0% found this document useful (0 votes)
12 views107 pages

B.SC - Computer Science With Cyber Security

The document outlines the syllabus for the B.Sc in Computer Science (Cyber Security) under the Choice Based Credit System (CBCS) effective from the academic year 2023-2024. It details the program's objectives, graduate attributes, admission criteria, course structure, examination patterns, and evaluation methods. The program aims to equip graduates with theoretical knowledge and practical skills for careers in the IT industry, emphasizing cyber security and problem-solving abilities.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views107 pages

B.SC - Computer Science With Cyber Security

The document outlines the syllabus for the B.Sc in Computer Science (Cyber Security) under the Choice Based Credit System (CBCS) effective from the academic year 2023-2024. It details the program's objectives, graduate attributes, admission criteria, course structure, examination patterns, and evaluation methods. The program aims to equip graduates with theoretical knowledge and practical skills for careers in the IT industry, emphasizing cyber security and problem-solving abilities.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 107

B.

Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

PERIYAR UNIVERSITY
PERIYAR PALKALAI NAGAR

SALEM – 636011

B.SC. COMPUTER SCIENCE


(CYBER SECURITY)

CHOICE BASED CREDIT SYSTEM

OBE REGULATIONS AND SYLLABUS

(SEMESTER PATTERN)

(For Candidates admitted in the Colleges affiliated to Periyar University from 2023-2024 onwards)
1
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Outcome Based Education (OBE) REGULATIONS AND SYLLABUS

(With effect from the academic year 2023-2024 onwards)

1. PREAMBLE

The programme prepares under Graduates in Computer Science with strong theoretical inputs
and practical knowledge, who can be employed in industries. The programme develops requisite
professional skills and problem solving abilities to pursue a successful career in software
industry and for pursuing higher studies in Computer Science.

2. GRADUATE ATTRIBUTES
1. Computational Knowledge
2. Problem Analysis & Solving
3. Design & Development of Solutions
4. Modern Tool Usage
5. Communication skills
6. Innovation & Entrepreneurship
7. Societal & Environmental concern

3. PROGRAMME SPECIFIC QUALIFICATION ATTRIBUTES


The programme specific qualification attributes meant to be achieved through subjects in the
programme in terms of
1. Knowledge and understanding level (K1 and K2)
2. Application level (K3)
3. Analytical level (K4)
4. Evaluation capability level (K5)
5. Scientific or Synthesis level (K6)

4. FOR ADMISSION

A candidate who has passed in Higher Secondary Examination with Mathematics or Business
Mathematics or Computer Science or Statistics (Academic stream or Vocational stream) as one
of the subject under Board of Higher Secondary Examination, Tamil Nadu as per the norms set
by the Government of Tamil Nadu or an Examination accepted as equivalent thereto by the
syndicate, subject to such other conditions as may be prescribed , are permitted to appear and
qualify for the Bachelor of Science in Computer Science degree examination of this university,
after a programme of study of three academic years.

2
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

5. PROGRAMME OBJECTIVES AND OUTCOMES

➢ Programme Educational Objectives (PEOs)

PEO1: Graduates are prepared to be employed in IT industries by providing expected domain


Knowledge.

PEO2: Graduates are provided with practical training, hands-on and project experience to meet the
industrial needs.

PEO3: Graduates are motivated in career and entrepreneurial skill development to become global
leaders.

PEO4: Graduates are trained to demonstrate creativity, to develop innovative ideas and to work in
teams to accomplish a common goal.

PEO5: Graduates are trained to address social issues and guided to approach problems with
solutions.

➢ Programme Specific Outcomes(PSOs)

After completion of the programme the graduates will be able

PSO1: To understand the fundamental concepts of computer system in cyber space, including
cloud.

PSO2: To Design, and analyze precise specifications of algorithms, procedures, and interaction
behavior.

PSO3: To communicate effectively in both verbal and written form in industry and society.

PSO4: To create and apply the cyber security tools in various fields of Computer Science,
including Mobile applications, Web development and management, databases, and computer
networks.

PSO5. Use emerging technologies for providing security and privacy to design, deployand manage
networks.

➢ Programme Outcomes(POs)

After completion of the programme, the graduates will be able


PO1: To understand the fundamental concepts of cyber security.
PO2: To Design and analyze precise specifications of algorithms and interaction behavior.
PO3: To analyze impacts of computing on individuals, organization and society.
PO4: To apply the appropriate technologies, skills and tools in various fields of Computer Science.

3
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

6. DURATION OF THE PROGRAMME


The programme shall extend over a period of three years comprising six semesters with two
semesters in one academic year. There shall not be less than 90 working days for each semester.
Examination shall be conducted at the end of every semester for the respective subjects.
7. COURSE OF STUDY
The programme of study shall comprise instruction in the following subjects according to the
syllabus and books prescribed from time to time. The syllabus for various subjects shall be
clearly demarcated into five units in each subject. Part -I, Part-II, Part- III, Part -IV and Part-V
subjects are prescribed in the scheme of examination. The Extension Activities are a must for
each student to take part at least in any one of the activities such as NSS, YRC, SPORTS and
RRC for the fulfillment of the degree.
8. EXAMINATIONS
The theory examination shall be three hour duration for each paper at the end of every semester.
The candidate failing in any subject(s) will be permitted to appear in the subsequent
examination. The practical examinations for core subjects and SBEC should be conducted at the
end of the every semester.

