100% found this document useful (1 vote)
468 views39 pages

MSC CF SYLLABUS2019 Formatted

The document outlines the program structure and syllabus for the M.Sc. in Cyber Forensics program offered by Mahatma Gandhi University for the 2019-2020 admissions. The 2-year program has 4 semesters and offers specializations in software design and digital forensics or data and cyber security. The curriculum includes courses in computer organization, security analysis, cyber forensics tools, cryptography, and electives in areas like network forensics, mobile forensics, and database security. Students must complete coursework, labs, projects, and a viva voce exam to earn the M.Sc. in Cyber Forensics degree.

Uploaded by

Alpha Beta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
468 views39 pages

MSC CF SYLLABUS2019 Formatted

The document outlines the program structure and syllabus for the M.Sc. in Cyber Forensics program offered by Mahatma Gandhi University for the 2019-2020 admissions. The 2-year program has 4 semesters and offers specializations in software design and digital forensics or data and cyber security. The curriculum includes courses in computer organization, security analysis, cyber forensics tools, cryptography, and electives in areas like network forensics, mobile forensics, and database security. Students must complete coursework, labs, projects, and a viva voce exam to earn the M.Sc. in Cyber Forensics degree.

Uploaded by

Alpha Beta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 39

MAHATMA GANDHI UNIVERSITY

KOTTAYAM

M.Sc.

CYBER FORENSICS

PROGRAM STRUCTURE AND SYLLABUS


2019-20 ADMISSIONS ONWARDS

(UNDER MAHATMA GANDHI UNIVERSITY PGCSS REGULATIONS 2019)

EXPERT COMMITTE IN CYBER FORENSICS (PG)


MAHATMA GANDHI UNIVERSITY

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


1. AIM OF THE PROGRAM

To mould the experts, investigators and digital detectives in the field of computer forensics. Those
have to examine digital devices in constructive way with the goal of identifying, preserving,
recovering, analyzing, and presenting evidence in a court of law.

2. Eligibility

A B.Sc. Degree with Cyber Forensics /Computer Science /Information


Technology/Electronics/Computer Application or BCA or equivalent with not less than 55% marks.

Note: Candidates having degree in Cyber Forensics shall be given a weightage of 20% in their
qualifying degree examination marks considered for ranking for admission to MSc Cyber Forensics.

3. MEDIUM OF INSTRUCTON AND ASSESMENT

 English
 As per the regulations of mg university pg css 2019

4.FACULTY UNDER WHICH THE DEGREE IS AWARDED

 Technology and applied science.

5.SPECIALIZATIONS OFFERED,IF ANY

 Group a : Software design and digital forensics

 Group b : Data and cyber security

6.

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


7. CURRICULUM DESIGN ABSTRACT

SEMESTER 1

CF 010101: COMPUTER ORGANIZATION AND EMBEDDED NETWORKING


CF010102: LINEAR ALGEBRA AND NATURAL LANGUAGE PROCESSING
CF010103: SECURITY ANALYSIS USING PYTHON
CF010104: INTRODUCTION TO CYBER FORENSICS
CF010105: CYBER FORENSIC TOOLS AND PROGRAMMING IN PYTHON

SEMESTER 2

CF 010101: ADVANCED NETWORKING AND IOT


CF010202: PENETRATION TESTING AND VULNERABILITY ASSESSMENT
CF010203: ADVANCED OPERATING SYSTEM AND STORAGE MANAGEMENT
CF010204: INCIDENT RESPONSE AND CYBER LAWS
CF010205: ETHICKAL HACKING AND CASE STUDIES IN JAVA-LAB 1

SEMESTER 3

CF010301: CRYPTOGRAPHY AND ITS APPLICATIONS


CF010302: MOBILE AND WEB SECURITY
CF010303: MALWARE ANALYSIS
CF8*0301: ELECTIVE
CF010305: ETHICKAL HACKING LAB AND MINI PROJECT-LAB 2

SEMESTER 4

CF010401: CYBER SECURITY RISK ASSESSMENT


CF8*0402: ELECTIVE
CF8*0403: ELECTIVE
PROJECT
VIVA-VOCE

ELECTIVE I GROUP A : SOFTWARE DESIGN AND DIGITAL FORENSICS

CF800301: ADVANCED SOFTWARE ENGINEERING


CF800402: NETWORK FORENSIC ANALYSIS
CF800403: MOBILE FORENSIC ANALYSIS

ELECTIVE II GROUP B : DATA AND CYBER SECURITY

CF810301: DATABASE CONCEPTS AND SECURITY


CF810402: CLOUD ARCHITECTURES AND SECURITY
CF810403: IMAGE PROCESSING AND SECURITY

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


TEACHING HOURS
TOTAL
SEMESTR COURSE COURSE COURSE CREDIT CREDITS
CODE NAME TYPE THEORY PRACTICALS

CF 010101 COMPUTER CORE 4 4


ORGANIZATION AND
EMBEDDED
NETWORKING
CF010102 LINEAR ALGEBRA AND CORE 4 4
NATURAL LANGUAGE 19
I PROCESSING
CF010103 SECURITY ANALYSIS CORE 4 4
USING PYTHON

CF010104 INTRODUCTION TO CORE 4 4


CYBER FORENSICS

CF010105 CYBER FORENSIC CORE 8 3


TOOLS AND
PROGRAMMING IN
PYTHON
CF010201 ADVANCED CORE 4 4
NETWORKING AND IOT

CF010202 PENETRATION TESTING CORE 4 4


AND VULNERABILITY
ASSESSMENT 19
II CF010203 ADVANCED OPERATING CORE 4 4
SYSTEM AND STORAGE
MANAGEMENT
CF010204 INCIDENT RESPONSE CORE 4 4
AND CYBER LAWS

