Cloud Security
Cloud Security
K L Deemed to be University
Department of Computer Science and Engineering-Honors -- KLVZA
Course Handout
2023-2024, Even Sem
Course Title :CLOUD SECURITY
Course Code :21CS3287R
L-T-P-S Structure : 2-0-2-0
Pre-requisite :
Credits :3
Course Coordinator :DASARI VINAY KUMAR
Team of Instructors :
Teaching Associates :
Syllabus :Syllabus :Security Concepts: Confidentiality, privacy, integrity, authentication, non-repudiation, availability, access
control, defense in depth, least privilege, the importance of security in the cloud, Importance in PaaS, IaaS and SaaS;
Cryptographic Systems: Symmetric cryptography, stream ciphers, block ciphers, modes of operation, public-key cryptography,
hashing, digital signatures, public-key infrastructures, key management, X.509 certificates, OpenSSL. Multi-tenancy Issues:
Isolation of users/VMs from each other. Virtualization System Security Issues: e.g. ESX and ESXi Security, ESX file system
security, storage considerations, backup, and recovery; Virtualization System Vulnerabilities: Management console
vulnerabilities, management server vulnerabilities, administrative VM vulnerabilities, guest VM vulnerabilities, hypervisor
vulnerabilities, hypervisor escape vulnerabilities, configuration issues, and malware (botnets, etc). Virtualization System-Specific
Attacks: Guest hopping, attacks on the VM (delete the VM, attack on the control of the VM, code or file injection into the
virtualized file structure), VM migration attack, hyperjacking. Technologies for virtualization-Based Security Enhancement: IBM
security virtual server protection, virtualization-based sandboxing; Storage Security: HIDPS, log management, Data Loss
Prevention. Location of the Perimeter, Legal and Compliance Issues: Responsibility, ownership of data, right to penetration test.
Local laws, examination of modern Security Standards (eg PCIDSS), Standards to deal with cloud services and virtualization,
compliance for the cloud provider vs. compliance for the customer.
Text Books :Tim Mather, Subra Kumaraswamy, Shahed Latif, "Cloud Security and Privacy: An EnterprisePerspective on Risks
and Compliance", O'Reilly Media Inc, 2009
Reference Books :1. Ronald L. Krutz, Russell Dean Vines, Cloud Security,2010 2. John Rittinghouse,James Ransome, Cloud
Computing,2009 3. J.R. ("Vic") Winkler, Securing the Cloud,2011
Web Links :1.Linkedin,Cybersecurity with Cloud Computing,Malcolm Shore,https://www.linkedin.com/learning/cybersecurity-
with-cloud-computing-2 2.Linkedin,Cloud Security Architecture for the Enterprise,Karl
Ots,https://www.linkedin.com/learning/cloud-security-architecture-for-the-enterprise 3.Youtube,Docker Tutorial for
Beginners,M.MUMSHAD, https://www.youtube.com/watch?v=fqMOX6JJhGo 4.Youtube,Cloud Security for Dummies,Serge
Borso,https://www.youtube.com/watch?v=8OC0lj53KKI. 5.Edureka,Cloud Security Tutorial For Beginners,Edureka
Skill,https://www.youtube.com/watch?v=lEvKQR1E8IE
MOOCS :1.Introduction to Cybersecurity Foundations,Coursera,4 Weeks, https://www.coursera.org/learn/introduction-to-
cybersecurity-foundations 2.Cybersecurity in the Cloud Specialization,Course Era,12
Weeks,https://www.coursera.org/specializations/cybersecurity-cloud 3.Cloud Security,Cisco Networking Academy,12
Weeks,https://www.netacad.com/courses/cybersecurity 4.Certificate of Cloud Security Knowledge (CCSK) V4,Udemy,3
Weeks,https://www.udemy.com/course/complete-ccskv4/
Course Rationale :The course Cloud Security is designed to provide students with a comprehensive understanding of the
security challenges and best practices associated with cloud computing. This course is also beneficial for students who are
interested in learning more about the security implications of cloud computing and how to protect their own data and applications.
