cyber security_final
cyber security_final
II Semester
S. Course Course Title Periods Evaluation Total
No. Code Scheme
L T P CT TA
1. CSS201 Design Thinking 2 0 0
2. CSS202 Python Language 2 0 0
3. CSS251 Python Language Lab 0 0 1
4.
Project in Python Language
CSS252 (Completed during Summer 0 0 0
Break and evaluated at the
beginning of third semester)
CO 5: To implement functions.
Python Conditional Statements — IF…Else, ELIF & Switch Case, Python For & While Loops
— Enumerate, Break, Continue Statement, Python break, continue, pass statements — Learn
with Example, Python OOPs — Class, Object, Inheritance and Constructor with Example.
Python Strings — Replace, Join, Split, Reverse, Uppercase & Lowercase, Python String strip()
Function — What is, Examples of strip() Function, Python String count() — Python String
count() Method with Examples, Python String format() — What is, How works & Examples,
Python String len() Method — Python string length ,len() method Example, Python String find()
Method — Python string.find() Method With Examples.
Python TUPLE — Pack, Unpack, Compare, Slicing, Delete, Key, Python Dictionary(Dict) —
Update, Cmp, Len, Sort, Copy, Items, str Example, Python Dictionary Append — How to Add
Key/Value Pair, Python Operators — Arithmetic, Logical, Comparison, Assignment, Bitwise &
Precedence, Python Arrays — Create, Reverse, Pop with Python Array Examples.
Python Main Function & Method Example — Understand __main__, Python Functions
Examples — Call, Indentation, Arguments & Return Values, Lambda Functions in Python —
Python Lambda Functions with EXAMPLES, Python abs() Function — Absolute Value
Examples, Python round() Function — What is the round() function in Python, Examples,
Python map() Function — What is the map() function in Python (With Examples), Python
Tutorial — Generator & Yield vs Return Example.
Python Queue — FIFO, LIFO Example, Python Counter in Collections — What is, Use &
Examples, Enumerate() Function in Python — Loop, Tuple, String (Example), Python
time.sleep() — Add Delay to Your Code (Example), type() and isinstance() in Python — What
is, Syntax & Examples, Python New Line — How to Print WITHOUT Newline in Python.
LIST OF PROGRAMS
11.Write a Python program to encrypt the text using Caesar Cipher technique. Display the
encrypted text. Prompt the user for input and the shift pattern.
13. Basic programs related to python libraries like Numpy, Pandas, Scipy, etc
III SEMESTER
S. Course Course Title Periods Evaluation Total
No. Code Scheme
L T P CT TA
Fundamentals of Cyber
1. CSS301 Security 2 0 0
CO 5: Employ the Penetration Testing and explore the Next Generation Security.
Introduction to Cyber Security, Need for security, Concept of Cyber Space, Cyber Crimes and
Cyber attack. Fundamental security principles – threats, attacks and vulnerability. Key Security
triad – Confidentiality, Integrity and Availability. Key components of cybersecurity network
architecture. Introduction to basic Security Management and Policies - Authentication,
Authorization, Access control, Identification and Accounting, Detection of various cyber-attacks
using Wireshark, Evolution of cyber security.
Introduction to different classes of security attacks - active and passive. Impact of attacks on an
organization and individuals. Principles of Cybersecurity - Apply cybersecurity architecture
principles. Cybersecurity models (the CIA triad, the star model, the Parkerian hexad).
Techniques used by Hackers - The Reconnaissance Phase: Active and Passive Scanning
Techniques. Risk Management – Principles, Types and Strategies - The Risk Management
Framework (RMF). Cyber security Management concepts – Security Governance and
Management roles, models and functions, Packet sniffing using Wireshark, Advances in Cyber
Security: Principles, Techniques, and Applications.
Defining a Cyber Security policy, General security expectations, roles and responsibilities in the
organization – Stakeholders. Cyber security standards and controls - Certification and
accreditation (C&A) process. Audit goals - Updating and auditing cybersecurity procedures -
Compare the organization's cybersecurity policy to actual practices, Managing securing policies
using tcpdump, dumpcap using Wireshark, Best practices for Cyber security standards .
Introduction to key security tools including firewalls, anti-virus and cryptography – Identify
security tools and hardening techniques – Prevention of cyber-attacks. Security Countermeasure
tools and techniques - Encryption standards - Modern Methods - Legitimate versus Fraudulent
Encryption Methods. Security threats – Threat and Risk exposure - Determine the organization's
exposure to internal threats - Evaluate the risk of external security threats, Security analysis and
reporting using Wireshark, Cyber-attacks, countermeasures and protection schemes .
