chhattisgarh swami vivekananda technical university ... tech it iiird sem (e... · chhattisgarh...
TRANSCRIPT
Chhattisgarh Swami Vivekananda Technical University, Bhilai (C.G.)
Scheme of Teaching, Examination & Evaluation
M. Tech. (e-Security)
Department: INFORMATION TECHNOLOGY
3rd
Semester
S. No Board of Study
Subject Code Subject
Period s per Week
Scheme of Examination
Total Mark
s
Credit L+(T+P)
/ 2 L T P Theory / Practical
ESE CT TA
1 Information
Technology 577311 (33)
Information Assurance
& Cyber Security 3 1
- 100 20 20 140 4
2 Refer Table - III Elective – III 3 1 - 100 20 20 140 4
3 Information Technology
577321 (33) Preliminary work on Dissertation
- - 28 100 - 100 200 14
4 Information
Technology 577322 (33)
Seminar on Industrial
Training & Dissertation - - 3 - - 20 20 2
Total 6 2 31 300 40 160 500 24
L- Lecture T- Tutorial P- Practical ESE- End Semester Exam CT- Class Test TA-
Teacher's Assessment
TABLE –III
ELECTIVE -III
S.
No Board of Study Subject Code Subject
1 Information Technology 577331 (33) Biometrics Security
2 Information Technology 577332 (33) Security Issues in Wireless Adhoc
Network
3 Computer Science &
Engineering 571332(22) Cloud Computing
Note (1) Choice of elective once made for an examination cannot be changed in future
examinations.
Note (2) Examination Duration of all Theory papers will be of THREE hours.
Chhattisgarh Swami Vivekananda Technical University, Bhilai (C.G.)
Semester: M.TECH. Ist Specialization : e-Security
Subject: Information Assurance & Cyber Security Code: 577311 (33)
Total Theory Periods: 40 Total Tutorial Periods: 12
Total Marks in End Semester Exam. : 100
Minimum number of class test to be conducted: 02
UNIT I
Introduction: Information Systems in Global context, Threats and vulnerabilities to Information systems, security considerations in wireless and mobile computing, Basic building
blocks of Information security, emergence of web space, Internet, Network tools and utilities, ,
Security terminologies,
UNIT II
Cyber Attacks : Vulnerabilities – sources of Vulnerabilities, Vulnerability identification and Assessment, Cyber crime and hackers, Common cyber-attacks, viruses and content filtering,
Security Assessment, Analysis and Assurance, computer network security protocol and
standards, Security Policies, Integrity Policies, confidentiality Policies, Security models, Access
Control Matrix Model, Take-Grant Protection Model.
UNIT III
Securing a transaction: Encryption, digital signatures, virtual private networks, Internet
fraud, Identity theft, Industrial espionage, Cyber terrorism, Security hardware and software,
intrusion detection for securing networks, Biometric-based security issues and challenges.
UNIT IV Emerging Areas: Security for wireless networks, Applications security, security of electronic
mail systems, security of databases, security of Operating systems, anti-virus and anti-
phishing tools, digital forensic tools, biometric security, establishing security plans and risk
mitigation.
UNIT V
Business Perspective: Model frameworks & security metrics, Adoption of Information Security
Management standards, Laws and legal frameworks, Privacy Business Challenges, Privacy
Technical Impacts, Web services and Privacy, Security Best Practices, Business Continuity and
Disaster Recovery Planning, Security Auditing, Asset Management.
TEXT BOOKS
1. Willis H Ware, Charles P Pleeger, Shari Lawrence Pleeger, “Security in Computing”, Prentice
Hall, 2003.
2. Thomas R Peltier, Justin Peltier, John blackley,” Information Security Fundamentals”,
Second Edition, prentice Hall, 1996. 3. Kenneth J. Knapp, “Cyber Security and Global Information Assurance: Threat Analysis and
response Solutions”, IGI Global, 2009.
REFERENCE BOOKS
1. Thomas R. Peltier, “Information Security policies and procedures: A Practitioner’s
Reference”, 2nd Edition Prentice Hall, 2004
2. Jonathan Rosenoer, “Cyberlaw: the Law of the Internet”, Springer-Verilag, 1997.
3. Brent Rowe, Albert N. Link, Michael P. Gallaher, Albert N. Link, Brent R. Rowe,” Cyber
Security: Economic Strategies and Public Policy Alternatives” Edward Elgar Publishing.
