0% found this document useful (0 votes)
6 views

cyber security_final

The document outlines the syllabus for a B.Tech program in Computer Science and Engineering with a specialization in Cyber Security, detailing courses for the first three years. It includes course codes, titles, periods, evaluation schemes, and specific learning outcomes for each module, covering topics such as Python programming, cyber security fundamentals, risk management, and cyber forensics. The curriculum emphasizes practical lab work and projects to enhance students' understanding and application of cyber security concepts.

Uploaded by

Sachin Samriddh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

cyber security_final

The document outlines the syllabus for a B.Tech program in Computer Science and Engineering with a specialization in Cyber Security, detailing courses for the first three years. It includes course codes, titles, periods, evaluation schemes, and specific learning outcomes for each module, covering topics such as Python programming, cyber security fundamentals, risk management, and cyber forensics. The curriculum emphasizes practical lab work and projects to enhance students' understanding and application of cyber security concepts.

Uploaded by

Sachin Samriddh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

B.TECH.

(CSE/IT) WITH STREAM OF ELECTIVES IN CYBER


SECURITY SPECIALIZATION

SYLLABUS FOR I Year

II Semester
S. Course Course Title Periods Evaluation Total
No. Code Scheme
L T P CT TA
1. CSS201 Design Thinking 2 0 0
2. CSS202 Python Language 2 0 0
3. CSS251 Python Language Lab 0 0 1
4.
Project in Python Language
CSS252 (Completed during Summer 0 0 0
Break and evaluated at the
beginning of third semester)

CSS 202 PYTHON LANGUAGE 2L:0T:0P

CO 1: To read and write simple Python programs.

CO 2: To develop Python programs with conditionals and loops.

CO 3: To define Python strings.

CO 4: To do with python data structures .

CO 5: To implement functions.

Module 1 – Introduction to Python and Computer Programming(4 Lectures)

Comparison of python language with other programming languages, Compiler, interpreter,


Install Python IDE — How to Install Python on Windows [IDE], Python implementations,
Python Hello World — Create Your First Python Program, Python print() Function — How to
Print in Python with Examples ,Python Variables — How to Define/Declare String Variable
Types.
Module 2 - Python Conditional Loops (5 Lectures)

Python Conditional Statements — IF…Else, ELIF & Switch Case, Python For & While Loops
— Enumerate, Break, Continue Statement, Python break, continue, pass statements — Learn
with Example, Python OOPs — Class, Object, Inheritance and Constructor with Example.

Module 3- Python Strings (5 Lectures)

Python Strings — Replace, Join, Split, Reverse, Uppercase & Lowercase, Python String strip()
Function — What is, Examples of strip() Function, Python String count() — Python String
count() Method with Examples, Python String format() — What is, How works & Examples,
Python String len() Method — Python string length ,len() method Example, Python String find()
Method — Python string.find() Method With Examples.

Module 4–Python Data Structure (5 Lectures)

Python TUPLE — Pack, Unpack, Compare, Slicing, Delete, Key, Python Dictionary(Dict) —
Update, Cmp, Len, Sort, Copy, Items, str Example, Python Dictionary Append — How to Add
Key/Value Pair, Python Operators — Arithmetic, Logical, Comparison, Assignment, Bitwise &
Precedence, Python Arrays — Create, Reverse, Pop with Python Array Examples.

Module 5: Python Functions (5 Lectures)

Python Main Function & Method Example — Understand __main__, Python Functions
Examples — Call, Indentation, Arguments & Return Values, Lambda Functions in Python —
Python Lambda Functions with EXAMPLES, Python abs() Function — Absolute Value
Examples, Python round() Function — What is the round() function in Python, Examples,
Python map() Function — What is the map() function in Python (With Examples), Python
Tutorial — Generator & Yield vs Return Example.

Python Queue — FIFO, LIFO Example, Python Counter in Collections — What is, Use &
Examples, Enumerate() Function in Python — Loop, Tuple, String (Example), Python
time.sleep() — Add Delay to Your Code (Example), type() and isinstance() in Python — What
is, Syntax & Examples, Python New Line — How to Print WITHOUT Newline in Python.