CF010205 ETHICKAL HACKING CORE 8 3


AND CASE STUDIES IN
JAVA-LAB 1
CF010301 CRYPTOGRAPHY AND CORE 4 4
ITS APPLICATIONS

CF010302 MOBILE AND WEB CORE 4 4


SECURITY
20
CF010303 MALWARE ANALYSIS CORE 4 4

III CF8*0301 ELECTIVE ELECTIV 4 4


E
CF010305 ETHICKAL HACKING CORE 9 4
LAB AND MINI
PROJECT-LAB 2
CF010401 CYBER SECURITY RISK CORE 5 4
ASSESSMENT

CF8*0402 ELECTIVE ELECTIV 5 4


E 22
IV CF8*0403 ELECTIVE ELECTIV 5 4
E
PROJECT 12 8

VIVA- 2
VOCE

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


NAME OF GROUP-A GROUP-B
THE (SOFTWARE DESIGN AND (DATA AND CYBER SECURITY)
PROGRAMME DIGITAL FORENSICS)
COURSE NAME OF THE COURSE NAME OF THE
CODES COURSES CODES COURSES
01 M.Sc Cyber CF800301 ADVANCED CF810301 DATABASE
Foresics SOFTWARE CONCEPTS AND
ENGINEERING SECURITY
CF800402 NETWORK CF810402 CLOUD
FORENSIC ARCHITECTURES
ANALYSIS AND SECURITY
CF800403 MOBILE CF810403 IMAGE
FORENSIC PROCESSING
ANALYSIS AND SECURITY

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


FIRST SEMESTER COURESES

CF 010101 COMPUTER ORGANIZATION AND EMBEDDED


NETWORKING
CF010102 LINEAR ALGEBRA AND NATURAL LANGUAGE
PROCESSING
CF010103 SECURITY ANALYSIS USING PYTHON
CF010104 INTRODUCTION TO CYBER FORENSICS

CF010105 CYBER FORENSIC TOOLS AND PROGRAMMING IN


PYTHON

SEMESTER I

CF 010101 COMPUTER ORGANIZATION AND EMBEDDED NETWORKING

TOTAL HOURS : 72

TOTAL CREDITS : 4

WEIGHTAGE :

OBJECTIVE OF COURSE: To ensure the knowledge of organization and architecture of digital


computers and embedded systems.

UNIT I
Basic Computer Organization and Design: Instruction Codes, Computer Registers, Computer Instructions,
Timing And Control.
Data Representation: Signed Magnitude, 1’s Complement and 2’s Complement.

UNIT II

Memory Organization: Memory Hierarchy, Main Memory, RAM, ROM, Cache Memory: Associative
Mapping, Direct Mapping, Set Associative Mapping.

UNIT III

Intel 80286 Processor: Internal Block Diagram, Signal Descriptions, Real Address Mode Operation,
Protected Mode Operation.
Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39
Intel 80386: Architecture, pins and signals.
Pentium Processor : Architecture- System Architecture, Branch Prediction.

UNIT IV
8051 Micro Controller: Architecture, Pins and Signals, Addressing Modes, Instruction Sets.

UNIT V

Introduction to Embedded Systems: Embedded systems, Processor embedded into a system, Embedded
hardware units and devices in system.
Embedded Networking- Introduction, I/O devices ports and buses- serial bus communication protocols, RS
232 standard, RS 485, RS422, CAN bus. Serial Peripheral Interface (SPI), Inter integrated circuits. Need for
device drivers.

References
1. Computer System Architecture, M Morris Mano, 3rd edition, Prentice Hall of India(PHI).
2. Advanced microprocessors and peripherals, A K Ray and K M Bhurchandi, 2nd edition , The McGraw Hill
Pvt Ltd.
3. Embedded System , Architecture, Programming and Design, Raj Kamal,2 nd edition ,The McGraw Hill
Companies.

CF010102 LINEAR ALGEBRA AND NATURAL LANGUAGE PROCESSING

TOTAL HOURS : 72

TOTAL CREDITS : 4

WEIGHTAGE :

OBJECTIVE OF COURSE: To understand the mathematical concepts of data processing in computers.

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


UNIT I
Linear Algebra: Matrices and operations, Linear Systems, Vectors: Addition and Scalar Multiplication,
Linear Systems of Equations.
Gauss Elimination: Linear Independence. Rank of a Matrix.
Vector Space: Solutions of Linear Systems: Existence, Uniqueness.

UNIT II
Linear Algebra and Vector differential calculus: Determinants, vector space 
Determinants. Cramer’s Rule- Inverse of a Matrix. Gauss–Jordan Elimination- Vector Spaces, Inner Product
Spaces, Linear Transformations- Vectors in 2 space and 3 space-Inner product-Vector product

UNIT III
Linear Algebra: Matrix Eigen value Problems
The Matrix Eigen value Problem. Determining Eigen values and Eigenvectors- Some Applications of Eigen
value Problems- Symmetric, Skew-Symmetric, and Orthogonal Matrices –Eigen bases. Diagonalization.
Quadratic Forms

Set theory: Set notation and description,basic set operations , Venn diagrams ,laws of set theory ,partition
-min sets- Principle of inclusion and exclusion.

UNIT IV

Logic: Propositions,logical operators,truth tables,normal forms - laws of logic - proofs in propositional


calculus – Predicates – variables – Quantifiers – Standard Forms – Inference in Predicate calculus –
Mathematical induction.

Functions and relations: Injective, Surjective, Bijective functions - composition, identity, inverse; Relations
- properties of relations - closure operations on relations

UNIT V

Formal languages: Four classes of grammars (Phrase Structure, Context sensitive, Context Free, Regular) -
definitions - Context free Grammar : Right most , Left most derivations – Syntax trees – Unambiguity,
Ambiguity – Construction of grammars for languages – Derivation of languages from grammars – Regular
expressions.

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


Finite automata: Definition of Deterministic Finite state Automaton (DFA), Non deterministic finite state
automaton (NFA) - equivalence of DFA and NFA - Equivalence of regular grammars and finite automata.

Push down automata (PDA): Informal description - definition - Deterministic PDA - Equivalence of
acceptance by final state and empty stack - Equivalence of PDA's and Context Free languages.

References:
1. Erwin Kreyzig: Advanced Engineering Mathematics
2. Kenneth H Rosen : Discrete mathematics and its applications
3. John E Hopcroft, Rajeev Motwani, and Jeffrey D.Ullman, “Introduction to Automata Theory,
Languages and Computation”, Addison-Wesley/Pearson, 2006.
4. 4. John Martin, “Introduction to Languages and the Theory of Computation”, Tata McGraw Hill, 20

CF010103 SECURITY ANALYSIS USING PYTHON

TOTAL HOURS : 72

TOTAL CREDITS : 4

WEIGHTAGE :

OBJECTIVE OF COURSE: To identify the computer and network risks thorough python.

UNIT I
Introduction-Running Python, Variables and Arithmetic Expressions, Conditionals, File Input and Output
,Strings, Lists, Tuples, Sets, Dictionaries, Iteration and Looping, Functions, Generators, Coroutines , Objects
and Classes, Exceptions , Modules ,Getting Help .