Chhattisgarh Swami Vivekananda Technical University, Bhilai (C.G.)
Semester: M.TECH. Ist Specialization : e-Security
Subject: Biometrics Security (Elective III) Code: 577331 (33)
Total Theory Periods: 40 Total Tutorial Periods: 12
Total Marks in End Semester Exam. : 100 Minimum number of class test to be conducted: 02
UNIT I:
Introduction: Benefits of biometrics over traditional authentication systems-benefits of
biometrics Verification and identification, Basic working of biometric matching, Accuracy, False match rate, False non-match rate, Failure to enroll rate, Derived metrics, Layered biometric
solutions, Accuracy in biometric systems.
UNIT II:
Physiological Biometric Technologies: Fingerprints, Facial Scan, Iris Scan, Voice Scan –
their technical description characteristics - Competing technologies- strengths & weaknesses, types of algorithms used for interpretation.
UNIT III:
Behavioral Biometric Technologies: Other physiological biometrics – Hand Scan Biometrics,
DNA Biometrics, Signature and handwriting technology, keystroke scan, Technical description, classification, keyboard /keystroke dynamics, Retina scan – AFIS (Automatic Finger Print
Identification Systems), Behavioral Biometrics.
UNIT IV:
Biometric Variants: Multi biometrics and multi-factor biometrics - two-factor authentication
with passwords, tickets and tokens, executive decision, implementation plan, Case studies: Physiological, Behavioral and multifactor biometrics in identification systems.
UNIT V:
Biometrics Applications: Biometric Solution Matrix, Bio privacy, Comparison of privacy factor
in different biometrics technologies, Designing privacy sympathetic biometric systems,
Biometric standards, Biometric middleware, Biometrics for Network Security, Statistical measures of Biometrics, Biometric Transactions.
TEXT BOOKS :
1. John Chirillo and Scott Blaul, “Implementing Biometric Security”, 1st Edition, John Wiley &
Sons Publications, 2005. 2. Paul Reid, “Biometrics for Network Security”, 1st Edition, Pearson Publication, 2004.
3. Samir Nanavathi, Michel Thieme, Raj Nanavathi, “Biometrics -Identity verification in a
network”, Wiley Eastern, 2002.
REFERENCES
1. Biometrics- The Ultimate Reference- John D. Woodward, Jr. Wiley Dreamtech. Reference (http://www.jntu.ac.in/)
2. Jain, Anil K.; Flynn, Patrick; Ross, Arun A. (Eds.), “Handbook of Biometrics”, Springer
Publications
3. Ruud M. Bolle, Jonathan H. Connell, Sharath Pankanti, Nalini K. Ratha, Andrew W. Senior, “Guide
to Biometrics” 1st Edition, Springer Verilag New York, LLC.
Chhattisgarh Swami Vivekananda Technical University, Bhilai (C.G.)
Semester: M.TECH. Ist Specialization : e-Security
Subject: Security Issues in Wireless Adhoc Network (Elective III) Code: 577332 (33)
Total Theory Periods: 40 Total Tutorial Periods: 12
Total Marks in End Semester Exam. : 100 Minimum number of class test to be conducted: 02
Unit 1
Fundamentals of Wireless Communication Technology: The Electromagnetic Spectrum,
Radio Propagation Mechanisms, Characteristics of the Wireless Channel - IEEE 802.11a,b Ad hoc: Packet Radio Networks, Technical Challenges, Architecture of PRNETs, Components of
Packet Radios, Heterogeneity in Mobile Devices, Traffic Profiles - Types of Ad hoc Mobile
Communications -Types of Mobile Host Movements, Challenges Facing Ad Hoc Mobile
Networks, Ad hoc wireless Internet.
Unit 2 Design Issues of a Routing Protocol: Classifications of Routing Protocols, Table-Driven
Routing Protocols, Destination Sequenced Distance Vector (DSDV), Wireless Routing Protocol
(WRP), Cluster Switch Gateway Routing (CSGR), Source-Initiated On-Demand Approaches, Ad
Hoc On-Demand Distance Vector Routing (AODV), Dynamic Source Routing (DSR), Temporally
Ordered Routing Algorithm (TORA), Signal Stability Routing (SSR), Location-Aided Routing (LAR), Power-Aware Routing (PAR), Zone Routing Protocol (ZRP).
