0% found this document useful (0 votes)
93 views8 pages

Scheme and Detailed Syllabus: M.Tech. Cyber Security

this is the course description

Uploaded by

Neeraj Patel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
93 views8 pages

Scheme and Detailed Syllabus: M.Tech. Cyber Security

this is the course description

Uploaded by

Neeraj Patel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Scheme and Detailed Syllabus

M.TECH. CYBER SECURITY

[Revised syllabus to be effective from session 2019 for batch 2019-21 and ]subsequent batc

Contact hours /
Sub.
Sem Title of the subject Credits week
Code
L T P

1CS01 Mathematical Foundations of Cyber Security 4 4 - -


1CS02 Topics in Cyber Security 4 3 - 2
I 1CS03 Cyber Crime, Cyber Laws and IPR 4 4 - -
1CS04 Wireless Networks: Security and Privacy 4 3 - 2
1CSxx Program Elective - I 4
1CSxx Program Elective - II 4

2CS05 Applied Cryptography 4 3 - 2


2CS06 Cyber Forensics, Audit and Investigation 4 3 - 2
II 2CS07 Web Application and Penetration Testing 4 3 - 2
2CS08 Malware Analysis & Network Security 4 3 - 2
2CSxx Program Elective III 4
2CSxx Program Elective IV 4
III
3CS09 Dissertation I 16 32
IV
4CS10 Dissertation II 16 32
List of Electives

Following list has to be used for offering programme elective I and II. Additional Elective
can be added as and when required after taking departmental approval.
Contact hours /
Sub.
Title of the subject Credits week
Code
L T P
Group A(Program Elective I & II)
1CS51 Cloud Computing 4 3 1
1CS52 E Commerce 4 4
1CS53 Neural Networks 4 3 2
1CS54 Data Mining 4 3 2
1CS55 Information Security and Privacy 4 3 1
1CS56 Security Analysis of Protocols 4 3 1
Group A(Program Elective III & IV)
2CS57 Banking Technology and Management 4 4
2CS58 Big Data Analytics 4 3 2
2CS59 Machine Learning 4 3 1
2CS60 Cloud Computing and Security 4 3 1
2CS61 Introduction of evolutionary computing 4 4
2CS62 Internet of Things and Security 4 3 2

Students can also elect subjects offered by online MOOC portals (NPTEL, SWAYAM, etc.)
as Program Elective after departmental approval.
Group A (Program Elective)

SECURITY ANALYSIS OF PROTOCOLS

Course Credits: 4 (3-1-0) 1CS56

Unit I
Introduction: Security protocols, Security properties, Public-key certificates and infrastructures,
Cryptographic hash functions, Digital signatures, Security protocol vulnerabilities

Unit II
Security Protocols: Needham- Schroeder public-key protocol and its security analysis, Protocols for
anonymity, Anonymity and MIX networks, Fairness and contract signing, Fair exchange and contract
signing protocols, Game-based verification of contract signing protocols. Yahalom protocol: Secrecy,
Authentication, Non-repudiation, Anonymity; Dolev-Yao threat model.

Unit III
Finite-state checking (Murphi), Infinite-state symbolic analysis (SRI constraint solver), Probabilistic
model checking (PRISM)

Unit IV
CSP: Basic building blocks, Parallel operators, Process behaviour, Modelling security protocols in
CSP - Trustworthy processes, Modelling an intruder, protocol goals.

Unit V
Transformations: Transformations on protocols, Safe simplifying transformations, Structural
transformations. Formal analysis: Formal definitions of security for symmetric ciphers, Formal model
for secure key exchange. Theorem proving - Rank functions, Secrecy of shared key, Authentication.

Books recommended:
 Peter Ryan, Steve Schneider, Michael Goldsmith, Gavin Lowe, Bill Roscoe: Modelling &
Analysis of Security Protocols, Addison Wesley.

 Stephen W. Mancini: Automating Security Protocol Analysis, Storming Media.

 Selected papers and online material


Semester I

WIRELESS NETWORKS: SECURITY & PRIVACY

Course Credits: 4 (3-0-2) 1CS04

Unit I
Wireless Networking Trends, Key Wireless Physical Layer Concepts: Frequency, Wavelength, Phase,
Coding and modulation, Shannon Theorem, Hamming Distance, Multiple Access Methods, Doppler
Shift; Signal Propagation: Reflection, Diffraction, Scattering, Fading, Shadowing, Multipath,
MultiAntenna Systems, Beam forming, MIMO, OFDM; Wireless Local Area Networks: IEEE 802.11,
Amendments; Wireless Personal Area Networks,

Unit II
GSM: Overview, Architecture, GSM Security Principles; General Packet Radio Services (GPRS):
Overview, Architecture; Universal Mobile Telecommunication System (UMTS): Overview,
Architecture and Subsystems; LTE: Overview, Architecture and Subsystems;