Course Objectives :The main objective of the course is to provide students with a comprehensive understanding of security
issues in cloud computing and virtualization environments. Upon successful completion of this course Students will be able to
define the perimeter of a virtualized environment and identify its security implications, Understand the legal and compliance
issues surrounding cloud computing and virtualization, including data ownership, penetration testing, and compliance
standards,Analyze and adhere to modern security standards, such as PCIDSS, for cloud services and virtualization,Differentiate
between compliance requirements for cloud providers and their customers.
about:blank 1/20
12/8/23, 12:08 PM about:blank
Blooms
CO Taxonomy
Course Outcome (CO) PO/PSO
NO Level
(BTL)
Understand the principles of cryptography and Apply various cryptographic
CO1 PO1 1
algorithm
CO2 Analyze various security issues and system vulnerabilities in virtualization PO2 2
CO3 Analyze the technologies for virtualization based security enhancements PO2 3
CO4 Analyze the technologies for virtualization based security enhancements PO2 4
Develop and implement various algorithms for encryption and decryption
CO5 PO2 3
algorithms i.e., AES, MD5 and RSA algorithms
Outcome Highest
COI-1 COI-2 COI-3 COI-4
No. BTL
Btl-1 Btl-1
Btl-1 Understand the Btl-2 Understand the
CO1 1 principles of cryptography principles of cryptography
and Apply various and Apply various
cryptographic algorithms cryptographic algorithms
Btl-2 Btl-2
Btl-1 Analyze various Btl-2 Analyze various
CO2 2 security issues and system security issues and system
vulnerabilities in vulnerabilities in
virtualization virtualization
Btl-3 Btl-3 Btl-3
Btl-1 Analyze the Btl-2 Analyze the Btl-3 Analyze the
CO3 3 technologies for technologies for technologies for
virtualization based virtualization based virtualization based
security enhancement security enhancements security enhancements
Btl-4 Btl-4 Btl-4 Btl-4
Btl-1 Analyze legal and Btl-2 Analyze legal and Btl-3 Analyze legal and Btl-4 Analyze legal and
CO4 4 Compliance issues and Compliance issues and Compliance issues and Compliance issues and
examine modern security examine modern security examine modern security examine modern security
standards standards standards standards
Btl-3
Btl-3 Develop and
implement various
CO5 3 algorithms for encryption
and decryption
algorithms, AES, MD5
and RSA algorithms
Po
Program Outcome
No.
Engineering Knowledge:Apply the knowledge of mathematics, science, engineering fundamentals, and an engineering
PO1
specialization to the solution of complex engineering problems.
Problem Analysis: Identify, formulate, review research literature, and analyse complex engineering problems reaching
PO2
substantiated conclusions using first principles of mathematics, natural sciences and engineering sciences
Design/Development of Solutions: Design solutions for complex engineering problems and design system components or
PO3 processes that meet the specified needs with appropriate consideration for the public health and safety, and the cultural,
societal, and environmental considerations
PO4 Conduct Investigations of Complex Problems:Use research-based knowledge and research methods including design of
experiments, analysis and interpretation of data, and synthesis of the information to provide valid conclusions for complex
about:blank 2/20
12/8/23, 12:08 PM about:blank
problems that cannot be solved by straightforward application of knowledge, theories and techniques applicable to the
engineering discipline.
Modern Tool Usage:Create, select, and apply appropriate techniques, resources, and modern engineering and IT tools
PO5
including prediction and modelling to complex engineering activities with an understanding of the limitations.
The Engineer and Society:Apply reasoning informed by the contextual knowledge to assess societal, health, safety, legal
PO6
and cultural issues and the consequent responsibilities relevant to the professional engineering practice.