Submission of record note books for practical examinations


Candidates appearing for practical examinations should submit bonafide Record note books
prescribed for practical examinations, Otherwise the candidates will not be permitted to appear
for the practical examinations. However, in genuine cases of the students who could not submit
the record note books, they may be permitted to appear for the practical examinations, provided
the concerned Head of the Department certify that the candidate has performed the experiments
prescribed for the course. For such candidates zero (0) marks will be awarded for record note
books.

9. Revision of Regulations and Curriculum


The University may revise/amend/ change the Regulations and Scheme of Examinations, as and
when found necessary.
10. PASSING MINIMUM
(a) Theory
The candidate shall be declared to have passed the examination if the candidate secures not
less than 40 marks put together out of 100 marks (CIA+EA). Minimum 40% should be
secured (30 out of 75) in EA of each theory subject.

4
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

(b) Practical / Project viva voce


The candidate shall be declared to have passed the examination if the candidate secures not
less than 40marks put together out of 100 marks (CIA + EA). Minimum 40% should be
secured (24 out of 60) in EA of each Practical subject.

11. Marks Distribution and Question Paper Pattern for B.Sc.,

11.1 Theory –Marks Distribution

Maximum Marks : 100 Marks


External [EA] : 75 Marks
Internal [CIA] : 25 Marks

(a) Theory - Question Paper Pattern [External] (Total Marks: 75)

Section Approaches Mark Pattern

One word (Answer all questions &Three questions from 15X1 = 15 (Multiple
A
each unit) Choice Questions)

100 to 200 words (Answer any Two out of five questions 2X5 = 10 (Analytical type
B
& One question from each unit) questions)

500 to 1000 words(Answer ALL questions & One 5X10 = 50 (Essay type
C
question from each unit with Internal Choice) questions)

(b) Theory - Internal Marks Distribution (Total Marks: 25)

Attendance : 5 Marks

Assignment : 5 Marks

Test : 15 Marks

5
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

11.2. Practical – Marks Distribution

Maximum Marks : 100 Marks

External [EA] : 60 Marks

Internal [CIA] : 40 Marks

(a) Practical-External marks distribution ( Total Marks :60 )


For each practical question the marks should be awarded as follows (External)
i) Algorithm/flowchart - 20%

ii) Writing the program in the main answer book - 30%

iii) Test and debug the program - 30%

iv) Printing the correct output - 20%

(Marks may be proportionately reduced for the errors committed in each of the above)

Practical Question Paper Pattern


Student should attend two questions (either / or pattern)
Note:

(i) Practical I to Practical VII and SBEC Practical have the same pattern

(ii) Core and SBEC Practical Examination must be conducted at the end of every Semester

(b). Practical - Internal Marks Distribution (Total Marks: 40)

 Record : 15 Marks
 Internal Practical examinations : 25 Marks

11.3 Project Evaluation:

Continuous Internal Assessment : 40 Marks

Evaluation (External) : 40 Marks

Viva-voce (jointly) : 20 Marks

12. COMMENCEMENT OF THIS REGULATION:

These regulations shall take effect from the academic year 2023-2024, i.e, for students who
are to be admitted to the first year of the programme during the academic year 2023-2024 and
thereafter.

6
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Scheme of Examinations from the Academic Year 2023-2024


Credit Distribution as per the University Norms.

Total
SEMESTER I II III IV V VI
Credits

PART – I 3 3 3 3 - - 12

PART – II 3 3 3 3 - - 12

ALLIED 4 6 4 6 - - 20

CORE THEORY 5 10 9 4 12 5 45

CORE PRATICAL 2 2 2 2 4 8 20

ELECTIVE - - - - 5 10 15

SBEC - - 3 - 3 3 9

NMEC - - 2 2 - - 4

EVS - - - - - - -

VALUE EDUCATION 2 - - - - - 2

ADD-ON COURSE - - - - - - -

EXTENSION ACTIVITY - - - - - 1 1

PROFESSIONAL
ENGLISHPHYSICAL 4 4 - - - - 8
SCIENCE

Cumulative Total Credits 23 28 26 20 24 27 148

7
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

COURSE OF STUDY AND SCHEME OF EXAMINATION

S P HR CRE MARKS
E A DIT
M R SUB CODE TITLE OF THE SUBJECT
Lect. Lab CI EA TOTAL
T
A

SEMESTER - I

I 23UFTA01 Language I 6 - 3 25 75 100


II 23UENC01 Communicative English I 6 - 3 25 75 100
III 23UCYS01 Core I: Data Structure and Algorithms 6 - 5 25 75 100
III 23UCYSP01 Practical I: Data Structure Using C - 3 2 40 60 100
III Allied I 7 - 4 25 75 100
I IV 23UVE01 Value Education 2 - 2 25 75 100
IV 23UPES01 Professional English - Physical 4 - 4 25 75 100
Science I

Total 31 3 23 190 510 700

SEMESTER - II

I 23UFTA02 Language II 6 - 3 25 75 100


II 23UENC02 Communicative English II 4 - 3 25 75 100
III 23UCYS02 Core II : Relational Database 3 - 5 25 75 100
Management Systems
III 23UCYSP02 Practical II : SQL and PL / SQL - 3 2 40 60 100
III 23UCYS03 Core III: Essentials of Cyber Security 4 - 5 25 75 100
III Allied II 5 - 4 25 75 100
II III Allied – Practical - 2 2 40 60 100
IV 23UES01 Environmental Studies 1 - - 25 75 100
IV 23UPES01 Professional English- Physical 4 - 4 25 75 100
Science II
23NMSDC01 NMSDC I 2

