MSC CF SYLLABUS2019 Formatted
MSC CF SYLLABUS2019 Formatted
KOTTAYAM
M.Sc.
CYBER FORENSICS
To mould the experts, investigators and digital detectives in the field of computer forensics. Those
have to examine digital devices in constructive way with the goal of identifying, preserving,
recovering, analyzing, and presenting evidence in a court of law.
2. Eligibility
Note: Candidates having degree in Cyber Forensics shall be given a weightage of 20% in their
qualifying degree examination marks considered for ranking for admission to MSc Cyber Forensics.
English
As per the regulations of mg university pg css 2019
6.
SEMESTER 1
SEMESTER 2
SEMESTER 3
SEMESTER 4
VIVA- 2
VOCE
SEMESTER I
TOTAL HOURS : 72
TOTAL CREDITS : 4
WEIGHTAGE :
UNIT I
Basic Computer Organization and Design: Instruction Codes, Computer Registers, Computer Instructions,
Timing And Control.
Data Representation: Signed Magnitude, 1’s Complement and 2’s Complement.
UNIT II
Memory Organization: Memory Hierarchy, Main Memory, RAM, ROM, Cache Memory: Associative
Mapping, Direct Mapping, Set Associative Mapping.
UNIT III
Intel 80286 Processor: Internal Block Diagram, Signal Descriptions, Real Address Mode Operation,
Protected Mode Operation.
Program Structure & Syllabus PGCSS 2019 – M.Sc.CF Page 39
Intel 80386: Architecture, pins and signals.
Pentium Processor : Architecture- System Architecture, Branch Prediction.
UNIT IV
8051 Micro Controller: Architecture, Pins and Signals, Addressing Modes, Instruction Sets.
UNIT V
Introduction to Embedded Systems: Embedded systems, Processor embedded into a system, Embedded
hardware units and devices in system.
Embedded Networking- Introduction, I/O devices ports and buses- serial bus communication protocols, RS
232 standard, RS 485, RS422, CAN bus. Serial Peripheral Interface (SPI), Inter integrated circuits. Need for
device drivers.
References
1. Computer System Architecture, M Morris Mano, 3rd edition, Prentice Hall of India(PHI).
2. Advanced microprocessors and peripherals, A K Ray and K M Bhurchandi, 2nd edition , The McGraw Hill
Pvt Ltd.
3. Embedded System , Architecture, Programming and Design, Raj Kamal,2 nd edition ,The McGraw Hill
Companies.
TOTAL HOURS : 72
TOTAL CREDITS : 4
WEIGHTAGE :
UNIT II
Linear Algebra and Vector differential calculus: Determinants, vector space
Determinants. Cramer’s Rule- Inverse of a Matrix. Gauss–Jordan Elimination- Vector Spaces, Inner Product
Spaces, Linear Transformations- Vectors in 2 space and 3 space-Inner product-Vector product
UNIT III
Linear Algebra: Matrix Eigen value Problems
The Matrix Eigen value Problem. Determining Eigen values and Eigenvectors- Some Applications of Eigen
value Problems- Symmetric, Skew-Symmetric, and Orthogonal Matrices –Eigen bases. Diagonalization.
Quadratic Forms
Set theory: Set notation and description,basic set operations , Venn diagrams ,laws of set theory ,partition
-min sets- Principle of inclusion and exclusion.
UNIT IV
Functions and relations: Injective, Surjective, Bijective functions - composition, identity, inverse; Relations
- properties of relations - closure operations on relations
UNIT V
Formal languages: Four classes of grammars (Phrase Structure, Context sensitive, Context Free, Regular) -
definitions - Context free Grammar : Right most , Left most derivations – Syntax trees – Unambiguity,
Ambiguity – Construction of grammars for languages – Derivation of languages from grammars – Regular
expressions.
Push down automata (PDA): Informal description - definition - Deterministic PDA - Equivalence of
acceptance by final state and empty stack - Equivalence of PDA's and Context Free languages.
References:
1. Erwin Kreyzig: Advanced Engineering Mathematics
2. Kenneth H Rosen : Discrete mathematics and its applications
3. John E Hopcroft, Rajeev Motwani, and Jeffrey D.Ullman, “Introduction to Automata Theory,
Languages and Computation”, Addison-Wesley/Pearson, 2006.
