0% found this document useful (0 votes)
56 views20 pages

Cloud Security

Uploaded by

Prudhvi Srinivas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views20 pages

Cloud Security

Uploaded by

Prudhvi Srinivas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

12/8/23, 12:08 PM about:blank

K L Deemed to be University
Department of Computer Science and Engineering-Honors -- KLVZA
Course Handout
2023-2024, Even Sem
Course Title :CLOUD SECURITY
Course Code :21CS3287R
L-T-P-S Structure : 2-0-2-0
Pre-requisite :
Credits :3
Course Coordinator :DASARI VINAY KUMAR
Team of Instructors :
Teaching Associates :
Syllabus :Syllabus :Security Concepts: Confidentiality, privacy, integrity, authentication, non-repudiation, availability, access
control, defense in depth, least privilege, the importance of security in the cloud, Importance in PaaS, IaaS and SaaS;
Cryptographic Systems: Symmetric cryptography, stream ciphers, block ciphers, modes of operation, public-key cryptography,
hashing, digital signatures, public-key infrastructures, key management, X.509 certificates, OpenSSL. Multi-tenancy Issues:
Isolation of users/VMs from each other. Virtualization System Security Issues: e.g. ESX and ESXi Security, ESX file system
security, storage considerations, backup, and recovery; Virtualization System Vulnerabilities: Management console
vulnerabilities, management server vulnerabilities, administrative VM vulnerabilities, guest VM vulnerabilities, hypervisor
vulnerabilities, hypervisor escape vulnerabilities, configuration issues, and malware (botnets, etc). Virtualization System-Specific
Attacks: Guest hopping, attacks on the VM (delete the VM, attack on the control of the VM, code or file injection into the
virtualized file structure), VM migration attack, hyperjacking. Technologies for virtualization-Based Security Enhancement: IBM
security virtual server protection, virtualization-based sandboxing; Storage Security: HIDPS, log management, Data Loss
Prevention. Location of the Perimeter, Legal and Compliance Issues: Responsibility, ownership of data, right to penetration test.
Local laws, examination of modern Security Standards (eg PCIDSS), Standards to deal with cloud services and virtualization,
compliance for the cloud provider vs. compliance for the customer.
Text Books :Tim Mather, Subra Kumaraswamy, Shahed Latif, "Cloud Security and Privacy: An EnterprisePerspective on Risks
and Compliance", O'Reilly Media Inc, 2009
Reference Books :1. Ronald L. Krutz, Russell Dean Vines, Cloud Security,2010 2. John Rittinghouse,James Ransome, Cloud
Computing,2009 3. J.R. ("Vic") Winkler, Securing the Cloud,2011
Web Links :1.Linkedin,Cybersecurity with Cloud Computing,Malcolm Shore,https://www.linkedin.com/learning/cybersecurity-
with-cloud-computing-2 2.Linkedin,Cloud Security Architecture for the Enterprise,Karl
Ots,https://www.linkedin.com/learning/cloud-security-architecture-for-the-enterprise 3.Youtube,Docker Tutorial for
Beginners,M.MUMSHAD, https://www.youtube.com/watch?v=fqMOX6JJhGo 4.Youtube,Cloud Security for Dummies,Serge
Borso,https://www.youtube.com/watch?v=8OC0lj53KKI. 5.Edureka,Cloud Security Tutorial For Beginners,Edureka
Skill,https://www.youtube.com/watch?v=lEvKQR1E8IE
MOOCS :1.Introduction to Cybersecurity Foundations,Coursera,4 Weeks, https://www.coursera.org/learn/introduction-to-
cybersecurity-foundations 2.Cybersecurity in the Cloud Specialization,Course Era,12
Weeks,https://www.coursera.org/specializations/cybersecurity-cloud 3.Cloud Security,Cisco Networking Academy,12
Weeks,https://www.netacad.com/courses/cybersecurity 4.Certificate of Cloud Security Knowledge (CCSK) V4,Udemy,3
Weeks,https://www.udemy.com/course/complete-ccskv4/
Course Rationale :The course Cloud Security is designed to provide students with a comprehensive understanding of the
security challenges and best practices associated with cloud computing. This course is also beneficial for students who are
interested in learning more about the security implications of cloud computing and how to protect their own data and applications.
Course Objectives :The main objective of the course is to provide students with a comprehensive understanding of security
issues in cloud computing and virtualization environments. Upon successful completion of this course Students will be able to
define the perimeter of a virtualized environment and identify its security implications, Understand the legal and compliance
issues surrounding cloud computing and virtualization, including data ownership, penetration testing, and compliance
standards,Analyze and adhere to modern security standards, such as PCIDSS, for cloud services and virtualization,Differentiate
between compliance requirements for cloud providers and their customers.