Lexical Conventions and Syntax-Line Structure and Indentation, Identifiers and Reserved Words, Numeric
Literals , String Literals ,Containers ,Operators, Delimiters, and Special Symbols, Documentation Strings
,Decorators ,Source Code Encoding.

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


Types and Objects-Terminology ,Object Identity and Type , Reference Counting and Garbage Collection,
References and Copiesm, First-Class Objects, Built-in Types for Representing Data, Built-in Types for
Representing Program Structure, Built-in Types for Interpreter Internals, Object Behaviour and Special
Methods.

UNIT II
Operators and Expressions-Operations on Numbers, Operations on Sequences, String Formatting, Advanced
String Formatting, Operations on Dictionaries, Operations on Sets, Augmented Assignment The Attribute (.)
Operator, The Function Call () Operator, Conversion Functions, Boolean Expressions and Truth Values ,
Object Equality and Identity , Order of Evaluation , Conditional Expressions

Program Structure and Control Flow-Program Structure and Execution, Conditional Execution, Loops and
Iteration, Exceptions, Built-in Exceptions, Defining New Exceptions .
Functions and Functional Programming-Functions, Parameter Passing and Return Values, Scoping Rules.

UNIT III
Classes and Object: Oriented Programming,The class Statement, Class Instances, Scoping Rules.
Inheritance. Modules, Packages, and Distribution- Modules and the import Statement. Built-in Functions
and Types.

UNIT IV
Network Programming and Sockets: Network Programming Basics, asyn chat, asyncore, select, socket, ssl,
SocketServer. Internet Application Programming: ftp lib, http Package, smtplib, urllib Package. Web
Programming-cgi, cgitb, wsgiref, web browser. Cryptographic Services.

UNIT V

Introducing the scope of pentesting, Approaches to pentesting , Scanning Pentesting-Ping sweep, The TCP
scan concept and its implementation using a Python script, How to create an efficient IP scanner, The
concept of a port scanner, How to create an efficient port scanner. Introducing a network sniffer,
Implementing a network sniffer using Python. Wireless SSID finding and wireless traffic analysis by
Python, Wireless attacks, The concept of foot printing of a web server , Introducing information gathering.

References:

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


1. Python Essential Reference David M. Beazley Fourth Edition 2009
2. Python Essential Reference, David Beazley ,Third Edition 2006
3. Python Penetration Testing Essentials, Mohit,2015

CF010104 - INTRODUCTION TO CYBER FORENSICS

TOTAL HOURS : 72

TOTAL CREDITS : 4

WEIGHTAGE :

OBJECTIVE OF COURSE: Ensure the deep knowledge of computer crimes and forensics.

UNIT I

Computer forensics fundamentals: What is computer forensics, use of computer forensics in law
enforcement, Computer forensics assistance to human resource/employment proceedings, Computer
forensics services, benefits of professional forensics methodology, steps taken by Computer forensics
specialists, who can use Computer forensics evidence. Types of Computer forensics technology: types of
military Computer forensics technology, types of law enforcement, Computer forensic technology, types of
business Computer forensic technology. Types of vendor and computer forensics services: Occurrence of
cyber crime, cyber detectives, computer forensics investigative services, forensics process improvement.

UNIT II

Data recovery: Data recovery defined, data back-up and recovery, the role of back-up in data recovery, the
data recovery solution. Evidence collection and data seizure- Why collective evidence, Collection options,
obstacles, types of evidence, the rules if evidence, volatile evidence, general procedure, collection and
archiving, methods of collection, artifacts, collection steps, controlling contamination: the chain of custody.
Duplication and preservation of digital evidence - Preserving the digital crime scene, computer evidence
processing steps, legal aspects of collecting and preserving Computer forensics evidence.

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


UNIT III

Conducting Digital Investigations: Digital Investigation Process Models, Scaffolding for Digital
Investigations, Applying the Scientific Method in Digital Investigations, Investigative Scenario: Security
Breach. Handling a Digital Crime Scene-Published Guidelines for Handling Digital Crime Scenes,
Fundamental Principles, Authorization, Preparing to Handle Digital Crime Scenes, Surveying the Digital
Crime Scene , Preserving the Digital Crime Scene .Investigative Reconstruction with Digital Evidence :
Equivocal Forensic Analysis , Victimology, Crime Scene Characteristics ,Threshold Assessments.

UNIT IV

Violent Crime and Digital Evidence: The Role of Computers in Violent Crime, Processing the Digital Crime
Scene, Investigative Reconstruction, Digital Evidence as Alibi - Investigating an Alibi, Time as Alibi,
Location as Alibi. Sex Offenders on the Internet - Old Behaviors, New Medium, Legal Considerations,
Identifying and Processing Digital Evidence, Investigating Online Sexual Offenders, Investigative
Reconstruction, Case Example: Scott Tyree, Case Example: Peter Chapman. Computer Intrusions - How
Computer Intruders Operate, Investigating Computer Intrusions, Forensic Preservation of Volatile Data,
Post-Mortem Investigation of a Compromised System, Investigation of Malicious Computer Programs,
Investigative Reconstruction. Cyberstalking: How Cyberstalkers Operate, Investigating Cyberstalking,
Cyberstalking, Case Example.

UNIT V

Computer Basics for Digital Investigators: A Brief History of Computers, Basic Operation of Computers,
Representation of Data, Storage Media and Data Hiding, File Systems and Location of Data, Dealing with
Password Protection and Encryption Applying, Forensic Science to Computers: Preparation, Survey,
Documentation , Preservation, Examination and Analysis, Reconstruction, Reporting, Digital Evidence on
Windows Systems: File Systems, Data Recovery, Log Files, Registry, Internet Traces, Program Analysis.
Digital Evidence on UNIX Systems - UNIX Evidence Acquisition Boot Disk, File Systems, Overview of
Digital Evidence Processing Tools, Data Recovery, Log Files, File System Traces, Internet Traces, Digital
Evidence on the Internet- Role of the Internet in Criminal Investigations, Internet Services: Legitimate
versus Criminal Uses, Using the Internet as an Investigative Tool, Online Anonymity and Self-Protection, E-
mail Forgery and Tracking, Usenet Forgery and Tracking, Searching and Tracking on IRC.