Environment and Sustainability:Understand the impact of the professional engineering solutions in societal and
PO7
environmental contexts, and demonstrate the knowledge of, and need for sustainable development
Ethics: Apply ethical principles and commit to professional ethics and responsibilities and norms of the engineering
PO8
practice
Individual and Team Work: Function effectively as an individual, and as a member or leader in diverse teams, and in
PO9
multidisciplinary settings.
Communication:Communicate effectively on complex engineering activities with the engineering community and with
PO10 society at large, such as, being able to comprehend and write effective reports and design documentation, make effective
presentations, and give and receive clear instructions
Project Management and Finance: Demonstrate knowledge and understanding of the engineering and management
PO11 principles and apply these to one’s own work, as a member and leader in a team, to manage projects and in
multidisciplinary environments.
Life-long Learning: Recognize the need for, and have the preparation and ability to engage in independent and lifelong
PO12
learning in the broadest context of technological change.
PSO1 An ability to design and develop software projects as well as Analyze and test user requirements.
PSO2 An Ability to gain working Knowledge on emerging software tools and technologies.
COI-
1 CO1 Course Handout Explanation NA Chalk,LTC,PPT,Talk End Semester Exam
1
Security Concepts:
COI- End Semester
3 CO1 Integrity,Authentication, Non- TBook[1][2][1,34}] Chalk,PPT,Talk
2 Exam,SEM-EXAM1
repudiation
TBook[1],Ch[1],Pg[16-
COI- End Semester
8 CO2 Stream ciphers, Block ciphers 18],TBook[1],Ch[2],Pg[43- Chalk,PPT,Talk
1 Exam,SEM-EXAM1
46]
about:blank 3/20
12/8/23, 12:08 PM about:blank
Virtualization System
Vulnerabilities: Management
COI- ALM,End Semester
15 CO3 console vulnerabilities, TBook[1] Ch[2][26-28] Chalk,PPT,Talk
3 Exam,SEM-EXAM2
management server
vulnerabilities,
administrative VM
vulnerabilities, guest VM
vulnerabilities, hypervisor
COI- End Semester
16 CO3 vulnerabilities, hypervisor TBook [1] [2] [14] Chalk,PPT,Talk
3 Exam,SEM-EXAM2
escape vulnerabilities,
configuration issues, malware
(botnets etc)
Virtualization SystemSpecific
Attacks: Guest hopping, attacks
COI- on the VM (delete the VM, End Semester
17 CO3 TBook [4] Ch [61-71] Chalk,PPT,Talk
3 attack on the control of the VM, Exam,SEM-EXAM2
code or file injection into the
virtualized file structure)
COI- Location of the Perimeter.Legal TBook [1] [10.1.2- 10.1.3] End Semester
21 CO4 Chalk,PPT,Talk
2 and Compliance Issues [365- 368 Exam,SEM-EXAM2
COI- Standards to deal with cloud TBook [1] [10.4.1-10.4.3 End Semester
24 CO4 Chalk,PPT,Talk
3 services and virtualization. [385-392] Exam,SEM-EXAM2
SESSION NUMBER : 1
Session Outcome: 1 Understand the principles of cryptography and Apply various cryptographic algorithms
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
35 Course Handout Explanation 1 PPT
APPLICABLE ---
--- NOT
10 Summary and Conclusion 2 Chalk
APPLICABLE ---
SESSION NUMBER : 2
Session Outcome: 1 Understand the principles of cryptography and Apply various cryptographic algorithms
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Revision 2 Talk
APPLICABLE ---
--- NOT
25 Security Concepts: Confidentiality, Privacy 2 PPT
APPLICABLE ---
--- NOT
10 Problem Discussion 2 Talk
APPLICABLE ---
SESSION NUMBER : 3
Session Outcome: 1 Understand the principles of cryptography and Apply various cryptographic algorithms
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