COURSE OUTCOMES (COs):

about:blank 1/20
12/8/23, 12:08 PM about:blank

Blooms
CO Taxonomy
Course Outcome (CO) PO/PSO
NO Level
(BTL)
Understand the principles of cryptography and Apply various cryptographic
CO1 PO1 1
algorithm
CO2 Analyze various security issues and system vulnerabilities in virtualization PO2 2
CO3 Analyze the technologies for virtualization based security enhancements PO2 3
CO4 Analyze the technologies for virtualization based security enhancements PO2 4
Develop and implement various algorithms for encryption and decryption
CO5 PO2 3
algorithms i.e., AES, MD5 and RSA algorithms

COURSE OUTCOME INDICATORS (COIs)::

Outcome Highest
COI-1 COI-2 COI-3 COI-4
No. BTL
Btl-1 Btl-1
Btl-1 Understand the Btl-2 Understand the
CO1 1 principles of cryptography principles of cryptography
and Apply various and Apply various
cryptographic algorithms cryptographic algorithms
Btl-2 Btl-2
Btl-1 Analyze various Btl-2 Analyze various
CO2 2 security issues and system security issues and system
vulnerabilities in vulnerabilities in
virtualization virtualization
Btl-3 Btl-3 Btl-3
Btl-1 Analyze the Btl-2 Analyze the Btl-3 Analyze the
CO3 3 technologies for technologies for technologies for
virtualization based virtualization based virtualization based
security enhancement security enhancements security enhancements
Btl-4 Btl-4 Btl-4 Btl-4
Btl-1 Analyze legal and Btl-2 Analyze legal and Btl-3 Analyze legal and Btl-4 Analyze legal and
CO4 4 Compliance issues and Compliance issues and Compliance issues and Compliance issues and
examine modern security examine modern security examine modern security examine modern security
standards standards standards standards
Btl-3
Btl-3 Develop and
implement various
CO5 3 algorithms for encryption
and decryption
algorithms, AES, MD5
and RSA algorithms

PROGRAM OUTCOMES & PROGRAM SPECIFIC OUTCOMES (POs/PSOs)

Po
Program Outcome
No.
Engineering Knowledge:Apply the knowledge of mathematics, science, engineering fundamentals, and an engineering
PO1
specialization to the solution of complex engineering problems.
Problem Analysis: Identify, formulate, review research literature, and analyse complex engineering problems reaching
PO2
substantiated conclusions using first principles of mathematics, natural sciences and engineering sciences
Design/Development of Solutions: Design solutions for complex engineering problems and design system components or
PO3 processes that meet the specified needs with appropriate consideration for the public health and safety, and the cultural,
societal, and environmental considerations
PO4 Conduct Investigations of Complex Problems:Use research-based knowledge and research methods including design of
experiments, analysis and interpretation of data, and synthesis of the information to provide valid conclusions for complex

about:blank 2/20
12/8/23, 12:08 PM about:blank
problems that cannot be solved by straightforward application of knowledge, theories and techniques applicable to the
engineering discipline.
Modern Tool Usage:Create, select, and apply appropriate techniques, resources, and modern engineering and IT tools
PO5
including prediction and modelling to complex engineering activities with an understanding of the limitations.
The Engineer and Society:Apply reasoning informed by the contextual knowledge to assess societal, health, safety, legal
PO6
and cultural issues and the consequent responsibilities relevant to the professional engineering practice.
Environment and Sustainability:Understand the impact of the professional engineering solutions in societal and
PO7
environmental contexts, and demonstrate the knowledge of, and need for sustainable development
Ethics: Apply ethical principles and commit to professional ethics and responsibilities and norms of the engineering
PO8
practice
Individual and Team Work: Function effectively as an individual, and as a member or leader in diverse teams, and in
PO9
multidisciplinary settings.
Communication:Communicate effectively on complex engineering activities with the engineering community and with
PO10 society at large, such as, being able to comprehend and write effective reports and design documentation, make effective
presentations, and give and receive clear instructions
Project Management and Finance: Demonstrate knowledge and understanding of the engineering and management
PO11 principles and apply these to one’s own work, as a member and leader in a team, to manage projects and in
multidisciplinary environments.
Life-long Learning: Recognize the need for, and have the preparation and ability to engage in independent and lifelong
PO12
learning in the broadest context of technological change.
PSO1 An ability to design and develop software projects as well as Analyze and test user requirements.
PSO2 An Ability to gain working Knowledge on emerging software tools and technologies.