Unit III
Radio Frequency Identification (RFID); WiMAX (Physical layer, Media access control, Mobility and
Networking); Multi hop wireless networks: Position & topology base ad-hoc routing protocols,
Proactive and Reactive routing protocols. Route disruption, diversion, routing state based attacks,
SRP, Ariadne, SAODV, ARAN, SMT secure routing protocols, Wireless Sensor Networks,

Unit IV
Security of wireless networks: GSM, UMTS, WEP, IEEE 802.11i, Public Wifi hotspots, Bluetooth;
Vehicular Ad-hoc Networks: vulnerabilities, challenges, Security architecture

Unit V
Naming & addressing principles, attacks and protection techniques, Misbehaviour at MAC layer of
CSMA/CA, its impact and preventive measures, Mobile IPv4, Mobile IPv6, TCP over Wireless
Networks

Books recommended:
 Jochen Schiller, “Mobile Communications”, PHI.

 K Makki, P Reiher,et. all. “Mobile and Wireless Network Security and Privacy”,Springer,
2007

 LeventeButtyan, J P Hubaux. “Security and Cooperation in Wireless Networks”, Cambridge


University Press, 2008.

 Uwe Hansmann, LotharMerk, Martin S. Nicklons and Thomas Stober, Principles of Mobile
Computing, Springer, New York, 2003

 Frank Adelstein, Sandeep KS Gupta, Golden Richard, Fundamentals of Mobile and Pervasive
Computing,McGraw-Hill

 Butty L. &Hubaux J.P. (2007): Security and Cooperation in Wireless Networks: Thwarting
Malicious and Selfish Behavior in the Age of Ubiquitous Computing, Cambridge University
Press.

 Wireless Ad hoc and Sensor Networks – Protocols, Performance and Control,


JagannathanSarangapani, CRC Press, Taylor & Francis Group, 2007
Semester I

MATHEMATICAL FOUNDATIONS FOR CYBER SECURITY

Course Credits: 4 (4-0-0) 1CS01

Unit I
Number Theory: Introduction - Divisibility - Greatest common divisor - Prime numbers -
Fundamental theorem of arithmetic - Mersenne primes - Fermat numbers - Euclidean algorithm -
Fermat’s theorem - Euler totient function - Euler’s theoerem. Congruences: Definition - Basic
properties of congruences - Residue classes - Chinese remainder theorem.

Unit II
Algebraic Structures: Groups – Cyclic groups, Cosets, Modulo groups - Primitive roots - Discrete
logarithms. Rings – Sub rings, ideals and quotient rings, Integral domains. Fields – Finite fields – GF
(pn), GF(2n ) - Classification - Structure of finite fields. Lattice, Lattice as Algebraic system, sub
lattices, some special lattices.

Unit III
Probability Theory: Introduction – Concepts of Probability - Conditional Probability - Baye’s
Theorem - Random Variables – discrete and continuous- central Limit Theorem-Stochastic
ProcessMarkov Chain.

Unit IV
Coding Theory: Introduction - Basic concepts: codes, minimum distance, equivalence of codes,
Linear codes - Linear codes - Generator matrices and parity-check matrices - Syndrome decoding –
Hamming codes - Hadamard Code - Goppa codes.

Unit V
Pseudorandom Number Generation: Introduction and examples - Indistinguishability of Probability
Distributions - Next Bit Predictors - The Blum-Blum-Shub Generator – Security of the BBS
Generator.

Books recommended:
 D. S. Malik, J. Mordeson, M. K. Sen, Fundamentals of abstract algebra, Tata McGraw Hill

 P. K. Saikia, Linear algebra, Pearson Education, 2009.

 I. Niven, H.S. Zuckerman and H. L. Montgomery, An introduction to the theory of numbers,


John Wiley and Sons, 2004.

 D P Bersekas and J N Tsitsiklis, Introduction to probability, Athena Scientific, 2008

 Douglas Stinson, ‘Cryptography – Theory and Practice’, CRC Press, 2006.

 Sheldon M Ross, “Introduction to Probability Models”, Academic Press, 2003.

 C.L. Liu, ‘Elements of Discrete mathematics’, McGraw Hill, 2008.

 Fraleigh J. B., ‘A first course in abstract algebra’, Narosa, 1990.

 Joseph A. Gallian, ‘’Contemporary Abstract Algebra’, Narosa, 1998


Semester I

TOPICS IN CYBER SECURITY

Course Credits: 4 (3-0-2) 1CS02

Unit I
Topics in Data Structures : Various Trees, Linked List, Heap, Stack, Queues. Abstract Data Types
using Python and C Language.