CSS 251 PYTHON LANUAGE LAB 0L:0T:1P

LIST OF PROGRAMS

1.(i) Concept of multiple assignment.


(ii) Swapping the value of two variables using the concept of multiple assignment.

2. (i) To demonstrate the working of ‘id’ and ‘type’ functions.

(ii) To find all prime numbers within a given range.

3. To print ‘n’ terms of Fibonacci series using iteration.

4. To demonstrate use of slicing in string.

5.To demonstrate use of list related functions .

6. How to Determine the Size of Your List in Python.

7. To Find duplicate and unique items of a list.

8. To demonstrate use of tuple related functions.

9. To demonstrate use of dictionary related functions.

9. To implement stack using list.

10. To implement queue using list.

11.Write a Python program to encrypt the text using Caesar Cipher technique. Display the
encrypted text. Prompt the user for input and the shift pattern.

12. Devise a Python program to implement the Rock-Paper-Scissor game.

13. Basic programs related to python libraries like Numpy, Pandas, Scipy, etc

SYLLABUS FOR II YEAR

III SEMESTER
S. Course Course Title Periods Evaluation Total
No. Code Scheme
L T P CT TA
Fundamentals of Cyber
1. CSS301 Security 2 0 0

2. CSS302 Cyber Security Algorithms 2 0 0


3. CSS351 Cyber security lab 0 0 1

4. KCS 354 Project(Mini Project) 0 0 2


III SEMESTER

CSS 301 FUNDAMENTALS OF CYBER SECURITY 2L:0T:0P

Upon completion of this course, the students will be able to :

CO 1: Outline the key components and principles of security

CO 2: Explore the security attacks and management roles.

CO 3: Apply the cyber security policies and procedures for organizations.

CO 4: Practice the security tools and hardening techniques.

CO 5: Employ the Penetration Testing and explore the Next Generation Security.

MODULE 1: INTRODUCTION TO CYBER SECURITY ( 5 Lectures)

Introduction to Cyber Security, Need for security, Concept of Cyber Space, Cyber Crimes and
Cyber attack. Fundamental security principles – threats, attacks and vulnerability. Key Security
triad – Confidentiality, Integrity and Availability. Key components of cybersecurity network
architecture. Introduction to basic Security Management and Policies - Authentication,
Authorization, Access control, Identification and Accounting, Detection of various cyber-attacks
using Wireshark, Evolution of cyber security.

MODULE 2: SECURITY ATTACKS, PRINCIPLES AND MANAGEMENT (5 Lectures)

Introduction to different classes of security attacks - active and passive. Impact of attacks on an
organization and individuals. Principles of Cybersecurity - Apply cybersecurity architecture
principles. Cybersecurity models (the CIA triad, the star model, the Parkerian hexad).
Techniques used by Hackers - The Reconnaissance Phase: Active and Passive Scanning
Techniques. Risk Management – Principles, Types and Strategies - The Risk Management
Framework (RMF). Cyber security Management concepts – Security Governance and
Management roles, models and functions, Packet sniffing using Wireshark, Advances in Cyber
Security: Principles, Techniques, and Applications.

MODULE 3: SECURITY PLANS, POLICIES AND PROCEDURES (5 Lectures)

Defining a Cyber Security policy, General security expectations, roles and responsibilities in the
organization – Stakeholders. Cyber security standards and controls - Certification and
accreditation (C&A) process. Audit goals - Updating and auditing cybersecurity procedures -
Compare the organization's cybersecurity policy to actual practices, Managing securing policies
using tcpdump, dumpcap using Wireshark, Best practices for Cyber security standards .

MODULE 4: OVERVIEW OF SECURITY COUNTERMEASURE TOOLS (5 Lectures)

Introduction to key security tools including firewalls, anti-virus and cryptography – Identify
security tools and hardening techniques – Prevention of cyber-attacks. Security Countermeasure
tools and techniques - Encryption standards - Modern Methods - Legitimate versus Fraudulent
Encryption Methods. Security threats – Threat and Risk exposure - Determine the organization's
exposure to internal threats - Evaluate the risk of external security threats, Security analysis and
reporting using Wireshark, Cyber-attacks, countermeasures and protection schemes .