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


References:

1. John R. Vacca, Computer Forensics: Computer Crime Scene Investigation, 1 ST Edition, Charles River
Media, 2005 (2014 Reprint )

2. Eoghan Casey, Digital Evidence and Computer Crime Forensic Science, Computers and the Internet
Third Edition

CF010105 CYBER FORENSIC TOOLS AND PROGRAMMING IN PYTHON

TOTAL HOURS: 72

TOTAL CREDITS: 3

WEIGHTAGE :

OBJECTIVE OF COURSE: Make expertise in forensic tools and analysis language.

CYBER FORENSIC TOOLS

Disk Imaging Tools


Registry Analysis
Network Analyser

PROGRAMMING IN PYTHON

Basic Programmes
Network Analysis

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


SEMESTER II

SECOND SEMESTER COURSES

CF010201 ADVANCED NETWORKING AND IOT


CF010202 PENETRATION TESTING AND VULNERABILITY
ASSESSMENT
CF010203 ADVANCED OPERATING SYSTEM AND STORAGE
MANAGEMENT
CF010204 INCIDENT RESPONSE AND CYBER LAWS
CF010205 ETHICKAL HACKING AND CASE STUDIES IN JAVA-
LAB 1

CF010201 – ADVANCED NETWORKING AND IOT

TOTAL HOURS : 72

TOTAL CREDITS : 4

WEIGHTAGE :

OBJECTIVE OF COURSE: Aim to Mould experts in advanced network tools and IOT

UNIT I

Internetworking: Concepts, Architecture, and Protocols, Internet Addressing, Datagram Forwarding, Support
Protocols And Technologies.

UNIT II

The Future IP (IPv6), TCP: Reliable Transport Service, Internet Routing And Routing Protocols.

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


UNIT III

Network Performance (QoS and DiffServ), Multimedia And IP Telephony (VoIP), Network Security,
Trends In Networking Technologies And Uses.

UNIT IV

Internet of Things: An Overview, Programming Frameworks for Internet of Things, Security and Privacy in
the Internet of Things, Internet of Things: Robustness and Reliability.

UNIT V

Governing Internet of Things: Issues, Approaches, and New Paradigms, Obfuscation and Diversification for
Securing the Internet of Things (IoT), Applied Internet of Things, Internet of Vehicles and Applications.

References:

1. Computer Networks and Internets, Fifth Edition, Douglas E. Comer


2. Internet of Things Principles and Paradigms, Rajkumar Buyya, Amir Vahid Dastjerdi, 2016.

CF010202 – PENETRATION TESTIG AND VULNERABILITY ASSESMENT

TOTAL HOURS : 72

TOTAL CREDITS : 4

WEIGHTAGE :

OBJECTIVE OF COURSE: To expertise in tools to finding forensic related data

UNIT I

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


Penetration Testing Primer, Using Kali Linux, Programming, Information Gathering.

UNIT II

Finding Vulnerabilities: From Nmap Version Scan to Potential Vulnerability , Nessus , The Nmap Scripting
Engine, Running a Single NSE Script, Metasploit Scanner Modules, Metasploit Exploit Check Functions,
Web Application Scanning, Manual Analysis.

UNIT III

Exploitation: Revisiting MS08-067, Exploiting WebDAV Default Credentials, Exploiting Open


phpMyAdmin, Downloading Sensitive Files, Exploiting a Buffer Overflow in Third-Party Software,
Exploiting Third-Party Web Applications, Exploiting a Compromised Service, Exploiting Open NFS Shares.

Password Attacks- Password Management, Online Password Attacks, Offline Password Attacks, Dumping
Plaintext Passwords from Memory with Windows Credential Editor.

UNIT IV

Social Engineering: The Social-Engineer Toolkit, Spear-Phishing Attacks, Web Attacks, Mass Email
Attacks, Multipronged Attacks.

Web Application Testing: Using Burp Proxy, SQL Injection, XPath Injection, Local File Inclusion, Remote
File Inclusion, Command Execution, Cross-Site Scripting, Cross-Site Request Forgery, Web Application
Scanning with w3af.

UNIT V

Wireless Attacks: Setting Up, Monitor Mode ,Capturing Packets ,Open Wireless ,Wired Equivalent Privacy,
Wi-Fi Protected Access ,WPA2, Wi-Fi Protected Setup.

Using the Smartphone Pentest Framework: Mobile Attack Vectors, The Smartphone Pentest Framework,
Remote Attacks, Client-Side Attacks, Malicious Apps, Mobile Post Exploitation.

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


References:

1.Penetration testing A Hands-On Introduction to Hacking , Georgia Weidman ,2014

CF010203 – ADVANCED OPERATING SYSTEM AND STORAGE MANAGEMENT

TOTAL HOURS : 72

TOTAL CREDITS : 4

WEIGHTAGE :

OBJECTIVE OF COURSE: To learn mechanisms of operating systems and storage systems.

UNIT I

OS overview, Scheduling: Uniprocessor, multiprocessor, real time systems, Embedded operating system

UNIT II

Storage System Environment, Storage Networking Technologies and Virtualization, Storage Network,
Network attached Storage, IP SAN, Content Addressed Storage, Storage Virtualization

UNIT III

Local And Remote Replication, Managing and monitoring the storage Infrastructure, Storage Management
Activities

UNIT IV

Hard disk data Acqusition: Reading source data, Writing the output data
PC Based partitions: DOS partitions ,Analysis Considerations, Apple Partition, Removable media
Server based partitions: BSD partition, Sun Solaris slices, GPT partition, Multiple disk volume-RAID, Disk
spanning, File system analysis.

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


UNIT V

FAT concepts and analysis ,NTFS concepts, NTFS Analysis ,Ext 2 and Ext 3 concepts and analysis ,UFS 1
and UFS 2 concepts and analysis

References:

1.File system forensic analysis, Brian carrierAddison Wesley 2005

2. Information storage and management, “storing managing and protecting digital information” G
Somasundaram, Alok Shrivastava,wiely publishing 2009, 1 edition,EMC Corporation

CF010204 – INCIDENT RESPONSE AND CYBER LAWS

TOTAL HOURS : 72

TOTAL CREDITS : 4

WEIGHTAGE :

OBJECTIVE OF COURSE: Ensure the knowledge to produce valuable and acceptable evidence to
the court of law.

UNIT I

The incident response process, ,The incident response plan, The incident response playbook Forensic
Fundamentals: Digital forensic fundamentals, The digital forensic process. Acquiring Host-Based Evidence-
Preparation, Evidence volatility, Evidence acquisition, Evidence collection procedures, Non-volatile data.