Total 29 5 28 255 645 900

SEMESTER - III

I 23UFTA03 Language – III 6 - 3 25 75 100


II 23UFEN03 Foundation English – III 6 - 3 25 75 100
III 23UCYS04 Core IV: Programming in Java 3 - 5 25 75 100
III 23UCYSP03 Practical III: Java programming - 2 2 40 60 100
III 23UCYS05 Core V: Computer Network 3 - 4 25 75 100
III Allied III 6 - 4 25 75 10
III III Allied -Practical - - - - - -
IV 23UCYSSP01 SBEC-I : Network Lab - 2 3 40 60 100
IV Non -Major Elective Course – I 2 - 2 25 75 100

Total 26 4 26 230 570 800

8
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

HR CRE MARKS
PART DIT
SEM

SUB CODE TITLE OF THE SUBJECT


Lect Lab CI EA TOTAL
A

SEMESTER - IV

I 23UFTA04 Tamil – IV 6 3 25 75 100


II 23UFEN04 Foundation English – IV 4 - 3 25 75 100
III 23UCYS06 Core VI : Tools & Techniques for 4 - 4 25 75 100
Cyber Security
III 23UCYSP04 Practical IV: Cyber Security Lab - 3 2 40 60 100
using JAVA
III Allied IV 5 - 4 25 75 100
IV III Allied -Practical Lab - 2 2 40 60 100
IV Non -Major Elective – II 2 - 2 25 75 100
Add-on Add-on Course Internship Programme - - - - - -
23NMSDC02 NMSDC II : Digital Skills for Office 2
Fundamentals

Total 23 7 23 245 555 800

SEMESTER - V

III 23UCYS07 Core VII: Operating Systems 5 - 4 25 75 100


III 23UCYS08 Core VIII: Web Technology 5 - 4 25 75 100
III 23UCYSP05 Practical V : Web Technology Lab - 3 2 40 60 100
III 23UCYS09 Core IX: Ethical Hacking & Cyber 5 - 5 25 75 100
Security
III 23UCYSP06 Practical VI : Ethical Hacking Lab - 4 2 40 60 100
V III 23UCYSE01 Elective – I 5 - 4 25 75 100
/02/03
IV 23UCYSSP02 SBEC II-Mobile Application - 3 3 40 60 100
Development Lab

Total 20 10 24 220 480 700

SEMESTER - VI

III 23UCYS10 Core X: Programming in Python 6 - 5 25 75 100


III 23UCYSP07 Practical VII : Python Programming - 4 3 40 60 100
III 23UCYSPR01 Project - 5 5 40 60 100
III 23UCYSE04 Elective-II 5 - 5 25 75 100
/05/06
III 23UCYSE07 Elective-III 5 - 5 25 75 100
VI /08/09
IV 23UCYS01 SBEC III- Social Media & Security 3 - 3 25 75 100
V 23UCYSEX01 Extension Activities - - 1 - - -
23NMSDC03 NMSDC II 2

Total 21 9 27 180 420 600

9
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

ELECTIVE SUBJECTS

Elective – I

Sem Part Subject Code Subject

23UCYSE01 Open Source Computing

23UCYSE02 Digital Forensics


V III

23UCYSE03 E-Commerce & Digital Payment

Elective – II

Sem Part Subject Code Subject

23UCYSE04 Mobile Computing

23UCYSE05 Wireless Network


VI III

23UCYSE06 Cyber Crime & Law

Elective – III

Sem Part Subject Code Subject

23UCYSE07 Cryptography

23UCYSE08 Network Security


VI III

23UCYSE09 Software Engineering

10
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Allied Subjects for any Degree offered by the Department


of Computer Science ( Cyber Security)
SYLLABUS - CBCS PATTERN
EFFECTIVE FROM THE ACADEMIC YEAR 2023-2024

All subjects should be handled and valued by Department of Computer Science only. For
University practical examinations both Internal and External examiners should be appointed
from Department of Computer Science.
FIRST OPTION (Allied Computer Science)

First Year / Second Year (Select any one of the Subject with Practical)

Hrs. MARKS
PART SEMESTER TITLE OF THE SUBJECT CRE
Lect. Lab DIT CIA EA TOTAL
III I /III Allied Paper – I
23UCSA01 Fundamental of Computers - 4 25 75 100
7
II/IV Allied Paper – II
Computer Applications in Office
23UCSA02 5 - 4 25 75 100

23UCSAP01 Allied Practical


- 2 2 40 60 100
Office Automation

SECOND OPTION (Allied Computer Science)

First Year / Second Year (Select any one of the Subject with Practical)

Hrs. CRE MARKS


PART SEMESTER TITLE OF THE SUBJECT
DIT TOTA
Lect. Lab CIA EA L

III I /III Allied Paper – I


23UCSA03 Database Systems 7 - 4 25 75 100

II/IV Allied Paper – II


E-Commerce Techniques
23UCSA04 5 - 4 25 75 100

23UCSAP02 Allied Practical


HTML Programming - 2 2 40 60 100

11
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

THIRD OPTION (Allied Computer Science)

First Year / Second Year (Select any one of the Subject with Practical)