MODULE 5: CYBER SECURITY TESTING, DIGITAL FORENSICS AND NEXT


GENERATION SECURITY (4 Lectures)

Cyber security testing – Penetration testing. System Level Solutions - Intrusion Detection
System (IDS) and Intrusion Protection System (IPS). Basic Concept of Ethical Hacking.
Protecting against Cyber Crime – Identity Theft, Cyber Stalking and Investment fraud.
Introduction to digital forensics - Digital Forensics Tools and Forensics Investigative Process.
Introduction to Next-Generation Firewall – Preventing Infection and Finding Infected Hosts.
Smart Policies for ensuring security, PenTest (Penetration Testing) using Wireshark, Next-
generation digital forensics.

CSS 302 CYBER SECURITY ALGORITHMS 2L:0T: 1P

Upon completion of this course, the students will be able to:

CO 1: Use the symmetric cipher Cryptography algorithms.

CO 2: Employ the asymmetric cipher Cryptography algorithms.

CO 3: Apply the Cryptanalysis algorithms.

CO 4: Practice Data Integrity algorithms.

CO 5: Use machine learning algorithms for cyber security.

MODULE 1: SYMMETRIC CIPHERS (5 Lectures)


Cryptography – Private key Cryptography - Classical Encryption Techniques - Substitution
Techniques - Transposition Techniques - Rotor Machines - Steganography - Data Encryption
Standard – Advanced Encryption Standard - Multiple Encryption and Triple DES , Stream
ciphers.

MODULE 2: ASYMMETRIC CIPHERS(5 Lectures)

Public-Key Cryptography - RSA algorithm and its applications - Diffie-Hellman Key Exchange -
Elgamal Cryptographic System -Elliptic Curve Arithmetic - Elliptic Curve Cryptography -
Pseudorandom Number Generation based on asymmetric cipher.

MODULE 3: CRYPTANALYTIC METHODS (4 Lectures)

General Cryptanalytic Methods – Brute-Force - Rainbow Tables - Slide Attacks - Matsui’s


Algorithms - Linear Expressions for S-Boxes - Linear Cryptanalysis of DES - S-Box
Differentials - Boomerang Attack

MODULE 4: DATA INTEGRITY ALGORITHMS(5 Lectures)

Hash Functions – Two Simple Hash Function – Hash Function based on Cipher Block Chaining
– Secure Hash Function – SHA-3 – Message Authentication Code – HMAC – CMAC – Digital
Signatures – Elliptic Curve Digital Signature Algorithm - RSA-PSS Digital Signature Algorithm,
Pseudorandom Number Generation Using Hash Functions and MACs.

MODULE 5:MACHINE LEARNING IN CYBER SECURITY (5 Lectures)

Algorithms in Machine learning - Abnormalities in URLs – Detecting Malicious Pages using


Heuristic algorithm - Detecting Malicious URLs using machine learning – Cracking CAPTCHA
using AI – Spam Detection, Network Anomaly detection using “k” means.

CYBER SECURITY LAB

[CSS-351]

1. Write a program to implement Transposition Technique.

2. Write a program to implement Advanced Encryption Standard.

3. Write a program to implement RSA algorithm.

4. Write a program to implement Elliptic Curve Cryptography.

5. Write a program to implement Brute Force Algorithm.

6. Write a program to implement Boomerang Attack.


7. Write a program to implement SHA 3 Algorithms.

8. Write a program to implement Malicious URLs.

9. Write a program to implement E-Mail Spamming.

IV SEMESTER
S. Course Course Title Periods Evaluation Total
No. Code Scheme
L T P CT TA
Cyber security Risk
1. CSS401 Management and Mitigation 2 0 0

2. CSS402 Cyber Security in Critical 2 0 0


Infrastructure
Case Study ( Completed
3. CSS451 during Summer Break and 0 0 0
evaluated at the beginning of
fifth semester)

CSS 401 CYBER SECURITY RISK MANAGEMENT 2L:0T: 0P


AND MITIGATION

Upon completion of this course, the students will be able to

CO 1 : Identify the various IT assets

CO 2 : Analyze the threats and demonstrate various threat models

CO 3 : Create a check list for risk assessment

CO 4: Elaborate the security policies and counter measures

CO 5: Explain the various Risk mitigation processes.