UNIT II

Network Evidence Collection: Preparation, Network device evidence, Packet capture, Evidence collection,
Network Evidence Analysis-Analyzing packet captures, Analyzing network log files.

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


UNIT III

Analyzing System Memory-Memory evidence overview, Memory analysis. Forensic Reporting-


Documentation overview, Incident tracking, Written reports.

UNIT IV
Concept of cyber crime and IT Act 2000.
Jurisdiction: Civil Law of Jurisdiction in India,Cause of Action,Jurisdiction and IT Act 2000.Indian
Evidence Act Vs IT Act 2000

UNIT V
Digital signature and Electronic signature, Digital Signature under the IT Act, 2000, E-Governance,
Attribution, Acknowledgement and Dispatch of Electronic Records, Certifying Authorities, Duties of
Subscribers, Intermediaries, Electronic Commerce, E-commerce in India, Electronic Contracts. Penalties
and offences under the IT Act, 2000.

References:

1. Digital Forensics and Incident Response – Gerard Johansen, Packt 2017


2. Barkha and U. Rama Mohan, “Cyber Law Crimes”, Asia Law House, 3rd Edition
3. Vivek Sood,“Cyber Laws Simplified”, Mc Graw Hill Education ,Reprint 2014

CF010205 ETHICKAL HACKING LAB 1 AND CASE STUDIES IN JAVA- Lab 1

ETHICKAL HACKING LAB 1

TOTAL HOURS : 72

TOTAL CREDITS : 4

WEIGHTAGE :

OBJECTIVE OF COURSE: To familiarize with various security attacks on white hackers pint of
view
 Introduction to ethickal hacking

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


 Footprinting and reconnaissance
 Scanning networks
 System hacking
 Malware threats
 Sniffing
 Social engineering

CASE STUDIES IN JAVA

 SERVLETS
 SOCKETS
 JDBC
 JAVA BEAN
SEMESTER III

SEMESTER III COURSES

CF010301 CRYPTOGRAPHY AND ITS APPLICATIONS


CF010302 MOBILE AND WEB SECURITY

CF010303 MALWARE ANALYSIS


CF8*0301 ELECTIVE
CF010305 ETHICKAL HACKING LAB AND MINI PROJECT-LAB 2

CF010301 – CRYPTOGRAPHY AND ITS APPLICATIONS

TOTAL HOURS : 72

TOTAL CREDITS : 4

WEIGHTAGE :

OBJECTIVE OF COURSE: To make sure the confidentiality and integrity of data.


Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39
UNIT 1

Foundations: Protocol Building Blocks, Basic Protocols, Intermediate Protocols.

UNIT 2

Key Length, Key Management, Electronic Codebook Mode, Block Replay, Cipher Block Chaining Mode,
Stream Ciphers, Self-Synchronizing Stream Ciphers, Cipher-Feedback Mode, Synchronous Stream Ciphers,
Output Feedback Mode, Counter Mode, Choosing a Cipher Mode, Interleaving, Block Ciphers versus
Stream Ciphers, Choosing an Algorithm, Public Key Cryptography versus Symmetric cryptography

UNIT 3

Encrypting Communications Channels, Encrypting Data for Storage, Hardware Encryption versus Software
Encryption, Compression, Encoding, and Encryption, Detecting Encryption, Hiding and Destroying
Information.

UNIT 4

Information Theory, Complexity Theory, Number Theory, Factoring, Prime Number Generation, Discrete
Logarithms in a Finite Field, Data Encryption Standard (DES) Double Encryption, Triple Encryption
.Stream Ciphers, RC4, SEAL, Feedback with Carry Shift Registers, Stream Ciphers Using FCSRs . N-
Hash ,MD4, MD5, MD2, Secure Hash Algorithm (SHA) .Message Authentication Codes.

UNIT 5

RSA, Pohlig-Hellman, McEliece, Elliptic Curve Cryptosystems, Digital Signature Algorithm (DSA), Gost
Digital Signature Algorithm, Discrete Logarithm Signature Schemes, Ongchnorr-Shamir, Cellular Automata
- Feige-Fiat-Shamir -Guillou-Quisquater, Diffie-Hellman, Station-to-Station Protocol, Shamir’s Three-Pass
Protocol, IBM Secret-Key Management Protocol, MITRENET, Kerberos, IBM Common Cryptographic
Architecture.

References:

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


1. Bruce Schneier, “Applied Cryptography: Protocols, Algorithms, and Source Code in C” John Wiley &
Sons, Inc, 2nd Edition, 1996.

2. Wenbo Mao, “Modern Cryptography Theory and Practice”, Pearson Education, 2004

3. Atul Kahate, “Cryptography and Network Security”, Tata McGrew Hill, 2003.

CF010302 MOBILE AND WEB SECURITY

TOTAL HOURS : 72

TOTAL CREDITS : 4

WEIGHTAGE :

OBJECTIVE OF COURSE: Ensure deep knowledge of wireless and web world security.

UNIT I

Overview of wireless technologies and security: Personal Area Networks, Wireless Local Area Networks,
Metropolitan Area Networks, Wide Area Networks. Wireless threats, vulnerabilities and security: Wireless
LANs, War Driving, War Chalking, War Flying, Common Wi-fi security recommendations, PDA Security,
Cell Phones and Security, Wireless DoS attacks, GPS Jamming, Identity theft.

UNIT II

Mobile system architectures, Overview of mobile cellular systems, GSM Security & Attacks,
Vulnerabilities in Cellular Services, Cellular Jamming Attacks & Mitigation, Mobile application security.
CIA triad in mobile phones-Voice, SMS and Identification data interception in GSM: Introduction, practical
setup and tools

UNIT III

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


Web Application security, Core Defense Mechanisms, Web Application Technologies: The HTTP Protocol,
Web Functionality. Mapping the Application-Enumerating Content and Functionality

UNIT IV
Bypassing Client: Side Controls-Transmitting Data Via the Client-Hidden Form Fields,HTTP Cookies ,URL
Parameters. Attacking Authentication: Design Flaws in Authentication Mechanisms, Implementation Flaws
in Authentication, Securing Authentication.

UNIT V

Attacking Data Stores: Injecting into Interpreted Contexts-Bypassing a Login ,Injecting into SQL
,Exploiting a Basic Vulnerability, Injecting into Different Statement Types ,Finding SQL Injection Bugs
,Fingerprinting the Database ,The UNION Operator, Extracting Useful Data ,Extracting Data with
UNION ,Bypassing Filters ,Second-Order SQL Injection ,Advanced Exploitation.
Attacking Users: Cross-Site Scripting-Varieties of XSS, XSS Attacks in Action, Finding and Exploiting
XSS Vulnerabilities, Preventing XSS Attacks

References:
1. The Web Application Hacker’s Handbook,Second Edition,Finding and Exploiting Security Flaws,Dafydd
Stuttard,Marcus Pinto.