4. 4. John Martin, “Introduction to Languages and the Theory of Computation”, Tata McGraw Hill, 20
TOTAL HOURS : 72
TOTAL CREDITS : 4
WEIGHTAGE :
OBJECTIVE OF COURSE: To identify the computer and network risks thorough python.
UNIT I
Introduction-Running Python, Variables and Arithmetic Expressions, Conditionals, File Input and Output
,Strings, Lists, Tuples, Sets, Dictionaries, Iteration and Looping, Functions, Generators, Coroutines , Objects
and Classes, Exceptions , Modules ,Getting Help .
Lexical Conventions and Syntax-Line Structure and Indentation, Identifiers and Reserved Words, Numeric
Literals , String Literals ,Containers ,Operators, Delimiters, and Special Symbols, Documentation Strings
,Decorators ,Source Code Encoding.
UNIT II
Operators and Expressions-Operations on Numbers, Operations on Sequences, String Formatting, Advanced
String Formatting, Operations on Dictionaries, Operations on Sets, Augmented Assignment The Attribute (.)
Operator, The Function Call () Operator, Conversion Functions, Boolean Expressions and Truth Values ,
Object Equality and Identity , Order of Evaluation , Conditional Expressions
Program Structure and Control Flow-Program Structure and Execution, Conditional Execution, Loops and
Iteration, Exceptions, Built-in Exceptions, Defining New Exceptions .
Functions and Functional Programming-Functions, Parameter Passing and Return Values, Scoping Rules.
UNIT III
Classes and Object: Oriented Programming,The class Statement, Class Instances, Scoping Rules.
Inheritance. Modules, Packages, and Distribution- Modules and the import Statement. Built-in Functions
and Types.
UNIT IV
Network Programming and Sockets: Network Programming Basics, asyn chat, asyncore, select, socket, ssl,
SocketServer. Internet Application Programming: ftp lib, http Package, smtplib, urllib Package. Web
Programming-cgi, cgitb, wsgiref, web browser. Cryptographic Services.
UNIT V
Introducing the scope of pentesting, Approaches to pentesting , Scanning Pentesting-Ping sweep, The TCP
scan concept and its implementation using a Python script, How to create an efficient IP scanner, The
concept of a port scanner, How to create an efficient port scanner. Introducing a network sniffer,
Implementing a network sniffer using Python. Wireless SSID finding and wireless traffic analysis by
Python, Wireless attacks, The concept of foot printing of a web server , Introducing information gathering.
References:
TOTAL HOURS : 72
TOTAL CREDITS : 4
WEIGHTAGE :
OBJECTIVE OF COURSE: Ensure the deep knowledge of computer crimes and forensics.
UNIT I
Computer forensics fundamentals: What is computer forensics, use of computer forensics in law
enforcement, Computer forensics assistance to human resource/employment proceedings, Computer
forensics services, benefits of professional forensics methodology, steps taken by Computer forensics
specialists, who can use Computer forensics evidence. Types of Computer forensics technology: types of
military Computer forensics technology, types of law enforcement, Computer forensic technology, types of
business Computer forensic technology. Types of vendor and computer forensics services: Occurrence of
cyber crime, cyber detectives, computer forensics investigative services, forensics process improvement.
UNIT II
Data recovery: Data recovery defined, data back-up and recovery, the role of back-up in data recovery, the
data recovery solution. Evidence collection and data seizure- Why collective evidence, Collection options,
obstacles, types of evidence, the rules if evidence, volatile evidence, general procedure, collection and
archiving, methods of collection, artifacts, collection steps, controlling contamination: the chain of custody.
Duplication and preservation of digital evidence - Preserving the digital crime scene, computer evidence
processing steps, legal aspects of collecting and preserving Computer forensics evidence.
Conducting Digital Investigations: Digital Investigation Process Models, Scaffolding for Digital
Investigations, Applying the Scientific Method in Digital Investigations, Investigative Scenario: Security
Breach. Handling a Digital Crime Scene-Published Guidelines for Handling Digital Crime Scenes,
Fundamental Principles, Authorization, Preparing to Handle Digital Crime Scenes, Surveying the Digital
Crime Scene , Preserving the Digital Crime Scene .Investigative Reconstruction with Digital Evidence :
Equivocal Forensic Analysis , Victimology, Crime Scene Characteristics ,Threshold Assessments.