about:blank 5/20
12/8/23, 12:08 PM about:blank
--- NOT
10 Revision 1 Talk
APPLICABLE ---
--- NOT
25 Integrity, Authentication, Non-repudiation 1 PPT
APPLICABLE ---
--- NOT
10 Summary & Conclusion 2 Chalk
APPLICABLE ---
SESSION NUMBER : 4
Session Outcome: 1 Understand the principles of cryptography and Apply various cryptographic algorithms
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
10 Recap of previous session 1 Talk One minute paper
--- NOT
30 Availability, Access Control, Defence in Depth 2 PPT
APPLICABLE ---
--- NOT
5 Doubts 1 Talk
APPLICABLE ---
SESSION NUMBER : 5
Session Outcome: 1 Understand the principles of cryptography and Apply various cryptographic algorithms
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Chalk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
--- NOT
30 Least privilege, Importance of security in the cloud 2 PPT
APPLICABLE ---
--- NOT
5 Summary & Conclusion 2 Chalk
APPLICABLE ---
SESSION NUMBER : 6
Session Outcome: 1 Understand the principles of cryptography and Apply various cryptographic algorithms
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
25 Importance in PaaS, IaaS and SaaS 2 PPT Case Study
--- NOT
10 Summary& conclusion 1 Chalk
APPLICABLE ---
SESSION NUMBER : 7
Session Outcome: 2 Analyze various security issues and system vulnerabilities in virtualization
about:blank 6/20
12/8/23, 12:08 PM about:blank
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
30 Cryptographic Systems: Symmetric cryptography 2 PPT Focused listing
--- NOT
5 Summary & Conclusion 2 Chalk
APPLICABLE ---
SESSION NUMBER : 8
Session Outcome: 2 Analyze various security issues and system vulnerabilities in virtualization
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
--- NOT
30 Stream ciphers, Block ciphers 2 PPT
APPLICABLE ---
--- NOT
5 Summary & Conclusion 2 Chalk
APPLICABLE ---
SESSION NUMBER : 9
Session Outcome: 2 Analyze various security issues and system vulnerabilities in virtualization
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
--- NOT
30 Modes of operation,Public-key cryptography,Hashing, Digital signatures 2 PPT
APPLICABLE ---
--- NOT
5 Doubts 1 Talk
APPLICABLE ---
SESSION NUMBER : 10
Session Outcome: 2 Analyze various security issues and system vulnerabilities in virtualization
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
10 Recap of previous session 1 Talk One minute paper
--- NOT
30 Public-key infrastructures, Key management. 2 PPT
APPLICABLE ---
--- NOT
5 Doubts 1 Talk
APPLICABLE ---
about:blank 7/20
12/8/23, 12:08 PM about:blank
SESSION NUMBER : 11
Session Outcome: 2 Analyze various security issues and system vulnerabilities in virtualization
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
10 Recap of previous session 1 Talk One minute paper
--- NOT
25 X.509 certificates,OpenSSL. 3 PPT
APPLICABLE ---
--- NOT
10 Summary & Conclusion 3 Chalk
APPLICABLE ---
SESSION NUMBER : 12
Session Outcome: 3 Analyze various security issues and system vulnerabilities in virtualization
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
--- NOT
30 Multi-tenancy Issues:Isolation of users/VMs from each other 2 PPT
APPLICABLE ---
--- NOT
5 Summary & Conclusion 2 Chalk
APPLICABLE ---
SESSION NUMBER : 13
Session Outcome: 3 Analyze the technologies for virtualization based security enhancements
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
Virtualization System Security Issues: e.g. ESX and ESXi Security, ESX
30 3 PPT Role playing
file system security
--- NOT
5 Summary & Conclusion 2 Chalk
APPLICABLE ---
SESSION NUMBER : 14