Hrs. CRE MARKS


PART SEMESTER TITLE OF THE SUBJECT
DIT TOTA
Lect. Lab CIA EA L

III I /III Allied Paper – I


23UCSA05 Programming in C 7 - 4 25 75 100

II /IV Allied Paper – II


Programming in Visual Basic 5 - 4 25 75 100
23UCSA06

Allied Practical – II
23UCSAP03 Programming in C & Visual Basic Practical - 2 2 40 60 100

12
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Allied Subjects for Computer Science/Computer


Science (Cyber Security)/Information Science /BCA/

SYLLABUS - CBCS PATTERN


EFFECTIVE FROM THE ACADEMIC YEAR 2023-2024

FIRST OPTION
First Year / Second Year (Select any one of the Subject with Practical)

Hrs. CRE MARKS


PART SEMESTER TITLE OF THE SUBJECT
DIT
Lect. Lab CIA EA TOTAL

III I /III Allied Paper – I


Statistical Methods and their Applications I 7 - 4 25 75 100

II/IV Allied Paper – II


Statistical Methods and their Applications II
5 - 4 25 75 100

Allied Practical
Statistical Practical - 2 2 40 60 100

SECOND OPTION
First Year / Second Year (Select any one of the Subject with Practical)

Hrs. CRE MARKS


PART SEMESTER TITLE OF THE SUBJECT
DIT
Lect. Lab CIA EA TOTAL

III I /III Allied Paper –I


Principles of Accounting 7 - 4 25 75 100

Allied Paper II
II/IV Cost and Management Accounting
5 - 4 25 75 100

Allied Practical
- 2 2 40 60 100

13
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

THIRD OPTION
First Year / Second Year (Select any one of the Subject with Practical)

Hrs. CRE MARKS


PART SEMESTER TITLE OF THE SUBJECT
DIT
Lect. Lab CIA EA TOTAL
III I /III Allied Mathematics Paper – I
7 - 4 25 75 100

II/IV Allied Mathematics Paper – II


5 - 4 25 75 100

Allied Mathematics Practical - 2 2 40 60 100

FOURTH OPTION
First Year / Second Year (Select any one of the Subject with Practical)

Hrs. CRE MARKS


PART SEMESTER TITLE OF THE SUBJECT
DIT
Lect. Lab CIA EA TOTAL

III I /III Allied Physics Paper –I


7 - 4 25 75 100

Allied Physics Paper II


II/IV
5 - 4 25 75 100

Allied Physics Practical


- 2 2 40 60 100

FIFTH OPTION
First Year / Second Year (Select any one of the Subject with Practical)

Hrs. CRE MARKS


PART SEMESTER TITLE OF THE SUBJECT
DIT
Lect. Lab CIA EA TOTAL

III I /III Allied Electronics Paper –I


7 - 4 25 75 100

Allied Electronics Paper II


II/IV
5 - 4 25 75 100

Allied Electronics Practical


- 2 2 40 60 100

14
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Subject Title DATA STRUCTURES AND ALGORITHMS Semester I

Subject Code 23UCYS01 Specialization NA

Type Core: Theory L:T:P:C 86:6:0:5

COURSE OBJECTIVE:

1. Understand the basic concept of algorithms.


2. To introduce the various data structures and their implementations.
3. Evaluate the performance of various sorting algorithms

CO CO Statement Knowledge
Number Level

CO1 Remember the concept of algorithms. K1

CO2 Understanding the stack and queues. K2

CO3 Apply linked list for other data structures. K2, K3

CO4 Evaluate the trees and sorting methods. K3,K4

CO5 Analyze the sorting and file organizations. K5

15
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Subject
Title DATA STRUCTURES AND ALGORITHMS Semester I

Subject 23UCYS01
Code Specialization NA

Type Core: Theory L:T:P:C 86:6:0:5

Unit Contents Levels Sessions

Introduction of algorithms, analyzing algorithms, Arrays : Representation of K1 8


I Arrays, Implementation of Stacks and queues, Application of Stack:
Evaluation of Expression - Infix to postfix Conversion - Multiple stacks and
Queues, Sparse Matrices.

Linked list : Singly Linked list - Linked stacks and queues - polynomial K2 8
II addition - More on linked Lists - Doubly linked List and Dynamic Storage
Management - Garbage collection and compaction.

Trees: Basic Terminology - Binary Trees - Binary Tree representations - K2,K3 8


Binary trees - Traversal - More on Binary Trees - Threaded Binary trees -
III counting Binary trees. Graphs: Terminology and Representations - Traversals,
connected components and spanning Trees, Single Source Shortest path
problem.

Symbol Tables : Static Tree Tables - Dynamic Tree Tables - Hash Tables K3,K4 10
IV Hashing Functions - overflow Handling. External sorting : Storage Devices -
sorting with Disks : K-way merging - sorting with tapes.