UNIT IV
Violent Crime and Digital Evidence: The Role of Computers in Violent Crime, Processing the Digital Crime
Scene, Investigative Reconstruction, Digital Evidence as Alibi - Investigating an Alibi, Time as Alibi,
Location as Alibi. Sex Offenders on the Internet - Old Behaviors, New Medium, Legal Considerations,
Identifying and Processing Digital Evidence, Investigating Online Sexual Offenders, Investigative
Reconstruction, Case Example: Scott Tyree, Case Example: Peter Chapman. Computer Intrusions - How
Computer Intruders Operate, Investigating Computer Intrusions, Forensic Preservation of Volatile Data,
Post-Mortem Investigation of a Compromised System, Investigation of Malicious Computer Programs,
Investigative Reconstruction. Cyberstalking: How Cyberstalkers Operate, Investigating Cyberstalking,
Cyberstalking, Case Example.
UNIT V
Computer Basics for Digital Investigators: A Brief History of Computers, Basic Operation of Computers,
Representation of Data, Storage Media and Data Hiding, File Systems and Location of Data, Dealing with
Password Protection and Encryption Applying, Forensic Science to Computers: Preparation, Survey,
Documentation , Preservation, Examination and Analysis, Reconstruction, Reporting, Digital Evidence on
Windows Systems: File Systems, Data Recovery, Log Files, Registry, Internet Traces, Program Analysis.
Digital Evidence on UNIX Systems - UNIX Evidence Acquisition Boot Disk, File Systems, Overview of
Digital Evidence Processing Tools, Data Recovery, Log Files, File System Traces, Internet Traces, Digital
Evidence on the Internet- Role of the Internet in Criminal Investigations, Internet Services: Legitimate
versus Criminal Uses, Using the Internet as an Investigative Tool, Online Anonymity and Self-Protection, E-
mail Forgery and Tracking, Usenet Forgery and Tracking, Searching and Tracking on IRC.
1. John R. Vacca, Computer Forensics: Computer Crime Scene Investigation, 1 ST Edition, Charles River
Media, 2005 (2014 Reprint )
2. Eoghan Casey, Digital Evidence and Computer Crime Forensic Science, Computers and the Internet
Third Edition
TOTAL HOURS: 72
TOTAL CREDITS: 3
WEIGHTAGE :
PROGRAMMING IN PYTHON
Basic Programmes
Network Analysis
TOTAL HOURS : 72
TOTAL CREDITS : 4
WEIGHTAGE :
OBJECTIVE OF COURSE: Aim to Mould experts in advanced network tools and IOT
UNIT I
Internetworking: Concepts, Architecture, and Protocols, Internet Addressing, Datagram Forwarding, Support
Protocols And Technologies.
UNIT II
The Future IP (IPv6), TCP: Reliable Transport Service, Internet Routing And Routing Protocols.
Network Performance (QoS and DiffServ), Multimedia And IP Telephony (VoIP), Network Security,
Trends In Networking Technologies And Uses.
UNIT IV
Internet of Things: An Overview, Programming Frameworks for Internet of Things, Security and Privacy in
the Internet of Things, Internet of Things: Robustness and Reliability.
UNIT V
Governing Internet of Things: Issues, Approaches, and New Paradigms, Obfuscation and Diversification for
Securing the Internet of Things (IoT), Applied Internet of Things, Internet of Vehicles and Applications.
References:
TOTAL HOURS : 72
TOTAL CREDITS : 4
WEIGHTAGE :
UNIT I
UNIT II
Finding Vulnerabilities: From Nmap Version Scan to Potential Vulnerability , Nessus , The Nmap Scripting
Engine, Running a Single NSE Script, Metasploit Scanner Modules, Metasploit Exploit Check Functions,
Web Application Scanning, Manual Analysis.
UNIT III
Password Attacks- Password Management, Online Password Attacks, Offline Password Attacks, Dumping
Plaintext Passwords from Memory with Windows Credential Editor.
UNIT IV
Social Engineering: The Social-Engineer Toolkit, Spear-Phishing Attacks, Web Attacks, Mass Email
Attacks, Multipronged Attacks.