Cyber security testing – Penetration testing. System Level Solutions - Intrusion Detection
System (IDS) and Intrusion Protection System (IPS). Basic Concept of Ethical Hacking.
Protecting against Cyber Crime – Identity Theft, Cyber Stalking and Investment fraud.
Introduction to digital forensics - Digital Forensics Tools and Forensics Investigative Process.
Introduction to Next-Generation Firewall – Preventing Infection and Finding Infected Hosts.
Smart Policies for ensuring security, PenTest (Penetration Testing) using Wireshark, Next-
generation digital forensics.
Public-Key Cryptography - RSA algorithm and its applications - Diffie-Hellman Key Exchange -
Elgamal Cryptographic System -Elliptic Curve Arithmetic - Elliptic Curve Cryptography -
Pseudorandom Number Generation based on asymmetric cipher.
Hash Functions – Two Simple Hash Function – Hash Function based on Cipher Block Chaining
– Secure Hash Function – SHA-3 – Message Authentication Code – HMAC – CMAC – Digital
Signatures – Elliptic Curve Digital Signature Algorithm - RSA-PSS Digital Signature Algorithm,
Pseudorandom Number Generation Using Hash Functions and MACs.
[CSS-351]
IV SEMESTER
S. Course Course Title Periods Evaluation Total
No. Code Scheme
L T P CT TA
Cyber security Risk
1. CSS401 Management and Mitigation 2 0 0
Threat vs Hazards – Threat Models – STRIDE, PASTA, Attack Trees, OCTAVE, Security Cards
What is risk? - Cyber Risk Assessment – Need to perform Risk Assessment – Process to perform
Risk assessment – Risk analysis Process – Risk assessment Check list.
Addressing people risks – Personnel and training – Security Awareness training. Addressing
process risk – Operational security risks – Insecure Software development life cycle risk –
Physical security risk– Third party relationship risks. Addressing Technology Risks – Network
risk – Platform risk –Application layer risk.
Wireless Sensor Networks – Issues – Secure Data aggregation – Computing and verifying an
approximate median – GC Approach – Attack Resilient Median Computation – Geographical
analysis - Privacy in Data Aggregation - Twin Key Agreement – Data Aggregations.
V Semester
S. Course Course Title Periods Evaluation Total
No. Code Scheme
L T P CT TA
Cyber Forensics,
1. CSS 501 2 0 0
Investigations and Laws
Information and Network
2. CSS 502 Security 2 0 0
White collar crimes – Economic offense – cyber stalking - cyber extortion – cyber terrorism –
cyber espionage - cyber warfare –cyber weapons - Data frauds – cybersquatting - Child
Pornography – obscene messages - Job Racketing - Marketing and Advertisement Rackets -
Nigerian frauds- pay per click scams –web defacement - ATM frauds - IP spoofing, key logging,
Email Fraud, Telecommunication Fraud - Software piracy.
Digital device – Hard disk –Disk characteristics - Disk imaging - Data Carving – techniques –
commercial piracy - soft lifting – Steganography – Network components - Port scans - Wireshark
- pcap analysis - Trojans and Backdoors – Botnets - DoS – DDoS Attacks - Honey Pots, Active
and Passive Sniffing.
CO1: Develop Concept of Security needed in Communication of data through computers and
networks along with Various Possible Attacks.
CO2: Understand Various Encryption mechanisms for secure transmission of data and
CO5 : Understand network security concepts and study different Web security mechanisms.
Multiple encryption and triple DES, Electronic Code Book, Cipher Block Chaining Mode,
Cipher Feedback mode, Output Feedback mode, Counter mode Public Key Cryptosystems with
Applications, Requirements and Cryptanalysis, RSA algorithm, its computational aspects and
security, Diffie-Hillman Key Exchange algorithm, Man-in-Middle attack.
Module 3: (5 Lectures)
Cryptographic Hash Functions, their applications, Simple hash functions, its requirements and
security, Hash functions based on Cipher Block Chaining, Secure Hash Algorithm (SHA)
Message Authentication Codes, its requirements and security, MACs based on Hash Functions,
Macs based on Block Ciphers.
Digital Signature, its properties, requirements and security, various digital signature schemes
(Elgamal and Schnorr), NIST digital Signature algorithm Key management and distribution,
symmetric key distribution using symmetric and asymmetric encryptions, distribution of public
keys, X.509 certificates, Public key infrastructure.