Internal sorting : Insertion sort - Quick sort - 2 way Merge sort - Heap sort - K5 11
V shell sort - sorting on keys. Files: Files, Queries and sequential organizations -
Index Techniques - File organization

Learning Resources

Text 1. Ellis Horowitz, Sartaj Shani, Fundamentals of Data Structures, Galgotia publication.
Books

16
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

1. Data structures Using C Aaron M. Tenenbaum, Yedidyah Langsam, Moshe


Reference J.Augenstein, Kindersley (India) Pvt. Ltd.,
Books 2. Data structure and Algorithms, Alfred V. Aho, John E. Hopcroft, Jeffrey D. Ullman, Pearson
Education Pvt. Ltd.,

1. www.freetechbooks.com/a-practical-introduction-to-data-structures-and algorithm-analysis-
thirdedition-c-version-t804.html
Website/
2. http://www.nptel.ac.in/courses/106101060/
Link
3. http://www.nptel.ac.in/courses/106104019/

Mapping with Programme Outcomes

CO Number PO1 PO2 PO3 PO4

CO1 S S S -

CO2 S M M S

CO3 S L L M

CO4 M S M S

CO5 S L S S

S- Strong , M- Medium , L – Low

17
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Subject
Title PRACTICAL I : DATA STRUCTURES USING C
Semester I

Subject 23UCYSP01
Specialization NA
Code

Type Core: Practical


L:T:P:C 45:0:3:2

COURSE OBJECTIVE:
1. To impart Practical Training in C Programming Language.
2. Understanding the data structures stack and queues.
3. Apply linked list for other data structures.
4. Analyze the sorting and file organizations.
LIST OF PROGRAMS:
1. Write a C program to create two array list of integers. Sort and store the elements of both of them in third list.
2. Write a C program to multiply two matrices A and B and store the resultant matrix in C using arrays.
3. Write a C program to experiment the operation of STACK using array.
4. Write a C program to create menu driven options to implement QUEUE to perform the following
(i) Insertion (ii) Deletion (iii) Modification (iv) Listing of elements
5. Write a C program to create Linked list representations of employee records and do the following operations
using pointers.
I. To add a new record.
II. To delete an existing record.
III. To print the details about an employee.
IV. To find the number of employees in the structure.

6. Write a C Program to count the total nodes of the linked list and to insert an element at the end of the linked
list.
7. Write a C program to insert an element at the beginning of a doubly linked list.
8. Write a C program to display the hash table, using the mid square method.
9. Write a C program to traverse the given binary tree using all traversal methods.
10. Write a C program to insert an element in a binary tree

COURSE OUTCOME:
1. Study all the Basic operation of matrices and stack.
2. Practice the usage of branching and looping statements in hash table.
3. Apply arrays for stack and queue.
4. Analysis the use of pointers for linked list, doubly linked list and tree traverse.

18
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Subject Title RELATIONAL DATABASE Semester II


MANAGEMENT SYSTEMS

Subject Code 23UCYS02 Specialization NA

Type Core: Theory L:T:P:C 41:3:0:5

COURSE OBJECTIVE:

1. Understand the basic concept of Data Base and database management system.
2. Understand and apply the SQL fundamentals.
3. Evaluate the Relational database design

CO CO Statement Knowledge
Number Level

CO1 Remember the concept of database K1

CO2 Understanding the data models and ER Diagram. K2

CO3 CO3 Apply SQL commands. K2, K3

CO4 Evaluate the DBMS in SQL. K3,K4

CO5 Analyze the Transaction management K5

19
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Subject RELATIONAL DATABASE


Title MANAGEMENT SYSTEMS Semester II

Subject 23UCYS02 Specialization


Code NA

Type Core: Theory L:T:P:C 41:3:0:5

Unit Contents Levels Sessions

Introduction: Database System Applications-Purpose of Database Systems-


View of Data-Database Languages Transaction Management-Database
Architecture-Database users and Administrators.
I K1 10
Relational Model: Structure of Relational Databases – Database Design – ER
Model-Overview of the Design Process – The Entity – relationship Model –
Constraints – Entity Relationship Diagrams.

Relational Algebra Operations –Relational Languages: The Tuple Relational


Calculus –The Domain Relational Calculus – SQL: Background – Data
II Definition – Basic Structure of SQL Queries – Set Operations – Aggregate K2 7
Functions – Null Values – Nested Sub-Queries – Views – Modification of the
Database.

Data Normalization: Pitfalls in Relational Database Design – Decomposition –


Functional Dependencies – Normalization – First Normal Form – Second
Normal Form – Third Normal Form – Boyce-Codd Normal Form – Fourth
III K2,K3 8
Normal Form – Fifth Normal Form – Denormalization – Database Security:
Data Security Requirements – Protecting the Data within the Database –
Granting and Revoking Privileges – Data Encryption.

PL/SQL: A programming Language: History - Fundamentals – Block


Structure – Comments – Data Types – Other Data Types – Declaration –
Assignment operation – Bind variables – Substitution Variables – Printing –
Arithmetic Operators. Control Structures and Embedded SQL: Control
IV Structures – Nested Blocks – SQL IN PL/SQL – Data Manipulation K3,K4 8
Transaction Control statements. PL/SQL Cursors and Exceptions: Cursors –
Implicit & Explicit Cursors and Attributes – Cursor FOR loops –
SELECT...FOR UPDATE – WHERE CURRENT OF clause – Cursor with
Parameters – Cursor Variables – Exceptions – Types of Exceptions

PL/SQL Composite Data Types: Records – Tables – V arrays. Named Blocks:


V Procedures – Functions – Packages - Triggers – Data Dictionary Views. K5 8

20
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Learning Resources

1. ―Database System Conceptsǁ,Abraham Silberschatz, Henry F.Korth, S.Sudarshan, TMH 5th


Edition (Units – I,II)
Text 2. ―Fundamentals of Database Management Systemsǁ, Alexis Leon, Mathews Leon, Vijay Nicole
Books Imprints Private Limited. (Unit-III)
3. ―Database Systems Using Oracleǁ Nilesh Shah,2nd edition,PHI.UNIT-IV: Chapters 10 & 11
UNIT-V:Chapters 12,13 & 14