Session Outcome: 3 Analyze the technologies for virtualization based security enhancements
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
about:blank 8/20
12/8/23, 12:08 PM about:blank
--- NOT
25 Storage considerations, Backup and recovery 1 PPT
APPLICABLE ---
--- NOT
10 Summary & Conclusion 2 Chalk
APPLICABLE ---
SESSION NUMBER : 15
Session Outcome: 3 Analyze the technologies for virtualization based security enhancements
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
Virtualization System Vulnerabilities: Management console --- NOT
30 3 PPT
vulnerabilities, management server vulnerabilities, APPLICABLE ---
--- NOT
5 Doubts 1 Talk
APPLICABLE ---
SESSION NUMBER : 16
Session Outcome: 3 Analyze the technologies for virtualization based security enhancements
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
Administrative VM vulnerabilities, guest VM vulnerabilities, hypervisor
--- NOT
25 vulnerabilities, hypervisor escape vulnerabilities, configuration issues, 3 PPT
APPLICABLE ---
malware (botnets etc)
--- NOT
10 Doubts 1 Talk
APPLICABLE ---
SESSION NUMBER : 17
Session Outcome: 3 Analyze the technologies for virtualization based security enhancements
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
Virtualization SystemSpecific Attacks: Guest hopping, attacks on the
--- NOT
30 VM (delete the VM, attack on the control of the VM, code or file 3 PPT
APPLICABLE ---
injection into the virtualized file structure)
--- NOT
5 Doubts 1 Talk
APPLICABLE ---
SESSION NUMBER : 18
Session Outcome: 3 Analyze the technologies for virtualization based security enhancements
about:blank 9/20
12/8/23, 12:08 PM about:blank
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
--- NOT
25 VM migration attack,Hyperjacking. 3 PPT
APPLICABLE ---
--- NOT
10 Summary&Conclusion 3 Chalk
APPLICABLE ---
SESSION NUMBER : 19
Session Outcome: 3 Analyze the technologies for virtualization based security enhancements
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
Technologies for Virtualization-Based Security Enhancement: IBM Just in-time
30 3 PPT
security virtual server protection, virtualization-based sandboxing teaching
--- NOT
5 Summary & Conclusion 2 Chalk
APPLICABLE ---
SESSION NUMBER : 20
Session Outcome: 4 Analyze legal and Compliance issues and examine modern security standards
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
Just in-time
25 Storage Security: HIDPS, log management, Data Loss Prevention 3 PPT
teaching
--- NOT
10 Summary & Conclusion 2 Chalk
APPLICABLE ---
SESSION NUMBER : 21
Session Outcome: 4 Analyze legal and Compliance issues and examine modern security standards
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
--- NOT
25 Location of the Perimeter, Legal and Compliance Issues 3 PPT
APPLICABLE ---
about:blank 10/20
12/8/23, 12:08 PM about:blank
--- NOT
10 Doubts 1 Talk
APPLICABLE ---
SESSION NUMBER : 22
Session Outcome: 4 Analyze legal and Compliance issues and examine modern security standards
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
--- NOT
25 Responsibility,ownership of data, right to penetration test 3 PPT
APPLICABLE ---
--- NOT
10 Summary & Conclusion 2 Chalk
APPLICABLE ---
SESSION NUMBER : 23
Session Outcome: 4 Analyze legal and Compliance issues and examine modern security standards
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
Just in-time
25 Local laws, examination of modern Security Standards (eg PCIDSS), 3 PPT
teaching
--- NOT
10 Summary&Conclusion 3 PPT
APPLICABLE ---
SESSION NUMBER : 24
Session Outcome: 4 Analyze legal and Compliance issues and examine modern security standards
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