Web Application Testing: Using Burp Proxy, SQL Injection, XPath Injection, Local File Inclusion, Remote
File Inclusion, Command Execution, Cross-Site Scripting, Cross-Site Request Forgery, Web Application
Scanning with w3af.
UNIT V
Wireless Attacks: Setting Up, Monitor Mode ,Capturing Packets ,Open Wireless ,Wired Equivalent Privacy,
Wi-Fi Protected Access ,WPA2, Wi-Fi Protected Setup.
Using the Smartphone Pentest Framework: Mobile Attack Vectors, The Smartphone Pentest Framework,
Remote Attacks, Client-Side Attacks, Malicious Apps, Mobile Post Exploitation.
TOTAL HOURS : 72
TOTAL CREDITS : 4
WEIGHTAGE :
UNIT I
OS overview, Scheduling: Uniprocessor, multiprocessor, real time systems, Embedded operating system
UNIT II
Storage System Environment, Storage Networking Technologies and Virtualization, Storage Network,
Network attached Storage, IP SAN, Content Addressed Storage, Storage Virtualization
UNIT III
Local And Remote Replication, Managing and monitoring the storage Infrastructure, Storage Management
Activities
UNIT IV
Hard disk data Acqusition: Reading source data, Writing the output data
PC Based partitions: DOS partitions ,Analysis Considerations, Apple Partition, Removable media
Server based partitions: BSD partition, Sun Solaris slices, GPT partition, Multiple disk volume-RAID, Disk
spanning, File system analysis.
FAT concepts and analysis ,NTFS concepts, NTFS Analysis ,Ext 2 and Ext 3 concepts and analysis ,UFS 1
and UFS 2 concepts and analysis
References:
2. Information storage and management, “storing managing and protecting digital information” G
Somasundaram, Alok Shrivastava,wiely publishing 2009, 1 edition,EMC Corporation
TOTAL HOURS : 72
TOTAL CREDITS : 4
WEIGHTAGE :
OBJECTIVE OF COURSE: Ensure the knowledge to produce valuable and acceptable evidence to
the court of law.
UNIT I
The incident response process, ,The incident response plan, The incident response playbook Forensic
Fundamentals: Digital forensic fundamentals, The digital forensic process. Acquiring Host-Based Evidence-
Preparation, Evidence volatility, Evidence acquisition, Evidence collection procedures, Non-volatile data.
UNIT II
Network Evidence Collection: Preparation, Network device evidence, Packet capture, Evidence collection,
Network Evidence Analysis-Analyzing packet captures, Analyzing network log files.
UNIT IV
Concept of cyber crime and IT Act 2000.
Jurisdiction: Civil Law of Jurisdiction in India,Cause of Action,Jurisdiction and IT Act 2000.Indian
Evidence Act Vs IT Act 2000
UNIT V
Digital signature and Electronic signature, Digital Signature under the IT Act, 2000, E-Governance,
Attribution, Acknowledgement and Dispatch of Electronic Records, Certifying Authorities, Duties of
Subscribers, Intermediaries, Electronic Commerce, E-commerce in India, Electronic Contracts. Penalties
and offences under the IT Act, 2000.
References:
TOTAL HOURS : 72
TOTAL CREDITS : 4
WEIGHTAGE :
OBJECTIVE OF COURSE: To familiarize with various security attacks on white hackers pint of
view
Introduction to ethickal hacking
SERVLETS
SOCKETS
JDBC
JAVA BEAN
SEMESTER III
TOTAL HOURS : 72
TOTAL CREDITS : 4
WEIGHTAGE :
UNIT 2
Key Length, Key Management, Electronic Codebook Mode, Block Replay, Cipher Block Chaining Mode,
Stream Ciphers, Self-Synchronizing Stream Ciphers, Cipher-Feedback Mode, Synchronous Stream Ciphers,
Output Feedback Mode, Counter Mode, Choosing a Cipher Mode, Interleaving, Block Ciphers versus
Stream Ciphers, Choosing an Algorithm, Public Key Cryptography versus Symmetric cryptography
UNIT 3
Encrypting Communications Channels, Encrypting Data for Storage, Hardware Encryption versus Software
Encryption, Compression, Encoding, and Encryption, Detecting Encryption, Hiding and Destroying
Information.