2. Kia Makki, Peter Reiher, “Mobile and Wireless Network Security and Privacy “, Springer,2007.

3. NoureddineBoudriga, ”Security of Mobile Communications,2010

CF010303 – MALWARE ANALYSIS

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


TOTAL HOURS : 72

TOTAL CREDITS : 4

WEIGHTAGE :

OBJECTIVE OF COURSE: Ensure deep knowledge in malware mechanisms.

UNIT I

Introduction, Computer Virus Basics, Taxonomy, Techniques and Tools: Introduction General Aspects of
Computer Infection Programs , Definitions and Basic Concepts Action Chart of Viruses or Worms, Viruses
or Worms Life Cycle, Analogy Between Biological and Computer Viruses, Numerical Data and Indices,
Designing Malware. Non Self-reproducing Malware (Epeian), Logic Bombs ,Trojan Horse and Lure
Programs, How Do Viruses Operate, Overwriting Adding Viral Code: Appenders and Prependers Code
Interlacing Infection or Hole Cavity Infection, Companion Viruses, Source Code Viruses

UNIT II

Computer Viruses in Interpreted Programming Language: Design of a Shell Bash Virus under Linux,
Fighting Over infection , Anti-antiviral Fighting: Polymorphism, Increasing the Vbash Infective Power,
Including a Payload. Some Real-world Examples The Unix owr Virus, The Unix head Virus, The Unix
Coco Virus, The Unix bash virus. Companion: Viruses Introduction, The vcomp ex companion virus,
Analysis of the vcomp ex Virus , Weaknesses and Flaws of the vcomp ex virus .

UNIT III

Worms: Introduction, The Internet Worm, The Action of the Internet Worm, How the Internet Worm
Operated, Dealing With the Crisis, IIS Worm Code Analysis ,Buffer Overflows ,Buffer IIS Vulnerability
and Buffer Overflow, Detailed Analysis of the Source Code, Xanax Worm Code Source Analysis, Main
Spreading Mechanisms: Infecting E-mails, Executable Files Infection, Spreading via the IRC Channels,
Final Action of the Worm. The Various Procedures of the Worm. Analysis of the UNIX. LoveLetter Worm -
Variables and Procedures, How the Worm Operates.

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


UNIT IV

Anti-Anti-Virus Techniques: How a Virus Detector Works, Stealth for Boot Sector Viruses, Polymorphic
Viruses, Retaliating Viruses, Advanced Anti-Virus Techniques, Genetic Viruses.

UNIT V

BIOS Viruses: Introduction, bios Structure and Working, Disassembly and Analysis of the BIOS Code,
Detailed Analysis of the BIOS Code , vbios Virus Description . Viral Boot Sector Concept, Installation of
vbios .Computer Viruses and Applications Introduction: The State of the Art, The Xerox Worm, The KOH
Virus, Military Applications, Fighting against Crime, Environmental Cryptographic Key Generation .

References:

1. ErciFiliol, “Computer Viruses: from theory to applications”, Springer, 1st edition.

2. Mark.A .Ludwig, “The Giant black book of computer viruses, Create Space Independent Publishing
Platform, 2 nd edition.

CF010305 – ETHICKAL HACKING – LAB II AND MINI PROJECT

TOTAL HOURS : 72

TOTAL CREDITS : 4

WEIGHTAGE :

OBJECTIVE OF COURSE: To familiarize with various security attacks on white hackers point of
view.

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


ETHICKAL HACKING – LAB II

 Denial of service
 Session hijacking
 Hacking web
 Sql injection
 Hacking wireless networks
 Hacking mobile platforms

MINI PROJECT

Related to Cyber Security using Python

SEMESTER IV

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


CF010401 CYBER SECURITY RISK ASSESSMENT

CF8*0402 ELECTIVE
CF8*0403 ELECTIVE
PROJECT
VIVA-VOCE

CF010401 – CYBER SECURITY RISK ASSESSMENT

TOTAL HOURS : 72

TOTAL CREDITS : 4

WEIGHTAGE :

OBJECTIVE OF COURSE: To mould best security consultants.

UNIT I

Security Risk Assessment: The Role of the Security Risk Assessment , Definition of a Security Risk
Assessment ,The Need for a Security Risk Assessment ,Checks and Balances ,Periodic Review ,Risk-Based
Spending ,Requirement , Security Risk Assessment Secondary Benefits, Related Activities : Gap
Assessment , Compliance Audit , Security Audit ,Vulnerability Scanning , Penetration Testing Ad Hoc
Testing , Social Engineering , Wardialing .

UNIT II

Information Security Risk Assessment Basics: Project Definition ,Project Preparation ,Data Gathering Risk
Analysis : Assets, Threat Agents and Threats-Threat Agents, Threats, Vulnerabilities, Security Risk, Risk
Mitigation- Safeguards, Residual Security Risk, Risk Reporting and Resolution, Risk Resolution
Security Risk Assessment Preparation: Introduce the Team, Review Business Mission, Identify Critical
Systems, Identify Assets, Asset Valuation, Identifying Threats, Determine Expected Controls

UNIT III

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


Data Gathering: Sampling, The RIIOT Method of Data Gathering, Administrative Data Gathering- Threats
and Safeguards , The RIIOT Method: Administrative Data Gathering, Technical Data Gathering- Technical
Threats and Safeguards , The RIIOT Method: Technical Data Gathering, Physical Data Gathering- Physical
Threats and Safeguards , The RIIOT Method of Physical Data Gathering.

UNIT IV

Security Risk Analysis: Determining Risk, Creating Risk Statements, Team Review of Security Risk
Statements, Security Risk Mitigation: Selecting Safeguards, Safeguard Solution Sets Establishing Risk
Parameters, Security Risk Assessment Reporting: Cautions in Reporting, Pointers in Reporting, Report
Structure, Document Review Methodology, Assessment Brief, Action Plan.