Unit II
Topics in Data Base Management Systems: Entity–Relationship model (E-R model) – E-R Diagrams,
Functional Dependencies – Non-loss Decomposition, First, Second, Third Normal Forms,
Dependency Preservation – Boyce/Codd Normal Form- Multi-Valued Dependencies and Fourth
Normal Form – Join Dependencies and Fifth Normal Form, Two Phase Commit, ACID Property, Two
Phase Locking –Intent Locking – Deadlock- Serializability, Magnetic Disks – RAID – Tertiary
storage – File Organization

Unit III
Topics in Algorithms: Algorithm Development, Complexity analysis, Sorting, Searching, BFS, DFS,
Minimum Spanning Tree, Prim’s and Kruskal’;s algorithms, Greedy algorithms – Divide and conquer
– Dynamic programming – backtracking– algorithm analysis

Unit IV
Topics in Operating System: Overview of operating systems, functionalities and characteristics of OS,
concept of a process, operations on processes, process states, concurrent processes, process control
block, process context, Job and processor scheduling, scheduling algorithms, Deadlock: prevention,
detection, avoidance, banker’;s algorithm, Memory organization and management, storage allocation
Android OS, iOS, Linux OS file structure and security features

Unit V
Topics in Computer networks: OSI Model and each layer working, properties and related protocols in
security areas.

Books recommended:
 Introduction to Algorithms by Thomas H. Cormen

 The Practice of Programming by Kernighan

 Advanced Programming in the Unix Environment by W. Richard Stevens

 Abraham Silberschatz, Henry F. Korth, S. Sudharshan, “Database System Concepts”, Tata


McGraw Hill

 Ramez Elmasri, Shamkant B. Navathe, “Fundamentals of Database Systems”

 A. V. Aho, J. E. Hopcroft, and J. D. Ullman, “Data Structures and Algorithms”, Pearson


Education

 Andrew Tanenbaum, Modern Operating Systems, Prentice Hall.

 James F. Kuross, Keith W. Ross, “Computer Networking, A Top-Down Approach Featuring


the Internet”, Addison Wesley

 Andrew S. Tanenbaum, “Computer Networks”


Semester I

CYBER CRIME, CYBER LAWS AND IPR

Course Credits: 4 (4-0-0) 1CS03

Unit I
Introduction to cyber crime and cyber law, cyber space and information technology, Nature and scope
of cyber crime, Jurisdiction of cyber crime.

Unit II
Important definitions under IT Act 2000, Cyber crime issues: unauthorized access, White collar
crimes, viruses, malwares, worms, Trojans, logic bomb, Cyber stalking, voyeurism, obscenity in
internet, Software piracy,

Unit III
IT Act 2000, offences under IT Act and IT (amendment) Act, 2008. CRPC overview, Case studies,
Role of intermediaries, Electronic evidence, Cyber terrorism, espionage, warfare and protected system

Unit IV
Overview of amended laws by the IT Act, 2000: The Indian Penal Code, 1860, The Indian Evidence
Act, 1872, The Banker’s Book Evidence Act, 1891, The Reserve Bank of India Act, 1934, Cyber
Theft and the Indian Telegraph Act, 1885. Relevant Case laws. Digital Signatures and certificate -
legal issues

Unit V
Intellectual Property rights: Introduction to IP, Copyright, Related Rights, Trademarks, Geographical
Indications, Industrial Design, Patents, Licensing and transfer of technology, WIPO Treaties,
Copyrights Act, Patents Act, Trademarks Act

Books recommended:
 Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives, Raghu
Santanam, M. Sethumadhavan, Information Science Reference

 Pfleeger, Charles P. and Shari L. Pfleeger. Security in Computing, 4th Edition. Upper Saddle
River, NJ: Prentice Hall, 2008

 Cybercrime: Security and Surveillance in the Information Age, Douglas Thomas; Brian
Loader

 Computer Crime: A Crime-Fighters Handbook by David Icove

 Crime in the Digital Age: Controlling Telecommunications and Cyberspace Illegalities, Peter
N. Grabosky

 Cyberlaw – The Indian Perspective By Pavan Duggal, Saakshar Law Publications.

 Jonathan Rosenoer,“Cyber Law: The law of the Internet”, Springer-Verlag, 1997

 Mark F Grady, FransescoParisi, “The Law and Economics of Cyber Security”, Cambridge
University Press, 2006
Group A (Program Elective)

INFORMATION SECURITY AND PRIVACY

Course Credits: 4 (3-1-0) 1CS55

Unit I
Passwords, security questions, challenge-response, Cryptographic hash functions, Biometrics,
Phishing

Unit II
Web security model, Web authentication and session management, Cross-site request forgery, SQL
injection, cross-site scripting, Logic flaws in Web applications, Clickjacking

Unit III
Online tracking, Symmetric encryption, Kerberos, Memory corruption attacks and defenses, Viruses
and rootkits.

Unit IV
Spam, Attacks on TCP/IP, DNS, BGP. Denial of service, Worms and botnets, Advance Persistent
Threats

Unit V
Firewall and intrusion detection, Public Key Cryptography, SSL and certificates, Anonymity
networks, Side channel attacks: acoustics and reflections

Books recommended:

 Network Security (2nd edition) by Kaufman, Perlman, and Speciner -- required textbook!

 Security Engineering by Anderson

 The Art of Intrusion by Mitnick and Simon

 The Shellcoder's Handbook by Koziol et al.

 Secure Programming for Unix and Linux HOWTO by Wheeler

 Network Security Essentials by Stallings

You might also like