Lecture Course DELIVERY Plan:


Book No[CH No][Page Teaching-Learning
Sess.No. CO COI Topic EvaluationComponents
No] Methods

COI-
1 CO1 Course Handout Explanation NA Chalk,LTC,PPT,Talk End Semester Exam
1

COI- Security End Semester


2 CO1 TBook[1][1][1,5] Chalk,PPT,Talk
1 concepts:Confidentiality,Privacy Exam,SEM-EXAM1

Security Concepts:
COI- End Semester
3 CO1 Integrity,Authentication, Non- TBook[1][2][1,34}] Chalk,PPT,Talk
2 Exam,SEM-EXAM1
repudiation

COI- Availability, Access control, End Semester


4 CO1 TBook[1] [2] [31-60] Chalk,PPT,Talk
1 Defence in depth Exam,SEM-EXAM1

COI- Least privilege, Importance of End Semester


5 CO1 TBook[1] [2] [31-60 Chalk,PPT,Talk
2 security in the cloud Exam,SEM-EXAM1

COI- Importance in PaaS, IaaS and ALM,End Semester


6 CO1 TBook[1][6][109-144] Chalk,PPT,Talk
2 SaaS Exam,SEM-EXAM1

COI- Cryptographic Systems: ALM,End Semester


7 CO1 TBook[1][5][192-204] Chalk,PPT,Talk
1 Symmetric cryptography Exam

TBook[1],Ch[1],Pg[16-
COI- End Semester
8 CO2 Stream ciphers, Block ciphers 18],TBook[1],Ch[2],Pg[43- Chalk,PPT,Talk
1 Exam,SEM-EXAM1
46]

Modes of operation,Public-key TBook[1],Ch[2],Pg[46-


COI- End Semester
9 CO2 cryptography,Hashing, Digital 52],TBook[1],Ch[3],Pg[78- Chalk,PPT,Talk
1 Exam,SEM-EXAM1
signatures 83]

about:blank 3/20
12/8/23, 12:08 PM about:blank

Book No[CH No][Page Teaching-Learning


Sess.No. CO COI Topic EvaluationComponents
No] Methods

COI- Public-key infrastructures, Key TBook[1]Ch[3.3.1]Pg[87- End Semester


10 CO2 Chalk,PPT,Talk
1 management 92] Exam,SEM-EXAM1

COI- ALM,End Semester


11 CO2 X.509 certificates,OpenSSL. TBook [1] [2] [14] Chalk,PPT,Talk
2 Exam,SEM-EXAM1

COI- Multi-tenancy Issues:Isolation End Semester


12 CO3 TBook[1] Ch[2][26-28] Chalk,PPT,Talk
1 of users/VMs from each other Exam,SEM-EXAM2

Virtualization System Security


COI- Issues: e.g. ESX and ESXi ALM,End Semester
13 CO3 TBook [1] [2] [14] Chalk,PPT,Talk
1 Security, ESX file system Exam,SEM-EXAM2
security

COI- Storage considerations,Backup End Semester


14 CO3 TBook [1] [2] [14 Chalk,PPT,Talk
3 and recovery Exam,SEM-EXAM2

Virtualization System
Vulnerabilities: Management
COI- ALM,End Semester
15 CO3 console vulnerabilities, TBook[1] Ch[2][26-28] Chalk,PPT,Talk
3 Exam,SEM-EXAM2
management server
vulnerabilities,

administrative VM
vulnerabilities, guest VM
vulnerabilities, hypervisor
COI- End Semester
16 CO3 vulnerabilities, hypervisor TBook [1] [2] [14] Chalk,PPT,Talk
3 Exam,SEM-EXAM2
escape vulnerabilities,
configuration issues, malware
(botnets etc)

Virtualization SystemSpecific
Attacks: Guest hopping, attacks
COI- on the VM (delete the VM, End Semester
17 CO3 TBook [4] Ch [61-71] Chalk,PPT,Talk
3 attack on the control of the VM, Exam,SEM-EXAM2
code or file injection into the
virtualized file structure)

COI- VM migration End Semester


18 CO3 TBook [4] Ch [61-71] Chalk,PPT,Talk
3 attack,Hyperjacking. Exam,SEM-EXAM2

Technologies for Virtualization-


Based Security Enhancement:
COI- ALM,End Semester
19 CO3 IBM security virtual server TBook [4]Ch [61-71] Chalk,PPT,Talk
3 Exam,SEM-EXAM2
protection, virtualization-based
sandboxing

Storage Security: HIDPS, log


COI- ALM,End Semester
20 CO4 management, Data Loss TBook [2] Ch [28-34] Chalk,PPT,Talk
1 Exam,SEM-EXAM2
Prevention

COI- Location of the Perimeter.Legal TBook [1] [10.1.2- 10.1.3] End Semester
21 CO4 Chalk,PPT,Talk
2 and Compliance Issues [365- 368 Exam,SEM-EXAM2

COI- Responsibility,ownership of TBook [1] [10.2.1- 10.2.2 End Semester


22 CO4 Chalk,PPT,Talk
2 data, right to penetration test [368- 373] Exam,SEM-EXAM2
about:blank 4/20
12/8/23, 12:08 PM about:blank

Book No[CH No][Page Teaching-Learning


Sess.No. CO COI Topic EvaluationComponents
No] Methods

Local laws, examination of


COI- TBook [1] [10.3.1- 10.3.3 ALM,End Semester
23 CO4 modern Security Standards(eg Chalk,PPT,Talk
2 [373- 385] Exam,SEM-EXAM2
PCIDSS)