UNIT V

Security Risk Assessment Project Management: Project Planning, Project Tracking, Taking Corrective
Measures, Project Status Reporting, Project Conclusion and Wrap-Up, Security Risk Assessment
Approaches: Quantitative vs. Qualitative Analysis, Tools

Reference

1. THE SECURITY RISK ASSESSMENT HANDBOOK, DOUGLAS J. LANDOLL,1 st edition Reprinted


2018

PROJECT

TOTAL HOURS : 72

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


TOTAL CREDITS : 8

WEIGHTAGE :

OBJECTIVE OF COURSE:

The projects should be in the field of network security, operating system security or software security.

VIVA-VOCE

In Viva – Voce, the examiner can ask questions from all core courses, (including languages) and selected
elective courses in the programme.

ELECTIVE I GROUP A : SOFTWARE DESIGN AND DIGITAL FORENSICS

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


CF800301 – ADVANCED SOFTWARE ENGINEERING

TOTAL HOURS : 72

TOTAL CREDITS : 4

WEIGHTAGE :

OBJECTIVE OF COURSE: To familiarize with new world software design.

UNIT I

Software processes: Software process models, Process activities, Coping with change, The rational unified
process. Requirements engineering-Functional and non-functional requirements, The software requirements
document ,Requirements specification ,Requirements engineering processes ,Requirements elicitation and
analysis Requirements validation, Requirements management.

UNIT II

System modelling: Context models, Interaction models, Structural models, Behavioral models ,Model-
driven engineering. Architectural design: Architectural design decisions ,Architectural views , Architectural
patterns Application architectures.

UNIT III

Design and implementation: Object oriented design using the UML, Design patterns, Implementation issues
Open source development . Software testing: Development testing, Test: driven development
,Releasetesting, User testing. Software evolution: Evolution processes, Program evolution dynamics ,
Software maintenance, Legacy system management.

UNIT IV

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


Software reuse: The reuse landscape, Application frameworks, Software product lines ,COTS product reuse.
Component-based software engineering: Components and component models , CBSE processes, Component
composition. Distributed software engineering: Distributed systems issues ,Client–server computing
,Architectural patterns for distributed systems ,Software as a service.

UNIT V

Service-oriented architecture: Services as reusable components, Service engineering. Risk management.


Plan driven development, Project scheduling ,Agile planning , Estimation techniques.

References:

1. Software Engineering ,9th Edition ,Ian Sommerville.

CF800402- NETWORK FORENSIC ANALYSIS

TOTAL HOURS : 72

TOTAL CREDITS : 4

WEIGHTAGE :

OBJECTIVE OF COURSE: To make experts in network forensics.

UNIT 1

Network Intrusion Detection and Analysis: Typical NIDS/NIPS Functionality, Modes of Detection, Types of
NIDS/NIPSs, NIDS/NIPS Evidence Acquisition, Comprehensive Packet Logging, Snort. Event Log
Aggregation, Correlation, and Analysis: Sources of Logs, Network Log Architecture, Collecting and
Analyzing Evidence.

UNIT 2

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


Switches, Routers, and Firewalls: Storage Media, Switches, Routers, Firewalls, Interfaces, Logging, Web
Proxies: Web Proxy Functionality, Evidence, Squid, Web Proxy Analysis, Encrypted Web Traffic.

UNIT 3

Wireless: Network Forensics Unplugged: The IEEE Layer 2 Protocol Series, Wireless Access Points,
Wireless Traffic Capture and Analysis, Common Attacks, Locating Wireless Devices.
UNIT 4

Packet Analysis: Protocol Analysis, Packet Analysis, Flow Analysis, Higher-Layer Traffic Analysis.
Statistical Flow Analysis: Sensors, Flow Record Export Protocols, Collection and Aggregation, Analysis.
UNIT 5

Network Tunneling: Tunneling for Functionality, Tunneling for Confidentiality, Covert Tunneling. Malware
Forensics: Trends in Malware Evolution, Network Behavior of Malware.

Reference :
1. Network Forensics:Tracking Hackers through Cyberspace,Sherri Davidoff,Jonathan Ham, 2012 Pearson
Education

CF800403- MOBILE FORENSIC ANALYSIS

TOTAL HOURS : 72

TOTAL CREDITS : 4

WEIGHTAGE :

OBJECTIVE OF COURSE: To make experts in mobile forensic world.

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


UNIT 1

Introduction to Mobile Forensics: Mobile forensics Mobile phone evidence extraction process,The
preparation phase,The isolation phase,The processing phase,The verification phase.
Practical mobile forensic approaches: Mobile operating systems overview,Mobile forensic tool leveling
system,Data acquisition methods.Potential evidence stored on mobile phones, Rules of evidence.

UNIT 2

Windows Phone Forensics: Windows Phone OS, Windows phone file system, Data acquisition, Extracting
the data
CASE STUDY: BlackBerry Forensics

UNIT 3

Understanding Android: The Android model, Android security, Android file hierarchy, Android file system.
A forensic environment setup-Android Software Development Kit, Android Virtual Device, Accessing the
connected device, Android Debug Bridge. Accessing the device using adb-Detecting connected devices,
Killing the local adb server, Accessing the adb shell. Screen lock bypassing techniques, Gaining root access.

UNIT 4

Android Data Recovery Techniques: Data recovery. Android App Analysis and Overview of Forensic Tools:
Android app analysis, Reverse engineering Android apps, Forensic tools overview, Cellebrite – UFED,
MOBILedit. CASE STUDY: Android Data Extraction Techniques

UNIT 5

Understanding the Internals of iOS Devices: iPad hardware, File system, The HFS Plus file system. iPhone
operating system. iOS security. Data Acquisition from iOS Devices: Operating modes of iOS devices,
Physical acquisition, Acquisition via a custom ramdisk. Building a custom ramdisk, Booting the custom
ramdisk, Bypassing the passcode,Imaging the data partition,Decrypting the data partition,Recovering the
deleted data.
CASE STUDY: iOS Forensic Tools.

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


Reference :1. Practical Mobile Forensics, Satish Bommisetty,Rohit Tamma,Heather Mahalik, 2014 Packt
Publishing

ELECTIVE II GROUP B : DATA AND CYBER SECURITY

CF810301 – DATABASE CONCEPTS AND SECURITY

TOTAL HOURS : 72

TOTAL CREDITS : 4

WEIGHTAGE :

OBJECTIVE OF COURSE: To familiarize with database and its security.