Reference 1. Alexix Leon & Mathews Leon, "Essential of DBMS", 2nd reprint, Vijay Nicole Publications,
Books 2009

● https://www.w3schools.com/sql
Website/ ● https://www.tutorialspoint.com/sql
Link ● https://livesql.oracle.com

Mapping with Programme Outcomes

CO Number PO1 PO2 PO3 PO4

CO1 S S S -

CO2 S M M S

CO3 S L L M

CO4 M S M S

CO5 S L S S

S- Strong , M- Medium , L – Low

21
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Subject
Title PRACTICAL II – SQL and PL/SQL
Semester II

Subject 23UCYSP02
Specialization NA
Code

Type Core: Practical L:T:P:C 30:0:2:2

COURSE OBJECTIVE:
1. To impart Practical Training in DDL Commands.
2. Familiarize the different DML Commands.
3. Build queries with SQL Commands.
4. Provide knowledge on working with big tables.
LIST OF PROGRAMS:
NOTE : Demonstrate the following SQL commands and can take any back end RDBMS system for
implementation purpose.
1. Data Definition of Base Tables.
2. DDL with Primary key constraints.
3. DDL with constraints and verification by insert command.
4. Data Manipulation of Base Tables and Views.
5. Demonstrate the Query commands.
6. Write a PL/SQL code block that will accept an account number from the user and debit an amount of Rs.
2000 from the account if the account has a minimum balance of 500 after the amount is debited. The
Process is to fired on the Accounts table.
7. Write a PL/SQL code block to calculate the area of the circle for a value of radius varying from 3 to 7.
Store the radius and the corresponding values of calculated area in a table Areas. Areas – radius, area.
8. Write a PL/SQL block of code for reversing a number. (Example : 1234 as 4321).
9. Create a transparent audit system for a table Client_master (client_no, name, address, Bal_due). The
system must keep track of the records that are being deleted or updated. The functionality being when a
record is deleted or modified the original record details and the date of operation are stored in the audit
client(client_no, name, bal_due, operation, user-id, opdate) table, then the delete or update is allowed to
go through.
COURSE OUTCOME:
1. Study all the Basic DDL and DML Commands.
2. Practice the usage of SQL Statements.
3. Apply PL/SQL code usage.
22
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

4. Analysis the use of PL/SQL for complex problems.

Subject Title Core III: Essentials of Cyber Security Semester II

Subject Code 23UCYS03 Specialization NA

Type Core: Theory L:T:P:C 56:4:0:5

COURSE OBJECTIVE:

1. Understand the real world security challenges.


2. Understand the basic internet security.
3. To protect the remote access and local computing devices.
4. To apply the tools and utilities for Network threats & Attacks.

CO CO Statement Knowledge
Number Level

CO1 Understanding the basics of Cyber Security access and K1


monitoring systems.

CO2 Understanding the concepts of intrusion detection and K2


security challenges.

CO3 Implementing the protection tools for local and intrusion K2, K3
detection.

CO4 Applying the network protection systems. K3, K4

CO5 Appreciate the vulnerabilities, identifying and defending K5


against threats.

23
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Subject
Title Core III: Essentials of Cyber Security Semester II

Subject 23UCYS03
Code Specialization NA

Type L:T:P:C 56:4:0:5


Core: Theory

Unit Contents Levels Sessions

Infrastructure Security in the Real World-Security Challenges, Understanding


Access-Control and Monitoring Systems - Access Control-Security Policies-
I K1 12
Physical Security Controls-Authentication Systems-Remote-Access
Monitoring,

Understanding Video Surveillance Systems-Video Surveillance Systems.


Understanding Intrusion-Detection and Reporting Systems-Intrusion-
II K2 12
Detection and Reporting Systems, Securing Devices The Three Layers of
Security.

Protecting Remote Access - Protecting Local Computing Devices-


Implementing Local Protection Tools-Using Local Intrusion-Detection Tools-
Configuring Browser Security Options-Defending Against Malicious
III K2, K3 12
Software-Hardening Operating Systems, Understanding Network
Transmission Media Security-The Basics of Network Transmission MEDIA-
Transmission Media Vulnerabilities

Understanding the Environment-The Basics of Internet Security-


Understanding the Environment, Protecting the Perimeter-Understanding the
IV K3, K4 11
Perimeter-Firewalls-Network Appliances-Proxy Servers-Honeypots-Extranets.
Protecting Data Moving Through the Internet-Securing Data in Motion

Tools and Utilities-Using Basic Tools-Monitoring Tools and Software-


Identifying and Defending Against Vulnerabilities-Zero Day Vulnerabilities-
V K5 11
Software Exploits-Network Threats and Attacks-Dictionary Attacks-Denial of
Service (DoS) Attacks-Spam

Learning Resources

Text 1. Cyber security Essentials, Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short,
Books Sybex, October 2018

1. Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives,


Reference
B.B.Gupta, D.P.Agrawal, Haoxiang Wang, CRC Press, 2018
Books
2. Cyber Security Essentials, James Graham, Richard Howard and Ryan Otson, CRC Press.

24
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Website/
1. https://www.w3schools.com/cybersecurity/
Link

Mapping with Programme Outcomes

CO Number PO1 PO2 PO3 PO4

CO1 S S M L

CO2 M S M L

CO3 L L S M

CO4 S M S M

CO5 M L M S

S- Strong , M- Medium , L – Low

25
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Subject PROGRAMMING IN JAVA


Semester IV
Title
Subject
23UCYS04 Specialization NA
Code
Type Core: Theory L:T:P:C 60:3:0:5

COURSE OBJECTIVE:
1. To understand the concepts of Object Oriented Programming.
2. To learn about the control structures, class with attributes and methods used in Java.