UNIT 4
Information Theory, Complexity Theory, Number Theory, Factoring, Prime Number Generation, Discrete
Logarithms in a Finite Field, Data Encryption Standard (DES) Double Encryption, Triple Encryption
.Stream Ciphers, RC4, SEAL, Feedback with Carry Shift Registers, Stream Ciphers Using FCSRs . N-
Hash ,MD4, MD5, MD2, Secure Hash Algorithm (SHA) .Message Authentication Codes.
UNIT 5
RSA, Pohlig-Hellman, McEliece, Elliptic Curve Cryptosystems, Digital Signature Algorithm (DSA), Gost
Digital Signature Algorithm, Discrete Logarithm Signature Schemes, Ongchnorr-Shamir, Cellular Automata
- Feige-Fiat-Shamir -Guillou-Quisquater, Diffie-Hellman, Station-to-Station Protocol, Shamir’s Three-Pass
Protocol, IBM Secret-Key Management Protocol, MITRENET, Kerberos, IBM Common Cryptographic
Architecture.
References:
2. Wenbo Mao, “Modern Cryptography Theory and Practice”, Pearson Education, 2004
3. Atul Kahate, “Cryptography and Network Security”, Tata McGrew Hill, 2003.
TOTAL HOURS : 72
TOTAL CREDITS : 4
WEIGHTAGE :
OBJECTIVE OF COURSE: Ensure deep knowledge of wireless and web world security.
UNIT I
Overview of wireless technologies and security: Personal Area Networks, Wireless Local Area Networks,
Metropolitan Area Networks, Wide Area Networks. Wireless threats, vulnerabilities and security: Wireless
LANs, War Driving, War Chalking, War Flying, Common Wi-fi security recommendations, PDA Security,
Cell Phones and Security, Wireless DoS attacks, GPS Jamming, Identity theft.
UNIT II
Mobile system architectures, Overview of mobile cellular systems, GSM Security & Attacks,
Vulnerabilities in Cellular Services, Cellular Jamming Attacks & Mitigation, Mobile application security.
CIA triad in mobile phones-Voice, SMS and Identification data interception in GSM: Introduction, practical
setup and tools
UNIT III
UNIT IV
Bypassing Client: Side Controls-Transmitting Data Via the Client-Hidden Form Fields,HTTP Cookies ,URL
Parameters. Attacking Authentication: Design Flaws in Authentication Mechanisms, Implementation Flaws
in Authentication, Securing Authentication.
UNIT V
Attacking Data Stores: Injecting into Interpreted Contexts-Bypassing a Login ,Injecting into SQL
,Exploiting a Basic Vulnerability, Injecting into Different Statement Types ,Finding SQL Injection Bugs
,Fingerprinting the Database ,The UNION Operator, Extracting Useful Data ,Extracting Data with
UNION ,Bypassing Filters ,Second-Order SQL Injection ,Advanced Exploitation.
Attacking Users: Cross-Site Scripting-Varieties of XSS, XSS Attacks in Action, Finding and Exploiting
XSS Vulnerabilities, Preventing XSS Attacks
References:
1. The Web Application Hacker’s Handbook,Second Edition,Finding and Exploiting Security Flaws,Dafydd
Stuttard,Marcus Pinto.
2. Kia Makki, Peter Reiher, “Mobile and Wireless Network Security and Privacy “, Springer,2007.
TOTAL CREDITS : 4
WEIGHTAGE :
UNIT I
Introduction, Computer Virus Basics, Taxonomy, Techniques and Tools: Introduction General Aspects of
Computer Infection Programs , Definitions and Basic Concepts Action Chart of Viruses or Worms, Viruses
or Worms Life Cycle, Analogy Between Biological and Computer Viruses, Numerical Data and Indices,
Designing Malware. Non Self-reproducing Malware (Epeian), Logic Bombs ,Trojan Horse and Lure
Programs, How Do Viruses Operate, Overwriting Adding Viral Code: Appenders and Prependers Code
Interlacing Infection or Hole Cavity Infection, Companion Viruses, Source Code Viruses
UNIT II
Computer Viruses in Interpreted Programming Language: Design of a Shell Bash Virus under Linux,
Fighting Over infection , Anti-antiviral Fighting: Polymorphism, Increasing the Vbash Infective Power,
Including a Payload. Some Real-world Examples The Unix owr Virus, The Unix head Virus, The Unix
Coco Virus, The Unix bash virus. Companion: Viruses Introduction, The vcomp ex companion virus,
Analysis of the vcomp ex Virus , Weaknesses and Flaws of the vcomp ex virus .