COI- Standards to deal with cloud TBook [1] [10.4.1-10.4.3 End Semester
24 CO4 Chalk,PPT,Talk
3 services and virtualization. [385-392] Exam,SEM-EXAM2

compliance for the cloud


COI- TBook [1] [10.5.1-10.5.2 End Semester
25 CO4 provider vs. compliance for the Chalk,PPT,Talk
3 [392-395] Exam,SEM-EXAM2
customer

COI- End Semester


26 CO4 Doubts Clearing Session TBook [1] Chalk,Talk
4 Exam,SEM-EXAM2

Lecture Session wise Teaching – Learning Plan

SESSION NUMBER : 1

Session Outcome: 1 Understand the principles of cryptography and Apply various cryptographic algorithms

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
35 Course Handout Explanation 1 PPT
APPLICABLE ---
--- NOT
10 Summary and Conclusion 2 Chalk
APPLICABLE ---

SESSION NUMBER : 2

Session Outcome: 1 Understand the principles of cryptography and Apply various cryptographic algorithms

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Revision 2 Talk
APPLICABLE ---
--- NOT
25 Security Concepts: Confidentiality, Privacy 2 PPT
APPLICABLE ---
--- NOT
10 Problem Discussion 2 Talk
APPLICABLE ---

SESSION NUMBER : 3

Session Outcome: 1 Understand the principles of cryptography and Apply various cryptographic algorithms

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---

about:blank 5/20
12/8/23, 12:08 PM about:blank

--- NOT
10 Revision 1 Talk
APPLICABLE ---
--- NOT
25 Integrity, Authentication, Non-repudiation 1 PPT
APPLICABLE ---
--- NOT
10 Summary & Conclusion 2 Chalk
APPLICABLE ---

SESSION NUMBER : 4

Session Outcome: 1 Understand the principles of cryptography and Apply various cryptographic algorithms

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
10 Recap of previous session 1 Talk One minute paper
--- NOT
30 Availability, Access Control, Defence in Depth 2 PPT
APPLICABLE ---
--- NOT
5 Doubts 1 Talk
APPLICABLE ---

SESSION NUMBER : 5

Session Outcome: 1 Understand the principles of cryptography and Apply various cryptographic algorithms

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Chalk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
--- NOT
30 Least privilege, Importance of security in the cloud 2 PPT
APPLICABLE ---
--- NOT
5 Summary & Conclusion 2 Chalk
APPLICABLE ---

SESSION NUMBER : 6

Session Outcome: 1 Understand the principles of cryptography and Apply various cryptographic algorithms

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
25 Importance in PaaS, IaaS and SaaS 2 PPT Case Study
--- NOT
10 Summary& conclusion 1 Chalk
APPLICABLE ---

SESSION NUMBER : 7

Session Outcome: 2 Analyze various security issues and system vulnerabilities in virtualization

about:blank 6/20
12/8/23, 12:08 PM about:blank

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
30 Cryptographic Systems: Symmetric cryptography 2 PPT Focused listing
--- NOT
5 Summary & Conclusion 2 Chalk
APPLICABLE ---

SESSION NUMBER : 8

Session Outcome: 2 Analyze various security issues and system vulnerabilities in virtualization

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
--- NOT
30 Stream ciphers, Block ciphers 2 PPT
APPLICABLE ---
--- NOT
5 Summary & Conclusion 2 Chalk
APPLICABLE ---

SESSION NUMBER : 9

Session Outcome: 2 Analyze various security issues and system vulnerabilities in virtualization

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
--- NOT
30 Modes of operation,Public-key cryptography,Hashing, Digital signatures 2 PPT
APPLICABLE ---
--- NOT
5 Doubts 1 Talk
APPLICABLE ---

SESSION NUMBER : 10

Session Outcome: 2 Analyze various security issues and system vulnerabilities in virtualization

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
10 Recap of previous session 1 Talk One minute paper
--- NOT
30 Public-key infrastructures, Key management. 2 PPT
APPLICABLE ---
--- NOT
5 Doubts 1 Talk
APPLICABLE ---

about:blank 7/20
12/8/23, 12:08 PM about:blank
SESSION NUMBER : 11

Session Outcome: 2 Analyze various security issues and system vulnerabilities in virtualization

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
10 Recap of previous session 1 Talk One minute paper
--- NOT
25 X.509 certificates,OpenSSL. 3 PPT
APPLICABLE ---
--- NOT
10 Summary & Conclusion 3 Chalk
APPLICABLE ---

SESSION NUMBER : 12

Session Outcome: 3 Analyze various security issues and system vulnerabilities in virtualization

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
--- NOT
30 Multi-tenancy Issues:Isolation of users/VMs from each other 2 PPT
APPLICABLE ---
--- NOT
5 Summary & Conclusion 2 Chalk
APPLICABLE ---

SESSION NUMBER : 13

Session Outcome: 3 Analyze the technologies for virtualization based security enhancements