MODULE 1: IT ASSETS (5 Lectures)


Asset Characterization and Identification – Asset Categorization – IT asset management – Asset
Life cycle – IT Asset Management Process – Benefits of Asset management.

MODULE 2: THREAT ANALYSIS (4 Lectures)

Threat vs Hazards – Threat Models – STRIDE, PASTA, Attack Trees, OCTAVE, Security Cards

MODULE 3: RISK ASSESSMENT AND ANALYSIS (5 Lectures)

What is risk? - Cyber Risk Assessment – Need to perform Risk Assessment – Process to perform
Risk assessment – Risk analysis Process – Risk assessment Check list.

MODULE 4: SECURITY POLICIES AND COUNTER MEASURES (5 Lectures)

Risk management process – Counter measures for IT risks. Prioritization of Risks –


Communication of priorities – Security policy introduction – Key role of policies in security
program- Benefits of having proper policies - Role of Policies in Security program – Role of
Counter measures in Security programs – Goals of security policies and Counter measures.

MODULE 5: RISK MITIGATION (5 Lectures)

Addressing people risks – Personnel and training – Security Awareness training. Addressing
process risk – Operational security risks – Insecure Software development life cycle risk –
Physical security risk– Third party relationship risks. Addressing Technology Risks – Network
risk – Platform risk –Application layer risk.

CSS 402 CYBER SECURITY IN CRITICAL 2L:0T: 0P


INFRASTRUCTURE

Upon completion of this course, the students will be able to:

CO 1: Outline the Cyber Critical infrastructure

CO 2: Explore the Critical Infrastructure Modeling

CO 3: Use the Evaluation methods to Critical information infrastructure

CO 4: Explore the Security in Wireless Sensor Networks

CO 5: Outline the Security in Cyber Physical System (CPS)

MODULE 1: CRITICAL INFRASTRUCTURE (5 Lectures)


Critical Infrastructure – Challenges – Risk Analysis - Tools - Multi Criterion Tools – CARVER
– MSRAM – Vulnerability Assessment- Security Audit – Delphi Method – Design Basis Threat
(DBT), Delphi Method – Fault Tree Analysis.

MODULE 2: CRITICAL INFRASTRUCTURE MODELING (4 Lectures)

Modeling and Simulation – Requirements - Topological analysis – Functional Analysis – Agent


based approach – Multilayer approach – Graph Based Technique - Agent based modeling and
simulation.

MODULE 3: EVALUATION OF CRITICAL INFORMATION INFRASTRUCTURE (5


Lectures)

Dependability – Security Evaluation approaches – Financial Infrastructure Protection – Critical


Information Infrastructure – Design Requirement - Peer to Peer Model – Evaluation - Mitigation
– Node Crashes – SCADA data modification.

MODULE 4: Wireless Sensor Security (5 Lectures)

Wireless Sensor Networks – Issues – Secure Data aggregation – Computing and verifying an
approximate median – GC Approach – Attack Resilient Median Computation – Geographical
analysis - Privacy in Data Aggregation - Twin Key Agreement – Data Aggregations.

MODULE 5: CYBER PHYSICAL SYSTEM (5 Lectures)

Cyber Physical System – Architecture – Key Management - Security - Wearable , Appliances –


Port Attack– CPS Reference Model – Protection of CPS Data – Access Control of CPS –
National Security Concerns with CPS - Security in IoT - CPS and IoT Security ,Smart Car
hacking, IoT Device Hacking.

