingerprints – Examples, Protocols and Codes– Boneh-Shaw finger printing

Scheme ,Steganography and watermarking applications –Military, Digital copyright protection and

Protection of intellectual property. [10 Hrs]

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e Security) Second Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

Text Books:

S. No.

Title Author(s) Publisher

1.

Information hiding techniques for

Steganography and Digital

Watermarking,

Stefan Katzenbelsser

and Fabien A. P.

Petitcolas,

ARTECH House Publishers

2. Digital Water Marking and

Steganography,

I.J. Cox, M.L. Miller,

J.Fridrich and T.Kalker,

2ndEdition, Morgan

Kauffman Publishers

3.

Information Hiding: Steganography and

Watermarking - Attacks and

Countermeasures

Johnson, Neil F. ,Duric,

Zoran,Jajodia, Sushil G

Advances in Information

Security

Reference Books:

S. No.

Title Author(s) Publisher

1.

Disappearing Cryptography:

Information Hiding, Steganography

and Watermarking

Peter Wayner Elsevier

2. N. Ferguson and B.Schneier

Practical Cryptography Wiley Publishing Inc.

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e Security) Second Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

SECURED OPERATING SYSTEM LABORATORY

Course Code 225291IT L = 0 T = 0 P = 3 Credits = 2

Examination Scheme

ESE CT TA Total ESE Duration

75 - 75 150 -

Course Objectives Course Outcomes

The objective of secured operating system

laboratory is to make the students aware of

importance of open source operating

system and different security threats and

possible solutions to counter them.

On successful completion of the course, the

student will be able to:

CO1: Implement installation of different operating

system.

CO2: Apply different tools for network management.

CO3: Discuss different types of security threats.

List of Experiments:

(Implement the following on LINUX platform. Use C for high level language implementation)

1. Shell programming

–command syntax

2. write simple functions

–basic tests

3. Shell programming

-loops

-patterns

-expansions

-substitutions

4. Write programs using the following system calls of UNIX operating system: fork, exec, get

pid, exit, wait, close , stat, open dir, read dir

5. Write programs using the I/O system calls of UNIX operating system (open, read,

6. Write, etc.)

7. Write C programs to simulate UNIX commands like ls, grep etc.

8. Given the list of processes, their CPU burst times and arrival times, display/print the Gantt

chart for FCFS and SJF. For each of the scheduling policies, compute and print the average

waiting time and average turnaround time

9. Given the list of processes, their CPU burst times and arrival times, display/print the Gantt

chart for Priority and Round robin. For each of the scheduling policies, compute and print the

average waiting time and average turnaround time

10. Implement the Producer – Consumer problem using semaphores.

11. Write a shell script to scan current operating system security settings.

12. Write a program to create a secured pipe for Inter-Process Communication.

13. Identify Vulnerabilities (Potential Threats) of Operating System and Security features.

14. Identify and analyze Buffer over flow problem.

15. Implement some memory management schemes

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e Security) Second Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

16. Free space is maintained as a linked list of nodes with each node having the starting byte

address and the ending byte address of a free block. Each memory request consists of the process-

id and the amount of storage space required in bytes. Allocated memory space is again maintained

as a linked list of nodes with each node having the process-id, starting byte address and the

ending byte address of the allocated space.

17. Implement some memory management schemes – II for e.g. When a process finishes (taken as input) the appropriate node from the allocated list should be deleted and this free disk space should be added to the free space list. Care should be taken to merge contiguous free blocks into one single block. This results in deleting more than one node from the free space list and changing the start and end address in the appropriate node. For allocation use first fit, worst fit and best fit.

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU Bhilai)

SYLLABUS

M. Tech. (e Security) Second Semester

November 2020 1.00 Applicable for

AY 2020-21 Onwards Chairman (AC) Chairman (BoS) Date of Release Version

IMAGE PROCESSING & SECURITY LABORATORY

Course Code 225192 IT L = 0 T = 0 P = 3 Credits = 2

Examination Scheme

ESE CT TA Total ESE Duration

75 - 75 150 -

Course Objectives Course Outcomes

The objective of image processing &security

laboratory is to make the students aware of

importance of image processing and different

tools and algorithm used in image

processing.

On successful completion of the course, the

student will be able to:

CO1: Implement installation of image processing

software.

CO2: Apply different tools used for image processing.

CO3: Apply different image filtering and

transformation concepts.

LIST OF EXPERIMENTS

1. Study and Analyze important Image Processing toolbox functions with at least two standard images like

Cameraman, Lena, Monkey, and others.

2. Write a program for Image reading and displaying the results in matrix form and hence changing the

matrix elements by multiplying with the factor 0.001 and hence writing to a file with extension .jpeg

format and hence plot a histogram.

3. Write a program for performing Point-to-point transformation.

4. Write a program for performing Morphological operations .(The operations that can be performed are

erosion, dilation, opening, closing, open-close, close-open.)

5. Write a program to hide a word in an image file and retrieve it (Stenography).

6. Histogram equalization. This experiment illustrates the relationship among the intensities (gray levels) of

an image and its histogram. It shows how to improve the image by equalizing the histogram.

7. Write a program for performing Geometric transformations by using translation , rotation scaling of

given image.

8. Write a program for performing Linear filtering using convolution. After completing this experiment

every student should understand the concepts of filtering using linear convolution.

9. Write a program for applying highly selective filters upon input images. In this experiment students

appreciate the effects on an image after a highly selective filter is applied to it.

10. Write a program for performing Non Linear filtering upon input images using convolution masks. This

experiment allows students to understand the effects of a median filter on an image corrupted with

impulsive noise.

11. Write a program to use Entropy as a compression measure upon input images. This experiment

introduces students to entropy as compression measurement to the DPCM compression measure.

12. Write a program for performing Edge detection upon input images. This experiment enables students to

understand the concept of edge detectors and their operation in noisy images.

13. Write a program for Converting Color to Gray Scale and hence enhancement with segmentation.