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
Virtualization System Security Issues: e.g. ESX and ESXi Security, ESX
30 3 PPT Role playing
file system security
--- NOT
5 Summary & Conclusion 2 Chalk
APPLICABLE ---

SESSION NUMBER : 14

Session Outcome: 3 Analyze the technologies for virtualization based security enhancements

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---

about:blank 8/20
12/8/23, 12:08 PM about:blank

--- NOT
25 Storage considerations, Backup and recovery 1 PPT
APPLICABLE ---
--- NOT
10 Summary & Conclusion 2 Chalk
APPLICABLE ---

SESSION NUMBER : 15

Session Outcome: 3 Analyze the technologies for virtualization based security enhancements

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
Virtualization System Vulnerabilities: Management console --- NOT
30 3 PPT
vulnerabilities, management server vulnerabilities, APPLICABLE ---
--- NOT
5 Doubts 1 Talk
APPLICABLE ---

SESSION NUMBER : 16

Session Outcome: 3 Analyze the technologies for virtualization based security enhancements

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
Administrative VM vulnerabilities, guest VM vulnerabilities, hypervisor
--- NOT
25 vulnerabilities, hypervisor escape vulnerabilities, configuration issues, 3 PPT
APPLICABLE ---
malware (botnets etc)
--- NOT
10 Doubts 1 Talk
APPLICABLE ---

SESSION NUMBER : 17

Session Outcome: 3 Analyze the technologies for virtualization based security enhancements

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
Virtualization SystemSpecific Attacks: Guest hopping, attacks on the
--- NOT
30 VM (delete the VM, attack on the control of the VM, code or file 3 PPT
APPLICABLE ---
injection into the virtualized file structure)
--- NOT
5 Doubts 1 Talk
APPLICABLE ---

SESSION NUMBER : 18

Session Outcome: 3 Analyze the technologies for virtualization based security enhancements

about:blank 9/20
12/8/23, 12:08 PM about:blank

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
--- NOT
25 VM migration attack,Hyperjacking. 3 PPT
APPLICABLE ---
--- NOT
10 Summary&Conclusion 3 Chalk
APPLICABLE ---

SESSION NUMBER : 19

Session Outcome: 3 Analyze the technologies for virtualization based security enhancements

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
Technologies for Virtualization-Based Security Enhancement: IBM Just in-time
30 3 PPT
security virtual server protection, virtualization-based sandboxing teaching
--- NOT
5 Summary & Conclusion 2 Chalk
APPLICABLE ---

SESSION NUMBER : 20

Session Outcome: 4 Analyze legal and Compliance issues and examine modern security standards

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
Just in-time
25 Storage Security: HIDPS, log management, Data Loss Prevention 3 PPT
teaching
--- NOT
10 Summary & Conclusion 2 Chalk
APPLICABLE ---

SESSION NUMBER : 21

Session Outcome: 4 Analyze legal and Compliance issues and examine modern security standards

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
--- NOT
25 Location of the Perimeter, Legal and Compliance Issues 3 PPT
APPLICABLE ---

about:blank 10/20
12/8/23, 12:08 PM about:blank

--- NOT
10 Doubts 1 Talk
APPLICABLE ---

SESSION NUMBER : 22

Session Outcome: 4 Analyze legal and Compliance issues and examine modern security standards

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
--- NOT
25 Responsibility,ownership of data, right to penetration test 3 PPT
APPLICABLE ---
--- NOT
10 Summary & Conclusion 2 Chalk
APPLICABLE ---

SESSION NUMBER : 23

Session Outcome: 4 Analyze legal and Compliance issues and examine modern security standards

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
Just in-time
25 Local laws, examination of modern Security Standards (eg PCIDSS), 3 PPT
teaching
--- NOT
10 Summary&Conclusion 3 PPT
APPLICABLE ---

SESSION NUMBER : 24

Session Outcome: 4 Analyze legal and Compliance issues and examine modern security standards

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
--- NOT
30 Standards to deal with cloud services and virtualization. 3 PPT
APPLICABLE ---
--- NOT
10 Doubts 1 Talk
APPLICABLE ---

SESSION NUMBER : 25

Session Outcome: 4 Analyze legal and Compliance issues and examine modern security standards

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods

about:blank 11/20
12/8/23, 12:08 PM about:blank

--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
10 Recap of previous session 1 Talk
APPLICABLE ---
--- NOT
25 compliance for the cloud provider vs. compliance for the customer 3 PPT
APPLICABLE ---
--- NOT
10 Doubts 1 Talk
APPLICABLE ---

SESSION NUMBER : 26

Session Outcome: 4 Analyze legal and Compliance issues and examine modern security standards

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
55 Doubts Clearing Session 4 Talk Case Study

Tutorial Course DELIVERY Plan: NO Delivery Plan Exists

Tutorial Session wise Teaching – Learning Plan

No Session Plans Exists

Practical Course DELIVERY Plan:


Tutorial
Session Topics CO-Mapping
no

1 Code and decode the string using Ascii values (Caesar Cipher) CO5

2 Write a program in C for Play fair cipher CO5

3 Block Cipher – Data Encryption standard algorithm CO5

4 Block Cipher – triple Data Encryption standard algorithm. CO5

5 Block Cipher – Advanced Encryption standard algorithm. CO5

6 Stream Cipher – LFSR based algorithm CO5

7 Study the NMAP cryptography tool and prepare a detailed analysis report. CO5

8 Write a C program for Hill Cipher CO5

9 Public Key Cryptosystem – Deffie-Helman Key Exchange. CO5

10 Public Key Cryptosystem – Knapsack Cryptosystem. CO5

11 Write a C program for RSA Algorithm CO5

12 Write a C program for Rail fence Algorithm (Transposition) CO5

Practical Session wise Teaching – Learning Plan


about:blank 12/20
12/8/23, 12:08 PM about:blank
SESSION NUMBER : 1

Session Outcome: 5 Develop and implement various algorithms for encryption and decryption algorithms i.e., AES, MD5 and
RSA algorithms

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
35 Code and decode the string using Ascii values (Caesar Cipher) 3 Talk
APPLICABLE ---
--- NOT
60 Assessment 3 Talk
APPLICABLE ---

SESSION NUMBER : 2

Session Outcome: 5 Develop and implement various algorithms for encryption and decryption algorithms i.e., AES, MD5 and
RSA algorithms

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
35 Write a program in C for Play fair cipher 3 Talk
APPLICABLE ---
--- NOT
60 Assessment 3 Talk
APPLICABLE ---

SESSION NUMBER : 3

Session Outcome: 5 Develop and implement various algorithms for encryption and decryption algorithms i.e., AES, MD5 and
RSA algorithms

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
35 Block Cipher – Data Encryption standard algorithm 3 Talk
APPLICABLE ---
--- NOT
60 Assessment 3 Talk
APPLICABLE ---

SESSION NUMBER : 4

Session Outcome: 5 Develop and implement various algorithms for encryption and decryption algorithms i.e., AES, MD5 and
RSA algorithms

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
35 Block Cipher – triple Data Encryption standard algorithm 3 Talk
APPLICABLE ---
--- NOT
60 Assessment 3 Talk
APPLICABLE ---

about:blank 13/20
12/8/23, 12:08 PM about:blank
SESSION NUMBER : 5

Session Outcome: 5 Develop and implement various algorithms for encryption and decryption algorithms i.e., AES, MD5 and
RSA algorithms

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
35 Block Cipher – Advanced Encryption standard algorithm. 3 Talk
APPLICABLE ---
--- NOT
60 Assessment 3 Talk
APPLICABLE ---

SESSION NUMBER : 6

Session Outcome: 5 Develop and implement various algorithms for encryption and decryption algorithms i.e., AES, MD5 and
RSA algorithms

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
35 Stream Cipher – LFSR based algorithm 3 Talk
APPLICABLE ---
--- NOT
60 Assessment 3 Talk
APPLICABLE ---

SESSION NUMBER : 7

Session Outcome: 5 Develop and implement various algorithms for encryption and decryption algorithms i.e., AES, MD5 and
RSA algorithms

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
Study the NMAP cryptography tool and prepare a detailed analysis --- NOT
35 3 Talk
report. APPLICABLE ---
--- NOT
60 Assessment 3 Talk
APPLICABLE ---

SESSION NUMBER : 8

Session Outcome: 5 Develop and implement various algorithms for encryption and decryption algorithms i.e., AES, MD5 and
RSA algorithms

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
35 Write a C program for Hill Cipher 3 Talk
APPLICABLE ---
--- NOT
60 Assessment 3 Talk
APPLICABLE ---

about:blank 14/20
12/8/23, 12:08 PM about:blank
SESSION NUMBER : 9

Session Outcome: 5 Develop and implement various algorithms for encryption and decryption algorithms i.e., AES, MD5 and
RSA algorithms

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
35 Public Key Cryptosystem – Deffie-Helman Key Exchange. 3 Talk
APPLICABLE ---
--- NOT
60 Assessment 3 Talk
APPLICABLE ---

SESSION NUMBER : 10

Session Outcome: 5 Analyze legal and Compliance issues and examine modern security standards

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
35 Public Key Cryptosystem – Knapsack Cryptosystem. 3 Talk
APPLICABLE ---
--- NOT
60 Assessment 3 Talk
APPLICABLE ---

SESSION NUMBER : 11

Session Outcome: 5 Analyze the technologies for virtualization based security enhancements

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
35 Write a C program for RSA Algorithm 3 Talk
APPLICABLE ---
--- NOT
60 Assessment 3 Talk
APPLICABLE ---

SESSION NUMBER : 12

Session Outcome: 5 Analyze various security issues and system vulnerabilities in virtualization

