chhattisgarh swami vivekananda technical university ... tech it iiird sem (e... · chhattisgarh...

5

Click here to load reader

Upload: vodan

Post on 22-Jun-2018

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Chhattisgarh Swami Vivekananda Technical University ... Tech IT IIIrd Sem (e... · Chhattisgarh Swami Vivekananda Technical University, Bhilai ... Chhattisgarh Swami Vivekananda Technical

Chhattisgarh Swami Vivekananda Technical University, Bhilai (C.G.)

Scheme of Teaching, Examination & Evaluation

M. Tech. (e-Security)

Department: INFORMATION TECHNOLOGY

3rd

Semester

S. No Board of Study

Subject Code Subject

Period s per Week

Scheme of Examination

Total Mark

s

Credit L+(T+P)

/ 2 L T P Theory / Practical

ESE CT TA

1 Information

Technology 577311 (33)

Information Assurance

& Cyber Security 3 1

- 100 20 20 140 4

2 Refer Table - III Elective – III 3 1 - 100 20 20 140 4

3 Information Technology

577321 (33) Preliminary work on Dissertation

- - 28 100 - 100 200 14

4 Information

Technology 577322 (33)

Seminar on Industrial

Training & Dissertation - - 3 - - 20 20 2

Total 6 2 31 300 40 160 500 24

L- Lecture T- Tutorial P- Practical ESE- End Semester Exam CT- Class Test TA-

Teacher's Assessment

TABLE –III

ELECTIVE -III

S.

No Board of Study Subject Code Subject

1 Information Technology 577331 (33) Biometrics Security

2 Information Technology 577332 (33) Security Issues in Wireless Adhoc

Network

3 Computer Science &

Engineering 571332(22) Cloud Computing

Note (1) Choice of elective once made for an examination cannot be changed in future

examinations.

Note (2) Examination Duration of all Theory papers will be of THREE hours.

Page 2: Chhattisgarh Swami Vivekananda Technical University ... Tech IT IIIrd Sem (e... · Chhattisgarh Swami Vivekananda Technical University, Bhilai ... Chhattisgarh Swami Vivekananda Technical

Chhattisgarh Swami Vivekananda Technical University, Bhilai (C.G.)

Semester: M.TECH. Ist Specialization : e-Security

Subject: Information Assurance & Cyber Security Code: 577311 (33)

Total Theory Periods: 40 Total Tutorial Periods: 12

Total Marks in End Semester Exam. : 100

Minimum number of class test to be conducted: 02

UNIT I

Introduction: Information Systems in Global context, Threats and vulnerabilities to Information systems, security considerations in wireless and mobile computing, Basic building

blocks of Information security, emergence of web space, Internet, Network tools and utilities, ,

Security terminologies,

UNIT II

Cyber Attacks : Vulnerabilities – sources of Vulnerabilities, Vulnerability identification and Assessment, Cyber crime and hackers, Common cyber-attacks, viruses and content filtering,

Security Assessment, Analysis and Assurance, computer network security protocol and

standards, Security Policies, Integrity Policies, confidentiality Policies, Security models, Access

Control Matrix Model, Take-Grant Protection Model.

UNIT III

Securing a transaction: Encryption, digital signatures, virtual private networks, Internet

fraud, Identity theft, Industrial espionage, Cyber terrorism, Security hardware and software,

intrusion detection for securing networks, Biometric-based security issues and challenges.

UNIT IV Emerging Areas: Security for wireless networks, Applications security, security of electronic

mail systems, security of databases, security of Operating systems, anti-virus and anti-

phishing tools, digital forensic tools, biometric security, establishing security plans and risk

mitigation.

UNIT V

Business Perspective: Model frameworks & security metrics, Adoption of Information Security

Management standards, Laws and legal frameworks, Privacy Business Challenges, Privacy

Technical Impacts, Web services and Privacy, Security Best Practices, Business Continuity and

Disaster Recovery Planning, Security Auditing, Asset Management.

TEXT BOOKS

1. Willis H Ware, Charles P Pleeger, Shari Lawrence Pleeger, “Security in Computing”, Prentice

Hall, 2003.

2. Thomas R Peltier, Justin Peltier, John blackley,” Information Security Fundamentals”,

Second Edition, prentice Hall, 1996. 3. Kenneth J. Knapp, “Cyber Security and Global Information Assurance: Threat Analysis and

response Solutions”, IGI Global, 2009.

REFERENCE BOOKS

1. Thomas R. Peltier, “Information Security policies and procedures: A Practitioner’s

Reference”, 2nd Edition Prentice Hall, 2004

2. Jonathan Rosenoer, “Cyberlaw: the Law of the Internet”, Springer-Verilag, 1997.

3. Brent Rowe, Albert N. Link, Michael P. Gallaher, Albert N. Link, Brent R. Rowe,” Cyber

Security: Economic Strategies and Public Policy Alternatives” Edward Elgar Publishing.