Unit 3:
Issues in Designing a Multicast Routing Protocol: Operation of Multicast Routing Protocols,
An Architecture Reference Model for Multicast Routing Protocols, Classifications of Multicast
Routing Protocols, Tree-Based Multicast Routing Protocols, Mesh-Based Multicast Routing
Protocols, Summary of Tree-and Mesh-Based Protocols, Energy-Efficient Multicasting
Unit 4:
Design Issues and Goals of Transport Layer Protocol: Classification of Transport Layer
Solutions, TCP Over Ad Hoc Wireless Networks, Other Transport Layer Protocols, Network
Security Requirements - Issues and Challenges in Security Provisioning, Network Security
Attacks, Key Management, Secure Routing in ADHOC Sensor Networks.
Unit 5:
Energy Management & Requirements: Classification of Energy Management Schemes-
Battery Management Schemes, Transmission Power Management Schemes and System Power
Management schemes.
TEXT BOOKS:
1. C. Siva Ram Murthy and B.S. Manoj “Ad Hoc Wireless Networks: Architectures and
Protocols”, Prentice Hall, TR,2004
2. C.K. Toh, Ad Hoc Mobile Wireless Networks: Protols and Systems, Prentice Hall PTR ,2001
3. Charles E. Perkins, Ad Hoc Networking, Addison Wesley, 2000.
REFERENCES:
1. Farooq Anjum, Petros Mouchtaris,” Security for Wireless Ad Hoc Networks”, John Wiley &
Sons.
2. Prasant Mohapatra, Srikanth Krishnamurthy,” Ad Hoc Networks: Technologies and
Protocols”,Springer
3. Azzedine Boukerche,” Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks”,
John Wiley & Sons.
Chhattisgarh Swami Vivekananda Technical University, Bhilai (C.G.)
Semester: M.TECH. Ist Specialization : e-Security
Subject: Cloud Computing (Elective III) Code: 571332 (33) Total Theory Periods: 40 Total Tutorial Periods: 12
Total Marks in End Semester Exam. : 100
Minimum number of class test to be conducted: 02
Unit - I Introduction: What is the Cloud? The Emergence of Cloud Computing, Cloud-Based Service
Offerings, Benefits of using a Cloud Model, What Are the Key Characteristics of Cloud
Computing?, The Evolution of Cloud Computing, Hardware & Internet Software Evolution.
Unit - II
Services: Communication-as-a-Service (CAAS), Infrastructure-as-a-Service (IAAS), Monitoring-as-a-Service (MAAS), Platform-as-a-Service (PAAS), Software-as-a-Service (SAAS).
Unit - III
Architecture: The Evolution from the MSP Model to Cloud Computing and Software-as-a-
Service, The Cloud Data Center, Basic Approach to a Data Center-Based SOA, Where Open Source Software is Used?, Service-Oriented Architectures as a Step Toward Cloud Computing.
Unit - IV
Security Issues: Cloud Security Challenges, Software-as-a-Service, Security Management
People, Security Governance, Security Portfolio Management, Security Architecture Design,
Virtual Machine Security, Identity Access Management (IAM), Data Security.
Unit – V
Emerging Areas: Smartphone, Mobile Operating Systems for Smartphone’s (iPhone, Windows
Mobile), Google(Android) Blackberry, Ubuntu Mobile Internet, Mobile Platform Virtualization
(KVM, VMWare).
TEXT BOOKS:
1. Toby Velte, Anthony Vote and Robert Elsenpeter, “Cloud Computing: A Practical
Approach”, McGraw Hill, 2002.
2. Michael Miller, “Cloud Computing: Web-Based Applications That Change the Way You Work and Collaborate Online”, Que Publishing, August 2008.
3. Nick Antonopoulos, Lee Gillam ,” Cloud Computing: Principles, Systems and
Applications“ , Springer
REFERENCES:
1. George Reese, “Cloud Application Architectures: Building Applications and
Infrastructures in the Cloud”, O’Reilly Media, 2003.
2. Tim Matherm, Subra Kumaraswamy and Shahed Latif, “Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance”, O’Reilly Media, 2005.
3. Kris A. Jamsa, “Cloud Computing: Virtualization, Business Models, Mobile”, Jones & Bartlett Publishers.
4. Michael Miller, “Cloud Computing: Web-Based Applications”, Que Publishing.