Teaching-
Active Learning
Time(min) Topic BTL Learning
Methods
Methods
--- NOT
5 Attendance 1 Talk
APPLICABLE ---
--- NOT
35 Write a C program for Rail fence Algorithm (Transposition) 3 Talk
APPLICABLE ---
--- NOT
60 Assessment 3 Talk
APPLICABLE ---

Skilling Course DELIVERY Plan: NO Delivery Plan Exists

about:blank 15/20
12/8/23, 12:08 PM about:blank
Skilling Session wise Teaching – Learning Plan

No Session Plans Exists

WEEKLY HOMEWORK ASSIGNMENTS/ PROBLEM SETS/OPEN ENDEDED PROBLEM-SOLVING EXERCISES etc:

Assignment Assignment
Week Topic Details co
Type No

COURSE TIME TABLE:

Hour 1 2 3 4 5 6 7 8 9
Day Component
- - - - -
V-S31,V-S32,V-S33,V- V-S31,V-S32,V-S33,V-
Theory - - --- --- - - -
S34 S34
- - - - -
- - - - -
Tutorial - - --- --- -- -- - - -
- - - - -
Mon
- - - - -
Lab - - --- --- -- -- - - -
- - - - -
- - - - -
Skilling - - --- --- -- -- - - -
- - - - -
- - - - -
Theory - - -- -- --- --- - - -
- - - - -
- - - - -
Tutorial - - -- -- --- --- - - -
- - - - -
Tue V-S31,V-S31,V-S31,V- V-S31,V-S31,V-S31,V-
- - - - -
S32,V-S32,V-S32,V- S32,V-S32,V-S32,V-
Lab - - --- --- - - -
S33,V-S33,V-S33,V- S33,V-S33,V-S33,V-
- - - - -
S34,V-S34,V-S34 S34,V-S34,V-S34
- - - - -
Skilling - - -- -- --- --- - - -
- - - - -
- - - - -
Theory -- -- -- --
- - - - -
- - - - -
Tutorial -- -- -- --
- - - - -
Wed
- - - - -
Lab -- -- -- --
- - - - -
- - - - -
Skilling -- -- -- --
- - - - -
- - - - -
Theory -- -- -- --
- - - - -
- - - - -
Tutorial -- -- -- --
- - - - -
Thu
- - - - -
Lab -- -- -- --
- - - - -
- - - - -
Skilling -- -- -- --
- - - - -
Fri Theory - - --- --- V-S21,V-S22,V-S23 V-S21,V-S22,V-S23 - - -
- - - - -
about:blank 16/20
12/8/23, 12:08 PM about:blank
- - - - -
- - - - -
Tutorial - - --- --- -- -- - - -
- - - - -
V-S24,V-S24,V-S24,V- V-S24,V-S24,V-S24,V-
- - - - -
S25,V-S25,V-S25,V- S25,V-S25,V-S25,V-
Lab - - --- --- - - -
S26,V-S26,V-S26,V- S26,V-S26,V-S26,V-
- - - - -
S27,V-S27,V-S27 S27,V-S27,V-S27
- - - - -
Skilling - - --- --- -- -- - - -
- - - - -
- - - - -
V-S24,V-S25,V-S26,V- V-S24,V-S25,V-S26,V-
Theory - - --- --- - - -
S27 S27
- - - - -
- - - - -
Tutorial - - -- -- --- --- - - -
- - - - -
Sat
- - V-S21,V-S21,V-S21,V- V-S21,V-S21,V-S21,V- - - -
Lab - - S22,V-S22,V-S22,V- S22,V-S22,V-S22,V- --- --- - - -
- - S23,V-S23,V-S23 S23,V-S23,V-S23 - - -
- - - - -
Skilling - - -- -- --- --- - - -
- - - - -
- - - - -
Theory -- -- -- --
- - - - -
- - - - -
Tutorial -- -- -- --
- - - - -
Sun
- - - - -
Lab -- -- -- --
- - - - -
- - - - -
Skilling -- -- -- --
- - - - -

REMEDIAL CLASSES:

Supplement course handout, which may perhaps include special lectures and discussions that would be planned, and schedule
notified according

SELF-LEARNING:

Assignments to promote self-learning, survey of contents from multiple sources.