SYLLABUS FOR III YEAR

V Semester
S. Course Course Title Periods Evaluation Total
No. Code Scheme
L T P CT TA
Cyber Forensics,
1. CSS 501 2 0 0
Investigations and Laws
Information and Network
2. CSS 502 Security 2 0 0

3. CSS 551 Information and Network 0 0 1


security Lab
4. KCS 554 Project (Mini Project) 0 0 2

CSS 501 CYBER FORENSICS, INVESTIGATIONS AND 2L:0T: 0P


LAWS

Upon completion of this course, the students will be able to

CO 1: Outline the Cyber crime and its types.

CO 2: Explore the Cyber Forensics Techniques.

CO 3: Use the Cyber Investigation Techniques.

CO 4: Explore the Cyber Evidence Management Techniques.

CO 5: Outline the Cyber Laws in India

MODULE 1: CYBER CRIME (5 Lectures)

White collar crimes – Economic offense – cyber stalking - cyber extortion – cyber terrorism –
cyber espionage - cyber warfare –cyber weapons - Data frauds – cybersquatting - Child
Pornography – obscene messages - Job Racketing - Marketing and Advertisement Rackets -
Nigerian frauds- pay per click scams –web defacement - ATM frauds - IP spoofing, key logging,
Email Fraud, Telecommunication Fraud - Software piracy.

MODULE 2: CYBER FORENSICS (5 Lectures)

Digital device – Hard disk –Disk characteristics - Disk imaging - Data Carving – techniques –
commercial piracy - soft lifting – Steganography – Network components - Port scans - Wireshark
- pcap analysis - Trojans and Backdoors – Botnets - DoS – DDoS Attacks - Honey Pots, Active
and Passive Sniffing.

MODULE 3: CYBER INVESTIGATION(5 Lectures)

Concepts of Investigation - cyber investigation, Network Investigation - Investigating audit logs


-Investigating Web attacks - Investigating Computer Intrusions - Profiling – Cyber Criminal
profiling –Stylometric, Surveying and preserving digital crime scene.

MODULE 4: EVIDENCE MANAGEMENT(4 Lectures)

Evidence – Digital Evidence - Types – physical evidence – Real evidence – Circumstantial


evidence – network evidence- digital evidence– Evidence collection – Evidence Analysis -
Investigative Reconstruction with Digital Evidence.
MODULE 5: CYBER LAWS AND AUTHORITIES(5 Lectures)

Information Technology Act 2000 – Digital signature - Electronic Governance - Secure


electronic records- Regulation of certifying authorities – CERNTin - Electronic signature
certificates – Penalties compensation, IPR Laws.

CSS 502 INFORMATION AND NETWORK SECURITY 2L:0T: 1P

CO1: Develop Concept of Security needed in Communication of data through computers and
networks along with Various Possible Attacks.

CO2: Understand Various Encryption mechanisms for secure transmission of data and

management of key required for required for encryption.

CO3: Understand various authentication mechanisms in form of Hash related functions.

CO4: Understand authentication requirements and study various authentication mechanisms.

CO5 : Understand network security concepts and study different Web security mechanisms.

Module 1:(5 Lectures)

Symmetric Cipher Model, Cryptography, Cryptanalysis and Attacks; Substitution and


Transposition techniques Stream ciphers and block ciphers, Block Cipher structure, Data
Encryption standard (DES) with example, strength of DES, Design principles of block cipher,
AES with structure, its transformation functions, key expansion, example and implementation

Module 2:(5 Lectures)

Multiple encryption and triple DES, Electronic Code Book, Cipher Block Chaining Mode,
Cipher Feedback mode, Output Feedback mode, Counter mode Public Key Cryptosystems with
Applications, Requirements and Cryptanalysis, RSA algorithm, its computational aspects and
security, Diffie-Hillman Key Exchange algorithm, Man-in-Middle attack.

Module 3: (5 Lectures)

Cryptographic Hash Functions, their applications, Simple hash functions, its requirements and
security, Hash functions based on Cipher Block Chaining, Secure Hash Algorithm (SHA)
Message Authentication Codes, its requirements and security, MACs based on Hash Functions,
Macs based on Block Ciphers.