--- NOT
30 Standards to deal with cloud services and virtualization. 3 PPT
APPLICABLE ---
--- NOT
10 Doubts 1 Talk
APPLICABLE ---
SESSION NUMBER : 25
Session Outcome: 4 Analyze legal and Compliance issues and examine modern security standards
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
about:blank 11/20
12/8/23, 12:08 PM about:blank
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
--- NOT
25 compliance for the cloud provider vs. compliance for the customer 3 PPT
APPLICABLE ---
--- NOT
10 Doubts 1 Talk
APPLICABLE ---
SESSION NUMBER : 26
Session Outcome: 4 Analyze legal and Compliance issues and examine modern security standards
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
55 Doubts Clearing Session 4 Talk Case Study
1 Code and decode the string using Ascii values (Caesar Cipher) CO5
7 Study the NMAP cryptography tool and prepare a detailed analysis report. CO5
Session Outcome: 5 Develop and implement various algorithms for encryption and decryption algorithms i.e., AES, MD5 and
RSA algorithms
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
35 Code and decode the string using Ascii values (Caesar Cipher) 3 Talk
APPLICABLE ---
--- NOT
60 Assessment 3 Talk
APPLICABLE ---
SESSION NUMBER : 2
Session Outcome: 5 Develop and implement various algorithms for encryption and decryption algorithms i.e., AES, MD5 and
RSA algorithms
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
35 Write a program in C for Play fair cipher 3 Talk
APPLICABLE ---
--- NOT
60 Assessment 3 Talk
APPLICABLE ---
SESSION NUMBER : 3
Session Outcome: 5 Develop and implement various algorithms for encryption and decryption algorithms i.e., AES, MD5 and
RSA algorithms
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
35 Block Cipher – Data Encryption standard algorithm 3 Talk
APPLICABLE ---
--- NOT
60 Assessment 3 Talk
APPLICABLE ---
SESSION NUMBER : 4
Session Outcome: 5 Develop and implement various algorithms for encryption and decryption algorithms i.e., AES, MD5 and
RSA algorithms
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
35 Block Cipher – triple Data Encryption standard algorithm 3 Talk
APPLICABLE ---
--- NOT
60 Assessment 3 Talk
APPLICABLE ---
about:blank 13/20
12/8/23, 12:08 PM about:blank
SESSION NUMBER : 5
Session Outcome: 5 Develop and implement various algorithms for encryption and decryption algorithms i.e., AES, MD5 and
RSA algorithms
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
35 Block Cipher – Advanced Encryption standard algorithm. 3 Talk
APPLICABLE ---
--- NOT
60 Assessment 3 Talk
APPLICABLE ---
SESSION NUMBER : 6
Session Outcome: 5 Develop and implement various algorithms for encryption and decryption algorithms i.e., AES, MD5 and
RSA algorithms
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
35 Stream Cipher – LFSR based algorithm 3 Talk
APPLICABLE ---
--- NOT
60 Assessment 3 Talk
APPLICABLE ---
SESSION NUMBER : 7
Session Outcome: 5 Develop and implement various algorithms for encryption and decryption algorithms i.e., AES, MD5 and
RSA algorithms
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
Study the NMAP cryptography tool and prepare a detailed analysis --- NOT
35 3 Talk
report. APPLICABLE ---
--- NOT
60 Assessment 3 Talk
APPLICABLE ---
SESSION NUMBER : 8
Session Outcome: 5 Develop and implement various algorithms for encryption and decryption algorithms i.e., AES, MD5 and
RSA algorithms
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
35 Write a C program for Hill Cipher 3 Talk
APPLICABLE ---
--- NOT
60 Assessment 3 Talk
APPLICABLE ---
about:blank 14/20