Remote user authentication with symmetric and asymmetric encryption, Kerberos Web Security
threats and approaches, Transport layer security, HTTPS and SSH.
Network Security-Firewalls, IP Security, VPN, Intrusion Detection, Web Security, SSL, TLS
[CSS-551]
12. Study and use the Wireshark for the various network protocols.
VI Semester
S. Course Course Title Periods Evaluation Total
No. Code Scheme
Offensive, Defensive Cyber
1. CSS601 Security Techniques 2 0 0
(5 Lectures)
Hacking Topologies
Introduction – Threat Hunting and its goals - Threat Hunting Requirements – Hunting Process –
Threat, Hunting Techniques - A simple hunting maturity model
Incident response – Introduction, concepts , tools and techniques; Learning Malware Analysis:
Explore the concepts, tools, and techniques to analyze and investigate malware, Investigate
malware threats.
E-Mail Security - Web security - Web Injection Attack - Cross Site Scripting (XSS) - Secure
Software Development - Cyber crime and cyber terrorism - Cyber operations and Defense
Techniques- Phases of a cyber attack- Information warfare and surveillance - Steganography -
Security Engineering, Security Defense Mechanisms.
Current information security policy sets- Effectiveness of information security policy sets
Information security policy types: Policies, standard, guidelines, procedures- Information
security policy framework- Information security policy sets without frameworks - Information
security policy with frameworks - Common information security policy frameworks: FISMA
framework, NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI
DSS- Tailoring information is SPFs- Delivering a policy set from a framework.
Information security policy projects, project Phases, revision project and application Monitoring
Information security policy details- Front matter- Policy statements- black matter- policy
requirement expectations - specific information security policies - organisational-level policies-
security program level policies- user security policies- system and control policies- Policy
document examples, Information Security Policies.
Less Formal languages and structure- various purposes of the standard and guidelines-
Information security procedures, Information security procedures.
VII Semester
1. Contentedly discuss and describe the history, types and applications of Blockchain.
Ethereum (ETH) – Smart Contracts, UTXO, Types of Accounts - Externally controlled accounts
and Contract account, Merkley Tree, Ether, Components of Ethereum Transaction, DApps, Hard
& Soft Fork, Bitcoin Stack versus Ethereum Stack.
MODULE 5: USECASES IN BLOCK CHAIN (5 Lectures)
CO 2: To disseminate knowledge on patents, patent regime in India and abroad and registration
aspects.
CO 3: To disseminate knowledge on copyrights and its related rights and registration aspects.
Introduction and the need for intellectual property right (IPR) - Kinds of Intellectual Property
Rights: Patent, Copyright, Trade Mark, Design, Geographical Indication, Plant Varieties and
Layout Design – Genetic Resources and Traditional Knowledge – Trade Secret - IPR in India :
Genesis and development – IPR in abroad - Major International Instruments concerning
Intellectual Property Rights: Paris Convention, 1883, the Berne Convention, 1886, the Universal
Copyright Convention, 1952, the WIPO Convention, 1967,the Patent Co-operation Treaty, 1970,
the TRIPS Agreement, 1994.
Nature of Copyright - Subject matter of copyright: original literary, dramatic, musical, artistic
works; cinematograph films and sound recordings - Registration Procedure, Term of protection,
Ownership of copyright, Assignment and licence of copyright - Infringement, Remedies &
Penalties – Related Rights - Distinction between related rights and copyrights
Concept of Trademarks - Different kinds of marks (brand names, logos, signatures, symbols,
well known marks, certification marks and service marks) - Non Registrable Trademarks -
Registration of Trademarks - Rights of holder and assignment and licensing of marks -
Infringement, Remedies & Penalties - Trademarks registry and appellate board.
Design: meaning and concept of novel and original - Procedure for registration, effect of
registration and term of protection.
Geographical Indication (GI): meaning, and difference between GI and trademarks - Procedure
for registration, effect of registration and term of protection .
Plant Variety Protection: meaning and benefit sharing and farmers’ rights – Procedure for
registration, effect of registration and term of protection.
Layout Design protection: meaning – Procedure for registration, effect of registration and term
of protection.
Current Contour : India`s New National IP Policy, 2016 – Govt. of India step towards
promoting IPR – Govt. Schemes in IPR – Career Opportunities in IP - IPR in current scenario
with case studies.