UNIT I

Databases and Database Users: Introduction, Characteristics of the Database Approach, Actors on the Scene,
Workers behind the Scene, Advantages of Using the DBMS Approach, A Brief History of Database
Applications. Database System Concepts and Architecture: Data Models, Schemas, and Instances, Three-
Schema Architecture and Data Independence, Database Languages and Interfaces, The Database System
Environment, Centralized and Client/Server Architectures for DBMSs, Classification of Database
Management Systems. The Relational Data Model and Relational Database Constraints-Relational Model
Concepts, Relational Model Constraints and Relational Database Schemas, Update Operations,
Transactions, and Dealing with Constraint Violations.

UNIT II

Data Modeling Using the Entity-Relationship (ER) Model-Using High-Level Conceptual Data Models for
Database Design, A Sample Database Application, Entity Types, Entity Sets, Attributes, and
Keys,Relationship Types, Relationship Sets, Roles, and Structural Constraints, Weak Entity Types ,ER
Diagrams.

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


The Enhanced Entity-Relationship (EER) Model: Subclasses, Superclasses, and Inheritance, Specialization
and Generalization, Constraints and Characteristics of Specialization and Generalization Hierarchies,
Modeling of UNION Types Using Categories. Basics of Functional Dependencies and Normalization for
Relational Databases - Functional Dependencies, Normal Forms Based on Primary Keys, General
Definitions of Second and Third Normal Forms, Boyce-Codd Normal Form, Multivalued Dependency and
Fourth Normal Form, Join Dependencies and Fifth Normal Form.

UNIT III

Introduction to Transaction Processing Concepts and Theory -Introduction to Transaction Processing,


Transaction and System Concepts, Desirable Properties of Transactions, Characterizing Schedules Based on
Recoverability. Concurrency Control Techniques: Two-Phase Locking Techniques for Concurrency Control,
Concurrency Control Based on Timestamp Ordering.

UNIT IV

Database Security -Introduction to Database Security Issues, Discretionary Access Control Based on
Granting and Revoking Privileges, Mandatory Access Control and Role-Based Access Control for
Multilevel Security, SQL Injection, Introduction to Statistical Database Security, Introduction to Flow
Control, Encryption and Public Key Infrastructures, Privacy Issues and Preservation, Challenges of
Database Security, Oracle Label-Based Security.

UNIT V

Introduction: Data Mining, KDD Process , Mining Databases, Data Mining Functionalities :
Characterization and Discrimination, Mining frequent patterns, Association and correlation, Classification
and Prediction, Cluster Analysis.

Data Warehouse and OLAP technology: Data Warehouse, Multidimensional data Model, Data warehouse
architecture, Data Warehouse implementation, OLAP, Data Warehouse and data mining.

References:

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


1. Fundamentals of database systems – 6th edition, ramez elmasri,shamkant b navathe,Addison Wesley-
Pearson
2. Jiawei Han and Micheline Kamber,Data Mining - Concepts and Techniques (Second Edition), Elsevier,
2006

CF810402-CLOUD ARCHITECTURES AND SECURITY

TOTAL HOURS : 72

TOTAL CREDITS : 4

WEIGHTAGE :

OBJECTIVE OF COURSE: Ensure deep knowledge in cloud systems.

UNIT 1

Cloud Computing definition, private, public and hybrid cloud. Cloud types; IaaS, PaaS, SaaS. Benefits and
challenges of cloud computing, public vs private clouds, role of virtualization in enabling the cloud;
Business Agility: Benefits and challenges to Cloud architecture.

UNIT II

Technologies and the processes required when deploying web services: Deploying a web service from inside
and outside a cloud architecture, advantages and disadvantages- Development environments for service
development; Amazon, Azure, Google App.

UNIT III

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


Security Concepts: Confidentiality, privacy, integrity, authentication, nonrepudiation, availability, access
control, defence in depth, least privilege- how these concepts apply in the cloud and their importance in
PaaS, IaaS and SaaS. e.g. User authentication in the cloud.

UNIT IV
Multi-tenancy Issues: Isolation of users/VMs from each other- How the cloud provider can provide this-
Virtualization System Security Issues: e.g. ESX and ESXi Security, ESX file system security- storage
considerations, backup and recovery- Virtualization System Vulnerabilities.

UNIT V

Security management in the cloud: security management standards- SaaS, PaaS, IaaS availability
management- access control- Data security and storage in cloud.

References:

1. Gautam Shroff, “Enterprise Cloud Computing Technology Architecture Applications”, Cambridge


University Press; 1 edition, 2010.

2. Toby Velte, Anthony Velte, Robert Elsenpeter, “Cloud Computing, A Practical Approach”, Tata
McGraw-Hill Osborne Media; 1 edition, 2009.

3. Tim Mather, Subra Kumaraswamy, Shahed Latif, “Cloud Security and Privacy: An Enterprise
Perspective on Risks and Compliance”, O'Reilly Media; 1 edition, 2009.

4. Ronald L. Krutz, Russell Dean Vines, “Cloud Security”, Wiley, 2010.

CF810403 IMAGE PROCESSING AND SECURITY

TOTAL HOURS : 72

TOTAL CREDITS : 4

WEIGHTAGE :

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


OBJECTIVE OF COURSE: To familiarize with image processing and its security mechanisms.

UNIT I

Introduction : steps in image processing, Image acquisition, representation, sampling and quantization,
relationship between pixels. color models: basics of color image processing.

UNIT II

Image enhancement in spatial domain: some basic gray level transformations, histogram processing,
enhancement using arithmetic / logic operations, basics of spatial filtering and smoothing. Image restoration:
Model of degradation and restoration process, noise models, restoration in the presence of noise, periodic
noise reduction.

UNIT III

Image segmentation: Thresholding and region based segmentation. Image compression: Fundamentals –
models – information theory – error free compression –Lossy compression: predictive and transform
coding.JPEG and MPEG standard.

UNIT IV

Information Hiding, Steganography, and Watermarking, Importance of Digital Watermarking, Importance


of Steganography, Applications of Watermarking, Applications of Steganography, Properties of
Watermarking Systems, Properties of Steganographic and Steganalysis Systems

UNIT V

Models of water marking: Communications, Communication based models,geometric models, detection by


correlation.Basic message coding: mapping messages into meaasge vectors. Whater marking with side
information :informed embedding, watermarking using side information.

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39


References:

1. R.C. Gonzalez, R.E.Woods, Digital Image processing, 2nd Edition, Pearson Education,2002.
2. Ingemar J. Cox, MattheW, L. Miller Jeffrey A. Bloom ,Jessica Fridrich Ton Kalker
Digital Watermarking and Steganography, Second Edition 2008.

Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39

You might also like