12/8/23, 12:08 PM about:blank
SESSION NUMBER : 9
Session Outcome: 5 Develop and implement various algorithms for encryption and decryption algorithms i.e., AES, MD5 and
RSA algorithms
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
35 Public Key Cryptosystem – Deffie-Helman Key Exchange. 3 Talk
APPLICABLE ---
--- NOT
60 Assessment 3 Talk
APPLICABLE ---
SESSION NUMBER : 10
Session Outcome: 5 Analyze legal and Compliance issues and examine modern security standards
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
35 Public Key Cryptosystem – Knapsack Cryptosystem. 3 Talk
APPLICABLE ---
--- NOT
60 Assessment 3 Talk
APPLICABLE ---
SESSION NUMBER : 11
Session Outcome: 5 Analyze the technologies for virtualization based security enhancements
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
35 Write a C program for RSA Algorithm 3 Talk
APPLICABLE ---
--- NOT
60 Assessment 3 Talk
APPLICABLE ---
SESSION NUMBER : 12
Session Outcome: 5 Analyze various security issues and system vulnerabilities in virtualization
Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
35 Write a C program for Rail fence Algorithm (Transposition) 3 Talk
APPLICABLE ---
--- NOT
60 Assessment 3 Talk
APPLICABLE ---
about:blank 15/20
12/8/23, 12:08 PM about:blank
Skilling Session wise Teaching – Learning Plan
Assignment Assignment
Week Topic Details co
Type No
Hour 1 2 3 4 5 6 7 8 9
Day Component
- - - - -
V-S31,V-S32,V-S33,V- V-S31,V-S32,V-S33,V-
Theory - - --- --- - - -
S34 S34
- - - - -
- - - - -
Tutorial - - --- --- -- -- - - -
- - - - -
Mon
- - - - -
Lab - - --- --- -- -- - - -
- - - - -
- - - - -
Skilling - - --- --- -- -- - - -
- - - - -
- - - - -
Theory - - -- -- --- --- - - -
- - - - -
- - - - -
Tutorial - - -- -- --- --- - - -
- - - - -
Tue V-S31,V-S31,V-S31,V- V-S31,V-S31,V-S31,V-
- - - - -
S32,V-S32,V-S32,V- S32,V-S32,V-S32,V-
Lab - - --- --- - - -
S33,V-S33,V-S33,V- S33,V-S33,V-S33,V-
- - - - -
S34,V-S34,V-S34 S34,V-S34,V-S34
- - - - -
Skilling - - -- -- --- --- - - -
- - - - -
- - - - -
Theory -- -- -- --
- - - - -
- - - - -
Tutorial -- -- -- --
- - - - -
Wed
- - - - -
Lab -- -- -- --
- - - - -
- - - - -
Skilling -- -- -- --
- - - - -
- - - - -
Theory -- -- -- --
- - - - -
- - - - -
Tutorial -- -- -- --
- - - - -
Thu
- - - - -
Lab -- -- -- --
- - - - -
- - - - -
Skilling -- -- -- --
- - - - -
Fri Theory - - --- --- V-S21,V-S22,V-S23 V-S21,V-S22,V-S23 - - -
- - - - -
about:blank 16/20
12/8/23, 12:08 PM about:blank
- - - - -
- - - - -
Tutorial - - --- --- -- -- - - -
- - - - -
V-S24,V-S24,V-S24,V- V-S24,V-S24,V-S24,V-
- - - - -
S25,V-S25,V-S25,V- S25,V-S25,V-S25,V-
Lab - - --- --- - - -
S26,V-S26,V-S26,V- S26,V-S26,V-S26,V-
- - - - -
S27,V-S27,V-S27 S27,V-S27,V-S27
- - - - -
Skilling - - --- --- -- -- - - -
- - - - -
- - - - -
V-S24,V-S25,V-S26,V- V-S24,V-S25,V-S26,V-
Theory - - --- --- - - -
S27 S27
- - - - -
- - - - -
Tutorial - - -- -- --- --- - - -
- - - - -
Sat
- - V-S21,V-S21,V-S21,V- V-S21,V-S21,V-S21,V- - - -
Lab - - S22,V-S22,V-S22,V- S22,V-S22,V-S22,V- --- --- - - -
- - S23,V-S23,V-S23 S23,V-S23,V-S23 - - -
- - - - -
Skilling - - -- -- --- --- - - -
- - - - -
- - - - -
Theory -- -- -- --
- - - - -
- - - - -
Tutorial -- -- -- --
- - - - -
Sun
- - - - -
Lab -- -- -- --
- - - - -
- - - - -
Skilling -- -- -- --
- - - - -
REMEDIAL CLASSES:
Supplement course handout, which may perhaps include special lectures and discussions that would be planned, and schedule
notified according
SELF-LEARNING:
Content beyond syllabus covered (if any) should be delivered to all students that would be planned, and schedule notified
accordingly.