Module 4:(5 Lectures)

Digital Signature, its properties, requirements and security, various digital signature schemes
(Elgamal and Schnorr), NIST digital Signature algorithm Key management and distribution,
symmetric key distribution using symmetric and asymmetric encryptions, distribution of public
keys, X.509 certificates, Public key infrastructure.

Module 5:(4 Lectures)

Remote user authentication with symmetric and asymmetric encryption, Kerberos Web Security
threats and approaches, Transport layer security, HTTPS and SSH.

Network Security-Firewalls, IP Security, VPN, Intrusion Detection, Web Security, SSL, TLS

INFORMATION AND NETWORK SECURITY LAB

[CSS-551]

1. Implement Caesar cipher encryption-decryption.

2. Implement Monoalphabetic cipher encryption-decryption.

3. Implement Playfair cipher encryption-decryption.

4. Implement Polyalphabetic cipher encryption-decryption.

5. Implement Hill cipher encryption-decryption.

6. To implement Simple DES or AES.

7. Implement Diffi-Hellmen Key exchange Method.

8. Implement RSA encryption-decryption algorithm.

9. Write a program to generate SHA-1 hash.

10. Implement a digital signature algorithm.

11. Perform various encryption-decryption techniques with cryptool.

12. Study and use the Wireshark for the various network protocols.

VI Semester
S. Course Course Title Periods Evaluation Total
No. Code Scheme
Offensive, Defensive Cyber
1. CSS601 Security Techniques 2 0 0

2. CSS602 Cyber Security Standards, 2 0 0


Policies and Practices
Case Study ( Completed
3. CSS651 during Summer Break and 0 0 0
evaluated at the beginning of
seventh semester)

CSS 601 OFFENSIVE, DEFENSIVE CYBER 2L:0T: 0P


SECURITY TECHNIQUES

Upon completion of this course, the students will be able to:

CO 1: Explore the ethical hacking and penetration testing skills .

CO 2: Examine organization’s readiness for threat hunting .

CO 3: Develop the vulnerability assessment skills .

CO 4: Explore the key concepts of malware analysis .

CO 5: Develop your SIEM security analyst skills .

MODULE 1: OFFENSIVE: ETHICAL HACKING AND PENETRATION TESTING

(5 Lectures)

Introduction - penetration Testing - Reconnaissance - Scanning - Exploitation - Web-Based


Exploitation Maintaining Access with Backdoors and Rootkits.

Hacking Topologies

MODULE 2: OFFENSIVE: CYBER THREAT HUNTING(4 Lectures)

Introduction – Threat Hunting and its goals - Threat Hunting Requirements – Hunting Process –
Threat, Hunting Techniques - A simple hunting maturity model

MODULE 3: IDENTIFYING AND FIXING VUNERABILITIES(5 Lectures)


Computer Network Vulnerabilities: Sources of Vulnerabilities, Vulnerability Assessment;
Vulnerability Identification and Assessment : Hardware, Software Humanware Policies,
Procedures, and Practices, Vulnerability additional tools.

MODULE 4: INCIDENT RESPONSE AND MALWARE ANALYSIS(5 Lectures)

Incident response – Introduction, concepts , tools and techniques; Learning Malware Analysis:
Explore the concepts, tools, and techniques to analyze and investigate malware, Investigate
malware threats.

MODULE 5: SECURITY INFORMATION AND EVENT MANAGEMENT(5 Lectures)

Introduction; deployment of SIEM technologies - monitor, identify, document, and respond to


security threats, alerts management: implement SIEM products; SIEM capabilities for business
intelligence; Realworld case studies, Developing incidence response program.

CSS 602 CYBER SECURITY STANDARDS, 2L:0T: 0P


POLICIES AND PRACTICES

Upon completion of this course, the students will be able to:

CO 1: Describe the various security concepts.

CO 2: Apply cyber defense techniques.

CO 3: Describe information security policy and framework.

CO 4: Summarize various security policies.

CO 5: Analysis the information security procedures.