UNIT III
Worms: Introduction, The Internet Worm, The Action of the Internet Worm, How the Internet Worm
Operated, Dealing With the Crisis, IIS Worm Code Analysis ,Buffer Overflows ,Buffer IIS Vulnerability
and Buffer Overflow, Detailed Analysis of the Source Code, Xanax Worm Code Source Analysis, Main
Spreading Mechanisms: Infecting E-mails, Executable Files Infection, Spreading via the IRC Channels,
Final Action of the Worm. The Various Procedures of the Worm. Analysis of the UNIX. LoveLetter Worm -
Variables and Procedures, How the Worm Operates.
Anti-Anti-Virus Techniques: How a Virus Detector Works, Stealth for Boot Sector Viruses, Polymorphic
Viruses, Retaliating Viruses, Advanced Anti-Virus Techniques, Genetic Viruses.
UNIT V
BIOS Viruses: Introduction, bios Structure and Working, Disassembly and Analysis of the BIOS Code,
Detailed Analysis of the BIOS Code , vbios Virus Description . Viral Boot Sector Concept, Installation of
vbios .Computer Viruses and Applications Introduction: The State of the Art, The Xerox Worm, The KOH
Virus, Military Applications, Fighting against Crime, Environmental Cryptographic Key Generation .
References:
2. Mark.A .Ludwig, “The Giant black book of computer viruses, Create Space Independent Publishing
Platform, 2 nd edition.
TOTAL HOURS : 72
TOTAL CREDITS : 4
WEIGHTAGE :
OBJECTIVE OF COURSE: To familiarize with various security attacks on white hackers point of
view.
Denial of service
Session hijacking
Hacking web
Sql injection
Hacking wireless networks
Hacking mobile platforms
MINI PROJECT
SEMESTER IV
CF8*0402 ELECTIVE
CF8*0403 ELECTIVE
PROJECT
VIVA-VOCE
TOTAL HOURS : 72
TOTAL CREDITS : 4
WEIGHTAGE :
UNIT I
Security Risk Assessment: The Role of the Security Risk Assessment , Definition of a Security Risk
Assessment ,The Need for a Security Risk Assessment ,Checks and Balances ,Periodic Review ,Risk-Based
Spending ,Requirement , Security Risk Assessment Secondary Benefits, Related Activities : Gap
Assessment , Compliance Audit , Security Audit ,Vulnerability Scanning , Penetration Testing Ad Hoc
Testing , Social Engineering , Wardialing .
UNIT II
Information Security Risk Assessment Basics: Project Definition ,Project Preparation ,Data Gathering Risk
Analysis : Assets, Threat Agents and Threats-Threat Agents, Threats, Vulnerabilities, Security Risk, Risk
Mitigation- Safeguards, Residual Security Risk, Risk Reporting and Resolution, Risk Resolution
Security Risk Assessment Preparation: Introduce the Team, Review Business Mission, Identify Critical
Systems, Identify Assets, Asset Valuation, Identifying Threats, Determine Expected Controls
UNIT III
UNIT IV
Security Risk Analysis: Determining Risk, Creating Risk Statements, Team Review of Security Risk
Statements, Security Risk Mitigation: Selecting Safeguards, Safeguard Solution Sets Establishing Risk
Parameters, Security Risk Assessment Reporting: Cautions in Reporting, Pointers in Reporting, Report
Structure, Document Review Methodology, Assessment Brief, Action Plan.
UNIT V
Security Risk Assessment Project Management: Project Planning, Project Tracking, Taking Corrective
Measures, Project Status Reporting, Project Conclusion and Wrap-Up, Security Risk Assessment
Approaches: Quantitative vs. Qualitative Analysis, Tools
Reference
PROJECT
TOTAL HOURS : 72
WEIGHTAGE :
OBJECTIVE OF COURSE:
The projects should be in the field of network security, operating system security or software security.