S.no Topics CO ALM References/MOOCS

DELIVERY DETAILS OF CONTENT BEYOND SYLLABUS:

Content beyond syllabus covered (if any) should be delivered to all students that would be planned, and schedule notified
accordingly.
Advanced Topics, Additional Reading, Research papers and
S.no CO ALM References/MOOCS
any

EVALUATION PLAN:

Evaluation Assessment Duration


Evaluation Component Weightage/Marks CO1 CO2 CO3 CO4 CO5
Type Dates (Hours)

about:blank 17/20
12/8/23, 12:08 PM about:blank

End Semester End Semester Exam Weightage 30 7.5 7.5 7.5 7.5
180
Summative Max Marks 100 25 25 25 25
Evaluation Weightage 10 10
Total= 40 % Lab End Semester Exam Max Marks 50
100
50
Weightage 5 1.25 1.25 1.25 1.25
MOOCs Review 60
Max Marks 40 10 10 10 10
In Semester Weightage 5 1.25 1.25 1.25 1.25
ALM 60
Formative Max Marks 40 10 10 10 10
Evaluation Home Assignment and Weightage 5 1.25 1.25 1.25 1.25
Total= 25 % 60
Textbook Max Marks 40 10 10 10 10
Continuous Evaluation - Weightage 10 10
100
Lab Exercise Max Marks 50 50
Weightage 10 5 5
Semester in Exam-I 90
Max Marks 50 25 25
In Semester Weightage 10 5 5
Semester in Exam-II 90
Summative Max Marks 50 25 25
Evaluation Weightage 10 10
Total= 35 % Lab In Semester Exam 100
Max Marks 50 50
Weightage 5 1.25 1.25 1.25 1.25
MOOCs Certification 60
Max Marks 40 10 10 10 10

ATTENDANCE POLICY:

Every student is expected to be responsible for regularity of his/her attendance in class rooms and laboratories, to appear in
scheduled tests and examinations and fulfill all other tasks assigned to him/her in every course
In every course, student has to maintain a minimum of 85% attendance to be eligible for appearing in Semester end examination of
the course, for cases of medical issues and other unavoidable circumstances the students will be condoned if their attendance is
between 75% to 85% in every course, subjected to submission of medical certificates, medical case file and other needful
documental proof to the concerned departments

DETENTION POLICY :

In any course, a student has to maintain a minimum of 85% attendance and In-Semester Examinations to be eligible for appearing
to the Semester End Examination, failing to fulfill these conditions will deem such student to have been detained in that course.

PLAGIARISM POLICY :

Supplement course handout, which may perhaps include special lectures and discussions

COURSE TEAM MEMBERS, CHAMBER CONSULTATION HOURS AND CHAMBER VENUE DETAILS:

Supplement course handout, which may perhaps include special lectures and discussions
Chamber
Delivery Chamber Chamber Signature of
Sections Consultation
Name of Faculty Component of Consultation Consultation Course
of Faculty Timings for each
Faculty Day (s) Room No: faculty:
day
Srikanth Vemuru P 22-B - - - -
Pavan Kumar
P 21-C - - - -
Thummala
Ruth Ramya Kalangi P 34-C - - - -
Ramaiah Challa L 22-MA - - - -
Ramaiah Challa P 22-A - - - -
Arumugham Roshini P 33-B - - - -

about:blank 18/20
12/8/23, 12:08 PM about:blank

Jalaluddin Khan P 26-B - - - -


27-
Yogesh Sharma L MA,34- - - - -
MA
Yogesh Sharma P 34-A,27-A - - - -
Riaz Shaik P 21-B - - - -
Arpit Jain P 25-B - - - -
33-
Ravi Rastogi L MA,26- - - - -
MA
Ravi Rastogi P 33-A,26-A - - - -
Nyakapu Rajender P 24-C,34-B - - - -
Sri Latha P 27-C - - - -
Saikat Samanta P 23-C - - - -
Srinvas Palvadi P 31-B - - - -
YALLAMANDA
P 22-C - - - -
RAJESH BABU
31-
Sameer Bhat L MA,24- - - - -
MA
Sameer Bhat P 31-A,24-A - - - -
DESETTI TULASI L 23-MA - - - -
DESETTI TULASI P 23-A - - - -
DASARI SAILAJA P 33-C - - - -
21-
DASARI KUMAR L MA,32- - - - -
MA
DASARI KUMAR P 21-A,32-A - - - -
BALASUBRAMANI S P 32-B - - - -
Bhabendu Mohanta P 23-B - - - -
Rayees Laway P 31-C,26-C - - - -
Gurusamy Murugesan P 25-C - - - -
Nagaraju
L 25-MA - - - -
TUMIKIPALLI
Nagaraju
P 25-A - - - -
TUMIKIPALLI
Madabattula Kumar P 27-B - - - -
Jacob Ganta P 24-B,32-C - - - -

GENERAL INSTRUCTIONS

Students should come prepared for classes and carry the text book(s) or material(s) as prescribed by the Course Faculty to the
class.

NOTICES

Most of the notices are available on the LMS platform.

All notices will be communicated through the institution email.

All notices concerning the course will be displayed on the respective Notice Boards.

Signature of COURSE COORDINATOR

about:blank 19/20
12/8/23, 12:08 PM about:blank
(DASARI VINAY KUMAR)

Signature of Department Prof. Incharge Academics & Vetting Team Member

Department Of CSE-Honors

HEAD OF DEPARTMENT:

Approval from: DEAN-ACADEMICS


(Sign with Office Seal) [object HTMLDivElement]

about:blank 20/20

You might also like