MODULE 1: SECURITY CONCEPTS AND MECHANISMS(5 Lectures)

Networking Concepts Overview - Basics of Communication Systems - Wireless Networks -


Internet - Information Security Concepts - Overview and services - Types of Attacks - Security
Goal - E-commerce security - Security Threats and vulnerabilities -- Hacking Techniques -
Password cracking, Security Attacks.

MODULE 2: CYBER DEFENSE TECHNIQUES(5 Lectures)

E-Mail Security - Web security - Web Injection Attack - Cross Site Scripting (XSS) - Secure
Software Development - Cyber crime and cyber terrorism - Cyber operations and Defense
Techniques- Phases of a cyber attack- Information warfare and surveillance - Steganography -
Security Engineering, Security Defense Mechanisms.

MODULE 3: INFORMATION SECURITY POLICY BASICS AND FRAMEWORK(5


Lectures)

Current information security policy sets- Effectiveness of information security policy sets
Information security policy types: Policies, standard, guidelines, procedures- Information
security policy framework- Information security policy sets without frameworks - Information
security policy with frameworks - Common information security policy frameworks: FISMA
framework, NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI
DSS- Tailoring information is SPFs- Delivering a policy set from a framework.

Information security policy projects, project Phases, revision project and application Monitoring

Tools, Information Security Frameworks.

MODULE 4: INFORMATION SECURITY POLICY DETAILS (5 Lectures)

Information security policy details- Front matter- Policy statements- black matter- policy
requirement expectations - specific information security policies - organisational-level policies-
security program level policies- user security policies- system and control policies- Policy
document examples, Information Security Policies.

MODULE 5: INFORMATION SECURITY PROCEDURES AND STANDARDS (4


Lectures)

Less Formal languages and structure- various purposes of the standard and guidelines-
Information security procedures, Information security procedures.

SYLLABUS FOR IV YEAR

VII Semester

S. Course Course Title Periods Evaluation Total


No. Code Scheme
L T P CT TA
Blockchain &
Cryptocurrencies
1. CSS 701 2 0 0
Fundamentals

2. CSS 702 Intellectual property Right 2 0 0


Major Project ( Continued
3. CSS 751 0 0 0
upto 8th semester)
CSS701 BLOCKCHAIN AND CRYPTOCURRENCIES 2L:0T: 0P
FUNDAMENTALS

Upon completion of this course, the students will be able to

1. Contentedly discuss and describe the history, types and applications of Blockchain.

2 . Gains familiarity with cryptography and Consensus algorithms.

3 .Grasp what is Cryptocurrency and how it functions .

4. Acquire knowledge about Bitcoin and Ethereum .

5. Understand role of cryptography in Blockchain Technology .

MODULE 1: INTRODUCTION TO BLOCKCHAIN (5 Lectures)

Distributed DBMS – Limitations of Distributed DBMS, Introduction to Block chain – History,


Definition, Distributed Ledger, Blockchain Categories – Public, Private, Consortium,
Blockchain Network and Nodes, Peer-to-Peer Network, Mining Mechanism, Generic elements of
Blockchain, Features of Blockchain, and Types of Blockchain.

MODULE 2: CRYPTOGRAHY AND BLOCKCHAIN ARCHITECTURE(5 Lectures)

Cryptography, Encryption – Public Key, Private Key, Symmetric Encryption, Asymmetric


Encryption, Message Signing, Private VS Public Blockchains, Internet of Blockchains,
Blockchain Architecture – Block, Hash, Distributer P2P, Structure of Blockchain, Data
Distribution of Blockchain, Consensus, Consensus Algorithms - Proof of Work (PoW) , Proof of
Stake (PoS), Proof of Elapsed Time (PoET) .