VIVA-VOCE
In Viva – Voce, the examiner can ask questions from all core courses, (including languages) and selected
elective courses in the programme.
TOTAL HOURS : 72
TOTAL CREDITS : 4
WEIGHTAGE :
UNIT I
Software processes: Software process models, Process activities, Coping with change, The rational unified
process. Requirements engineering-Functional and non-functional requirements, The software requirements
document ,Requirements specification ,Requirements engineering processes ,Requirements elicitation and
analysis Requirements validation, Requirements management.
UNIT II
System modelling: Context models, Interaction models, Structural models, Behavioral models ,Model-
driven engineering. Architectural design: Architectural design decisions ,Architectural views , Architectural
patterns Application architectures.
UNIT III
Design and implementation: Object oriented design using the UML, Design patterns, Implementation issues
Open source development . Software testing: Development testing, Test: driven development
,Releasetesting, User testing. Software evolution: Evolution processes, Program evolution dynamics ,
Software maintenance, Legacy system management.
UNIT IV
UNIT V
References:
TOTAL HOURS : 72
TOTAL CREDITS : 4
WEIGHTAGE :
UNIT 1
Network Intrusion Detection and Analysis: Typical NIDS/NIPS Functionality, Modes of Detection, Types of
NIDS/NIPSs, NIDS/NIPS Evidence Acquisition, Comprehensive Packet Logging, Snort. Event Log
Aggregation, Correlation, and Analysis: Sources of Logs, Network Log Architecture, Collecting and
Analyzing Evidence.
UNIT 2
UNIT 3
Wireless: Network Forensics Unplugged: The IEEE Layer 2 Protocol Series, Wireless Access Points,
Wireless Traffic Capture and Analysis, Common Attacks, Locating Wireless Devices.
UNIT 4
Packet Analysis: Protocol Analysis, Packet Analysis, Flow Analysis, Higher-Layer Traffic Analysis.
Statistical Flow Analysis: Sensors, Flow Record Export Protocols, Collection and Aggregation, Analysis.
UNIT 5
Network Tunneling: Tunneling for Functionality, Tunneling for Confidentiality, Covert Tunneling. Malware
Forensics: Trends in Malware Evolution, Network Behavior of Malware.
Reference :
1. Network Forensics:Tracking Hackers through Cyberspace,Sherri Davidoff,Jonathan Ham, 2012 Pearson
Education
TOTAL HOURS : 72
TOTAL CREDITS : 4
WEIGHTAGE :
Introduction to Mobile Forensics: Mobile forensics Mobile phone evidence extraction process,The
preparation phase,The isolation phase,The processing phase,The verification phase.
Practical mobile forensic approaches: Mobile operating systems overview,Mobile forensic tool leveling
system,Data acquisition methods.Potential evidence stored on mobile phones, Rules of evidence.
UNIT 2
Windows Phone Forensics: Windows Phone OS, Windows phone file system, Data acquisition, Extracting
the data
CASE STUDY: BlackBerry Forensics
UNIT 3
Understanding Android: The Android model, Android security, Android file hierarchy, Android file system.
A forensic environment setup-Android Software Development Kit, Android Virtual Device, Accessing the
connected device, Android Debug Bridge. Accessing the device using adb-Detecting connected devices,
Killing the local adb server, Accessing the adb shell. Screen lock bypassing techniques, Gaining root access.
UNIT 4
Android Data Recovery Techniques: Data recovery. Android App Analysis and Overview of Forensic Tools:
Android app analysis, Reverse engineering Android apps, Forensic tools overview, Cellebrite – UFED,
MOBILedit. CASE STUDY: Android Data Extraction Techniques
UNIT 5
Understanding the Internals of iOS Devices: iPad hardware, File system, The HFS Plus file system. iPhone
operating system. iOS security. Data Acquisition from iOS Devices: Operating modes of iOS devices,
Physical acquisition, Acquisition via a custom ramdisk. Building a custom ramdisk, Booting the custom
ramdisk, Bypassing the passcode,Imaging the data partition,Decrypting the data partition,Recovering the
deleted data.
CASE STUDY: iOS Forensic Tools.