Page 3: Chhattisgarh Swami Vivekananda Technical University ... Tech IT IIIrd Sem (e... · Chhattisgarh Swami Vivekananda Technical University, Bhilai ... Chhattisgarh Swami Vivekananda Technical

Chhattisgarh Swami Vivekananda Technical University, Bhilai (C.G.)

Semester: M.TECH. Ist Specialization : e-Security

Subject: Biometrics Security (Elective III) Code: 577331 (33)

Total Theory Periods: 40 Total Tutorial Periods: 12

Total Marks in End Semester Exam. : 100 Minimum number of class test to be conducted: 02

UNIT I:

Introduction: Benefits of biometrics over traditional authentication systems-benefits of

biometrics Verification and identification, Basic working of biometric matching, Accuracy, False match rate, False non-match rate, Failure to enroll rate, Derived metrics, Layered biometric

solutions, Accuracy in biometric systems.

UNIT II:

Physiological Biometric Technologies: Fingerprints, Facial Scan, Iris Scan, Voice Scan –

their technical description characteristics - Competing technologies- strengths & weaknesses, types of algorithms used for interpretation.

UNIT III:

Behavioral Biometric Technologies: Other physiological biometrics – Hand Scan Biometrics,

DNA Biometrics, Signature and handwriting technology, keystroke scan, Technical description, classification, keyboard /keystroke dynamics, Retina scan – AFIS (Automatic Finger Print

Identification Systems), Behavioral Biometrics.

UNIT IV:

Biometric Variants: Multi biometrics and multi-factor biometrics - two-factor authentication

with passwords, tickets and tokens, executive decision, implementation plan, Case studies: Physiological, Behavioral and multifactor biometrics in identification systems.

UNIT V:

Biometrics Applications: Biometric Solution Matrix, Bio privacy, Comparison of privacy factor

in different biometrics technologies, Designing privacy sympathetic biometric systems,

Biometric standards, Biometric middleware, Biometrics for Network Security, Statistical measures of Biometrics, Biometric Transactions.

TEXT BOOKS :

1. John Chirillo and Scott Blaul, “Implementing Biometric Security”, 1st Edition, John Wiley &

Sons Publications, 2005. 2. Paul Reid, “Biometrics for Network Security”, 1st Edition, Pearson Publication, 2004.

3. Samir Nanavathi, Michel Thieme, Raj Nanavathi, “Biometrics -Identity verification in a

network”, Wiley Eastern, 2002.

REFERENCES

1. Biometrics- The Ultimate Reference- John D. Woodward, Jr. Wiley Dreamtech. Reference (http://www.jntu.ac.in/)

2. Jain, Anil K.; Flynn, Patrick; Ross, Arun A. (Eds.), “Handbook of Biometrics”, Springer

Publications

3. Ruud M. Bolle, Jonathan H. Connell, Sharath Pankanti, Nalini K. Ratha, Andrew W. Senior, “Guide

to Biometrics” 1st Edition, Springer Verilag New York, LLC.

Page 4: Chhattisgarh Swami Vivekananda Technical University ... Tech IT IIIrd Sem (e... · Chhattisgarh Swami Vivekananda Technical University, Bhilai ... Chhattisgarh Swami Vivekananda Technical

Chhattisgarh Swami Vivekananda Technical University, Bhilai (C.G.)

Semester: M.TECH. Ist Specialization : e-Security

Subject: Security Issues in Wireless Adhoc Network (Elective III) Code: 577332 (33)

Total Theory Periods: 40 Total Tutorial Periods: 12

Total Marks in End Semester Exam. : 100 Minimum number of class test to be conducted: 02

Unit 1

Fundamentals of Wireless Communication Technology: The Electromagnetic Spectrum,

Radio Propagation Mechanisms, Characteristics of the Wireless Channel - IEEE 802.11a,b Ad hoc: Packet Radio Networks, Technical Challenges, Architecture of PRNETs, Components of

Packet Radios, Heterogeneity in Mobile Devices, Traffic Profiles - Types of Ad hoc Mobile

Communications -Types of Mobile Host Movements, Challenges Facing Ad Hoc Mobile

Networks, Ad hoc wireless Internet.

Unit 2 Design Issues of a Routing Protocol: Classifications of Routing Protocols, Table-Driven

Routing Protocols, Destination Sequenced Distance Vector (DSDV), Wireless Routing Protocol

(WRP), Cluster Switch Gateway Routing (CSGR), Source-Initiated On-Demand Approaches, Ad

Hoc On-Demand Distance Vector Routing (AODV), Dynamic Source Routing (DSR), Temporally

Ordered Routing Algorithm (TORA), Signal Stability Routing (SSR), Location-Aided Routing (LAR), Power-Aware Routing (PAR), Zone Routing Protocol (ZRP).