MODULE 3: CRYPTOCURRENCY BASICS AND BITCOIN (5 Lectures)

Introduction to Cryptocurrencies, Tokens – Cryptosecurities, Players involved - Cryptocurrency


Users, Miners, Cryptocurrency exchanges, Trading platforms, Wallet providers, Coin inventors,
Coin offerors. Distributed Ledger Technology (DLT), Bitcoin (BTC) – Genesis Block, Buy
Bitcoin, Transactions, Unspent Transaction Output (UTXO), Bitcoin Mining, Value of Bitcoin,
Advantages and Disadvantages,

MODULE 4: ETHEREUM CRYPTOCURRENCY (5 Lectures)

Ethereum (ETH) – Smart Contracts, UTXO, Types of Accounts - Externally controlled accounts
and Contract account, Merkley Tree, Ether, Components of Ethereum Transaction, DApps, Hard
& Soft Fork, Bitcoin Stack versus Ethereum Stack.
MODULE 5: USECASES IN BLOCK CHAIN (5 Lectures)

Blockchain in Supply Chain - Blockchain in Manufacturing - Blockchain in Automobiles -


Blockchain in Healthcare - Blockchain in Cyber security - Blockchain in Financial Industry.

CSS702 INTELLECTUAL PROPERTY RIGHT 2L:0T: 0P

CO 1: To introduce fundamental aspects of Intellectual property Rights to students who are


going to play a major role in development and management of innovative projects in industries.

CO 2: To disseminate knowledge on patents, patent regime in India and abroad and registration
aspects.

CO 3: To disseminate knowledge on copyrights and its related rights and registration aspects.

CO 4: To disseminate knowledge on trademarks and registration aspects.

CO 5: To disseminate knowledge on Design, Geographical Indication (GI), Plant Variety and


Layout Design Protection and their registration aspects.To aware about current trends in IPR and
Govt. steps in fostering IPR.

Module 1: Overview of Intellectual Property (5 Lectures)

Introduction and the need for intellectual property right (IPR) - Kinds of Intellectual Property
Rights: Patent, Copyright, Trade Mark, Design, Geographical Indication, Plant Varieties and
Layout Design – Genetic Resources and Traditional Knowledge – Trade Secret - IPR in India :
Genesis and development – IPR in abroad - Major International Instruments concerning
Intellectual Property Rights: Paris Convention, 1883, the Berne Convention, 1886, the Universal
Copyright Convention, 1952, the WIPO Convention, 1967,the Patent Co-operation Treaty, 1970,
the TRIPS Agreement, 1994.

Module 2: Patents (5 Lectures)

Patents - Elements of Patentability: Novelty , Non Obviousness (Inventive Steps), Industrial


Application - Non - Patentable Subject Matter - Registration Procedure, Rights and Duties of
Patentee, Assignment and licence , Restoration of lapsed Patents, Surrender and Revocation of
Patents, Infringement, Remedies & Penalties - Patent office and Appellate Board.

Module 3 : Copyrights (5 Lectures)

Nature of Copyright - Subject matter of copyright: original literary, dramatic, musical, artistic
works; cinematograph films and sound recordings - Registration Procedure, Term of protection,
Ownership of copyright, Assignment and licence of copyright - Infringement, Remedies &
Penalties – Related Rights - Distinction between related rights and copyrights

Module 4: Trademarks (5 Lectures)

Concept of Trademarks - Different kinds of marks (brand names, logos, signatures, symbols,
well known marks, certification marks and service marks) - Non Registrable Trademarks -
Registration of Trademarks - Rights of holder and assignment and licensing of marks -
Infringement, Remedies & Penalties - Trademarks registry and appellate board.

Module 5: Other forms of IP (6 Lectures)

Design: meaning and concept of novel and original - Procedure for registration, effect of
registration and term of protection.

Geographical Indication (GI): meaning, and difference between GI and trademarks - Procedure
for registration, effect of registration and term of protection .

Plant Variety Protection: meaning and benefit sharing and farmers’ rights – Procedure for
registration, effect of registration and term of protection.

Layout Design protection: meaning – Procedure for registration, effect of registration and term
of protection.

Current Contour : India`s New National IP Policy, 2016 – Govt. of India step towards
promoting IPR – Govt. Schemes in IPR – Career Opportunities in IP - IPR in current scenario
with case studies.

You might also like