TOTAL HOURS : 72
TOTAL CREDITS : 4
WEIGHTAGE :
UNIT I
Databases and Database Users: Introduction, Characteristics of the Database Approach, Actors on the Scene,
Workers behind the Scene, Advantages of Using the DBMS Approach, A Brief History of Database
Applications. Database System Concepts and Architecture: Data Models, Schemas, and Instances, Three-
Schema Architecture and Data Independence, Database Languages and Interfaces, The Database System
Environment, Centralized and Client/Server Architectures for DBMSs, Classification of Database
Management Systems. The Relational Data Model and Relational Database Constraints-Relational Model
Concepts, Relational Model Constraints and Relational Database Schemas, Update Operations,
Transactions, and Dealing with Constraint Violations.
UNIT II
Data Modeling Using the Entity-Relationship (ER) Model-Using High-Level Conceptual Data Models for
Database Design, A Sample Database Application, Entity Types, Entity Sets, Attributes, and
Keys,Relationship Types, Relationship Sets, Roles, and Structural Constraints, Weak Entity Types ,ER
Diagrams.
UNIT III
UNIT IV
Database Security -Introduction to Database Security Issues, Discretionary Access Control Based on
Granting and Revoking Privileges, Mandatory Access Control and Role-Based Access Control for
Multilevel Security, SQL Injection, Introduction to Statistical Database Security, Introduction to Flow
Control, Encryption and Public Key Infrastructures, Privacy Issues and Preservation, Challenges of
Database Security, Oracle Label-Based Security.
UNIT V
Introduction: Data Mining, KDD Process , Mining Databases, Data Mining Functionalities :
Characterization and Discrimination, Mining frequent patterns, Association and correlation, Classification
and Prediction, Cluster Analysis.
Data Warehouse and OLAP technology: Data Warehouse, Multidimensional data Model, Data warehouse
architecture, Data Warehouse implementation, OLAP, Data Warehouse and data mining.
References:
TOTAL HOURS : 72
TOTAL CREDITS : 4
WEIGHTAGE :
UNIT 1
Cloud Computing definition, private, public and hybrid cloud. Cloud types; IaaS, PaaS, SaaS. Benefits and
challenges of cloud computing, public vs private clouds, role of virtualization in enabling the cloud;
Business Agility: Benefits and challenges to Cloud architecture.
UNIT II
Technologies and the processes required when deploying web services: Deploying a web service from inside
and outside a cloud architecture, advantages and disadvantages- Development environments for service
development; Amazon, Azure, Google App.
UNIT III
UNIT IV
Multi-tenancy Issues: Isolation of users/VMs from each other- How the cloud provider can provide this-
Virtualization System Security Issues: e.g. ESX and ESXi Security, ESX file system security- storage
considerations, backup and recovery- Virtualization System Vulnerabilities.
UNIT V
Security management in the cloud: security management standards- SaaS, PaaS, IaaS availability
management- access control- Data security and storage in cloud.
References:
2. Toby Velte, Anthony Velte, Robert Elsenpeter, “Cloud Computing, A Practical Approach”, Tata
McGraw-Hill Osborne Media; 1 edition, 2009.
3. Tim Mather, Subra Kumaraswamy, Shahed Latif, “Cloud Security and Privacy: An Enterprise
Perspective on Risks and Compliance”, O'Reilly Media; 1 edition, 2009.
TOTAL HOURS : 72
TOTAL CREDITS : 4
WEIGHTAGE :
UNIT I
Introduction : steps in image processing, Image acquisition, representation, sampling and quantization,
relationship between pixels. color models: basics of color image processing.
UNIT II
Image enhancement in spatial domain: some basic gray level transformations, histogram processing,
enhancement using arithmetic / logic operations, basics of spatial filtering and smoothing. Image restoration:
Model of degradation and restoration process, noise models, restoration in the presence of noise, periodic
noise reduction.
UNIT III
Image segmentation: Thresholding and region based segmentation. Image compression: Fundamentals –
models – information theory – error free compression –Lossy compression: predictive and transform
coding.JPEG and MPEG standard.
UNIT IV
UNIT V
1. R.C. Gonzalez, R.E.Woods, Digital Image processing, 2nd Edition, Pearson Education,2002.
2. Ingemar J. Cox, MattheW, L. Miller Jeffrey A. Bloom ,Jessica Fridrich Ton Kalker
Digital Watermarking and Steganography, Second Edition 2008.