CO
CO Statement Knowledge Level
Number
CO1 Remember the concepts of OOPS. K1
CO2 Understand the basic Terminologies of languages and K2
statements.
CO3 Demonstrate the use classes and objects. K2,K3
CO4 Evaluate the packages and exception handling methods. K3,K4
CO5 Analyze the I/O Streams and graphics classes. K5

26
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Subject PROGRAMMING IN JAVA


Semester III
Title
Subject
23UCYS04 Specialization NA
Code
Type Core: Theory L:T:P:C 60:3:0:5
Unit Contents Levels Sessions
Introduction to OOPS: Paradigms of Programming Languages –
Basic concepts of Object Oriented Programming – Differences
between Procedure Oriented Programming and Object Oriented
programming - Benefits of OOPs – Application of OOPs. Java:
I History – Java features – Java Environment – JDK – API. K1 12
Introduction to Java: Types of java program – Creating and
Executing a Java program – Java Tokens- Java Virtual Machine
(JVM) – Command Line Arguments –Comments in Java
program.
Elements: Constants – Variables – Data types - Scope of
variables – Type casting – Operators: Special operators –
Expressions – Evaluation of Expressions. Decision making and
branching statements- Decision making and Looping– break –
II labeled loop – continue Statement. Arrays: One Dimensional K2 12
Array – Creating an array – Array processing –
Multidimensional Array – Vectors – ArrayList – Advantages of
Array List over Array Wrapper classes.

Class and objects: Defining a class – Methods – Creating objects


– Accessing class members – Constructors – Method
overloading – Static members –Nesting of Methods – this
keyword – Command line input. Inheritance: Defining
inheritance –types of inheritance– Overriding methods – Final
III variables and methods – Final classes – Final methods - Abstract K2,K3 12
methods and classes – Visibility Control- Interfaces: Defining
interface – Extending interface - Implementing Interface -
Accessing interface variables. Strings: String Array – String
Methods – String Buffer Class.

Packages: Java API Packages – System Packages – Naming


Conventions –Creating & Accessing a Package – Adding Class
to a Package – Hiding Classes. Exception Handling: Limitations
of Error handling – Advantages of Exception Handling - Types
of Errors – Basics of Exception Handling – try blocks –
IV K3,K4 12
throwing an exception – catching an exception – finally
statement. Multithreading: Creating Threads – Life of a Thread –
Defining & Running Thread – Thread Methods – Thread Priority
– Synchronization –Implementing Runnable interface – Thread
Scheduling.
I/O Streams: File – Streams – Advantages - The stream classes –
Byte streams –Character streams. Applets: Introduction – Applet
V Life cycle – Creating & Executing an Applet –Applet tags in K5 12
HTML – Parameter tag – Aligning the display - Graphics Class:
Drawing and filling lines – Rectangles – Polygon – Circles –

27
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Arcs – Line Graphs – Drawing Bar charts AWT Components


and Even Handlers: Abstract window tool kit – Event Handlers –
Event Listeners – AWT Controls and Event Handling: Labels –
Text Component – Action Event – Buttons – Check Boxes –
Item Event – Choice– Scrollbars – Layout Managers- Input
Events – Menus.

Learning Resources
Text 1. E. Balagurusamy, ―Programming with Javaǁ, TataMc-Graw Hill, 5th Edition.
books 2. Sagayaraj, Denis, Karthick and Gajalakshmi, ―Java Programming for Core and
advanced learnersǁ, Universities Press (INDIA) Private Limited 2018.

Reference Herbert Schildt, ―The complete reference Javaǁ, TataMc-Graw Hill, 7th Edition.
Books
1. NPTEL & MOOC courses titled Java
https://nptel.ac.in/courses/106105191/
Website /
2. https://www.geeksforgeeks.org/
Link
3. https://www.tutorialspoint.com/java/

Mapping with Programme Outcomes

CO Number
PO1 PO2 PO3 PO4

CO1 S S S -
CO2 S M M S
CO3 M S L M
CO4 M S M S
CO5 S S - -

S- Strong , M- Medium , L – Low

28
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

PRACTICAL III - JAVA PROGRAMMING


Subject Title Semester III
Subject Code 23UCYSP03 Specialization NA

Type Core: Practical L:T:P:C 45:0:2:2

COURSE OBJECTIVE:

1. To impart Practical Training in JAVA Programming Language.


2. Familiarize the different control and decision making statements in JAVA.
3. Build programs using Packages.
4. Provide knowledge on working with Exception handling functions.

LIST OF PROGRAMS:

1. Write a program to find the Area of Square, Rectangle and Circle using MethodOverloading.
2. Write a program to sort the list of numbers using Command Line Arguments.
3. Write a program to multiply the given two matrices.
4. Write a program to design a class to represent a bank account. Include the following:
Data Members: Name of the depositor, Account number, Type of account, and Balanceamount in
the account.
Methods: To assign initial values, To deposit an amount, To withdraw an amount afterchecking
balance, and To display the name and balance.
5. Write a program that import the user defined package and access the Member variable ofclasses that
contained by Package.
6. Write a program to handle the Exception using try and multiple catch blocks.
7. Write a program to illustrate the use of multi threads.
8. Write a program to create student registration form using applet with Name, Address, Sex,Class,
Email-id.
9. Write a program to draw the line, rectangle, oval, text using the graphics method.
10. Write a program to create a sequential file that could store details about five products. Details
include product code, cost, and number of items available and are provided through thekeyboard.
Compute and print the total value of all the five products

COURSE OUTCOME:

1. Study all the Basic Statements in java Programming.


2. Practice the usage of branching and looping statements.
3. Apply Packages and Interfaces.
4. Analysis the use of graphics tools in JAVA.