Unit 3:

Issues in Designing a Multicast Routing Protocol: Operation of Multicast Routing Protocols,

An Architecture Reference Model for Multicast Routing Protocols, Classifications of Multicast

Routing Protocols, Tree-Based Multicast Routing Protocols, Mesh-Based Multicast Routing

Protocols, Summary of Tree-and Mesh-Based Protocols, Energy-Efficient Multicasting

Unit 4:

Design Issues and Goals of Transport Layer Protocol: Classification of Transport Layer

Solutions, TCP Over Ad Hoc Wireless Networks, Other Transport Layer Protocols, Network

Security Requirements - Issues and Challenges in Security Provisioning, Network Security

Attacks, Key Management, Secure Routing in ADHOC Sensor Networks.

Unit 5:

Energy Management & Requirements: Classification of Energy Management Schemes-

Battery Management Schemes, Transmission Power Management Schemes and System Power

Management schemes.

TEXT BOOKS:

1. C. Siva Ram Murthy and B.S. Manoj “Ad Hoc Wireless Networks: Architectures and

Protocols”, Prentice Hall, TR,2004

2. C.K. Toh, Ad Hoc Mobile Wireless Networks: Protols and Systems, Prentice Hall PTR ,2001

3. Charles E. Perkins, Ad Hoc Networking, Addison Wesley, 2000.

REFERENCES:

1. Farooq Anjum, Petros Mouchtaris,” Security for Wireless Ad Hoc Networks”, John Wiley &

Sons.

2. Prasant Mohapatra, Srikanth Krishnamurthy,” Ad Hoc Networks: Technologies and

Protocols”,Springer

3. Azzedine Boukerche,” Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks”,

John Wiley & Sons.

Page 5: Chhattisgarh Swami Vivekananda Technical University ... Tech IT IIIrd Sem (e... · Chhattisgarh Swami Vivekananda Technical University, Bhilai ... Chhattisgarh Swami Vivekananda Technical

Chhattisgarh Swami Vivekananda Technical University, Bhilai (C.G.)

Semester: M.TECH. Ist Specialization : e-Security

Subject: Cloud Computing (Elective III) Code: 571332 (33) Total Theory Periods: 40 Total Tutorial Periods: 12

Total Marks in End Semester Exam. : 100

Minimum number of class test to be conducted: 02

Unit - I Introduction: What is the Cloud? The Emergence of Cloud Computing, Cloud-Based Service

Offerings, Benefits of using a Cloud Model, What Are the Key Characteristics of Cloud

Computing?, The Evolution of Cloud Computing, Hardware & Internet Software Evolution.

Unit - II

Services: Communication-as-a-Service (CAAS), Infrastructure-as-a-Service (IAAS), Monitoring-as-a-Service (MAAS), Platform-as-a-Service (PAAS), Software-as-a-Service (SAAS).

Unit - III

Architecture: The Evolution from the MSP Model to Cloud Computing and Software-as-a-

Service, The Cloud Data Center, Basic Approach to a Data Center-Based SOA, Where Open Source Software is Used?, Service-Oriented Architectures as a Step Toward Cloud Computing.

Unit - IV

Security Issues: Cloud Security Challenges, Software-as-a-Service, Security Management

People, Security Governance, Security Portfolio Management, Security Architecture Design,

Virtual Machine Security, Identity Access Management (IAM), Data Security.

Unit – V

Emerging Areas: Smartphone, Mobile Operating Systems for Smartphone’s (iPhone, Windows

Mobile), Google(Android) Blackberry, Ubuntu Mobile Internet, Mobile Platform Virtualization

(KVM, VMWare).

TEXT BOOKS:

1. Toby Velte, Anthony Vote and Robert Elsenpeter, “Cloud Computing: A Practical

Approach”, McGraw Hill, 2002.

2. Michael Miller, “Cloud Computing: Web-Based Applications That Change the Way You Work and Collaborate Online”, Que Publishing, August 2008.

3. Nick Antonopoulos, Lee Gillam ,” Cloud Computing: Principles, Systems and

Applications“ , Springer

REFERENCES:

1. George Reese, “Cloud Application Architectures: Building Applications and

Infrastructures in the Cloud”, O’Reilly Media, 2003.

2. Tim Matherm, Subra Kumaraswamy and Shahed Latif, “Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance”, O’Reilly Media, 2005.

3. Kris A. Jamsa, “Cloud Computing: Virtualization, Business Models, Mobile”, Jones & Bartlett Publishers.

4. Michael Miller, “Cloud Computing: Web-Based Applications”, Que Publishing.