Advanced Topics, Additional Reading, Research papers and
S.no CO ALM References/MOOCS
any
EVALUATION PLAN:
about:blank 17/20
12/8/23, 12:08 PM about:blank
End Semester End Semester Exam Weightage 30 7.5 7.5 7.5 7.5
180
Summative Max Marks 100 25 25 25 25
Evaluation Weightage 10 10
Total= 40 % Lab End Semester Exam Max Marks 50
100
50
Weightage 5 1.25 1.25 1.25 1.25
MOOCs Review 60
Max Marks 40 10 10 10 10
In Semester Weightage 5 1.25 1.25 1.25 1.25
ALM 60
Formative Max Marks 40 10 10 10 10
Evaluation Home Assignment and Weightage 5 1.25 1.25 1.25 1.25
Total= 25 % 60
Textbook Max Marks 40 10 10 10 10
Continuous Evaluation - Weightage 10 10
100
Lab Exercise Max Marks 50 50
Weightage 10 5 5
Semester in Exam-I 90
Max Marks 50 25 25
In Semester Weightage 10 5 5
Semester in Exam-II 90
Summative Max Marks 50 25 25
Evaluation Weightage 10 10
Total= 35 % Lab In Semester Exam 100
Max Marks 50 50
Weightage 5 1.25 1.25 1.25 1.25
MOOCs Certification 60
Max Marks 40 10 10 10 10
ATTENDANCE POLICY:
Every student is expected to be responsible for regularity of his/her attendance in class rooms and laboratories, to appear in
scheduled tests and examinations and fulfill all other tasks assigned to him/her in every course
In every course, student has to maintain a minimum of 85% attendance to be eligible for appearing in Semester end examination of
the course, for cases of medical issues and other unavoidable circumstances the students will be condoned if their attendance is
between 75% to 85% in every course, subjected to submission of medical certificates, medical case file and other needful
documental proof to the concerned departments
DETENTION POLICY :
In any course, a student has to maintain a minimum of 85% attendance and In-Semester Examinations to be eligible for appearing
to the Semester End Examination, failing to fulfill these conditions will deem such student to have been detained in that course.
PLAGIARISM POLICY :
Supplement course handout, which may perhaps include special lectures and discussions
COURSE TEAM MEMBERS, CHAMBER CONSULTATION HOURS AND CHAMBER VENUE DETAILS:
Supplement course handout, which may perhaps include special lectures and discussions
Chamber
Delivery Chamber Chamber Signature of
Sections Consultation
Name of Faculty Component of Consultation Consultation Course
of Faculty Timings for each
Faculty Day (s) Room No: faculty:
day
Srikanth Vemuru P 22-B - - - -
Pavan Kumar
P 21-C - - - -
Thummala
Ruth Ramya Kalangi P 34-C - - - -
Ramaiah Challa L 22-MA - - - -
Ramaiah Challa P 22-A - - - -
Arumugham Roshini P 33-B - - - -
about:blank 18/20
12/8/23, 12:08 PM about:blank
GENERAL INSTRUCTIONS
Students should come prepared for classes and carry the text book(s) or material(s) as prescribed by the Course Faculty to the
class.
NOTICES
All notices concerning the course will be displayed on the respective Notice Boards.
about:blank 19/20
12/8/23, 12:08 PM about:blank
(DASARI VINAY KUMAR)
Department Of CSE-Honors
HEAD OF DEPARTMENT:
about:blank 20/20