29
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Subject COMPUTER NETWORKS


Semester III
Title
Subject
23UCYS05 Specialization NA
Code
Type Core: Theory L:T:P:C 41:3:0:4
Unit Contents Levels Sessions
Introduction – Network Hardware - Software - Reference
Models - OSI and TCP/IP Models - Example Networks:
I Internet, ATM, Ethernet and Wireless LANs - Physical K1 8
Layer - Theoretical Basis for Data Communication -
Guided Transmission Media.
Wireless Transmission - Communication Satellites -
Telephone System: Structure, Local Loop, Trunks and
II K2 8
Multiplexing and Switching. Data Link Layer: Design
Issues - Error Detection and Correction.
Elementary Data Link Protocols - Sliding Window
Protocols - Data Link Layer in the Internet - Medium
III K3 8
Access Layer - Channel Allocation Problem - Multiple
Access Protocols - Bluetooth.

Network Layer - Design Issues - Routing Algorithms -


IV Congestion Control Algorithms - IP Protocol - IP K3,K4 8
Addresses - Internet Control Protocols.
Transport Layer - Services - Connection Management -
Addressing, Establishing and Releasing a Connection -
V K5 9
Simple Transport Protocol - Internet Transport Protocols
(ITP) - Network Security: Cryptography.
Learning Resources

Text Books 1. A. S. Tanenbaum, ―Computer Networksǁ, Prentice-Hall of India 2008, 4th Edition.
1. Stallings, ―Data and Computer Communicationsǁ, Pearson Education 2012, 7th
Edition.
Reference 2. B. A. Forouzan, ―Data Communications and Networkingǁ, Tata McGraw Hill
Books 2007, 4th Edition.
3. F. Halsall, ―Data Communications, Computer Networks and Open Systemsǁ,
Pearson Education 2008.
Website / NPTEL & MOOC courses titled Computer Networks
Link https://nptel.ac.in/courses/106106091/

Mapping with Programme Outcomes

CO Number PO1 PO2 PO3 PO4


CO1 S S S -
CO2 S M M S
CO3 S L L M
CO4 M S M S
CO5 S L S S
S- Strong , M- Medium , L – Low

30
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Subject
Title SBEC-I : NETWORK LAB
Semester III

Subject 23UCYSSP01
Specialization NA
Code

Type SBEC: Practical


L:T:P:C 41:0:2:3

COURSE OBJECTIVE:
1. To impart Practical Training in Network Oriented.
2. Understanding the ARP/RARP protocols.
3. Understanding PING and TRACEROUTE commands.
4. Analyze the Network simulators.
LIST OF PROGRAMS:
1. Study of Socket Programming and Client – Server model
2. Write a code simulating ARP /RARP protocols.
3. Write a code simulating PING and TRACEROUTE commands
4. Create a socket for HTTP for web page upload and download.
5. Write a program to implement RPC (Remote Procedure Call)
6. Applications using TCP Sockets like a. Echo client and echo server b. Chat c. File Transfer
7. Study of Network simulator (NS)
8. Running and using services/commands like ping, traceroute, nslookup, arp, telnet, ftp, etc.
9. Socket programming using TCP
10. Socket programming using UDP
Open source tools should be preferred to conduct the lab ( C , C++ , Java , NS2, Mininet, Opnet, TCP
Dump, Wireshark etc.

COURSE OUTCOME:
1. Understand the basics of socket programming, the client-server model, and the concepts of
networking protocols.
2. Understand the working of ARP/RARP protocols and implement them in code.
3. Understand the functioning of ping and traceroute commands and implement them in code.
4. Understand the concept of RPC and implement it in code.
31
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Subject Title TOOLS AND TECHNIQUES FOR CYBER Semester IV


SECURITY

Subject Code 23UCYS06 Specialization NA

Type Core: Theory L:T:P:C 56:4:0:4

COURSE OBJECTIVE:
1. Outline the Cyber Issues in Real World.
2. Install VMware
3. Inspect Kali Linux
4. Use Metasploit framework for hacking
5. Assess the security in mobile devices

CO
CO Statement Knowled
Number ge Level

CO1 Understanding the basic concepts of cyber issues K1,K2

CO2 Installation of Virtual Lab and it set up K2,K3,K5

CO3 Implementation of Linux and its packages installation K4,K5

CO4 Understanding its frameworks K1,K2

CO5 Evaluation of Mobile hacking techniques K1,K3

32
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Subject Title TOOLS AND TECHNIQUES FOR Semester IV


CYBER SECURITY
Subject 23UCYS06 Specialization NA
Code
Type Core: Theory L:T:P:C 56:4:0:4
Unit Contents Levels Sessions
Cyber Issues : Window Password Hacking and Cracking –
I Steganography - Hiding Secret Message – Anonymous Call, K1 11
Message and Email Header Analysis - Access Darknet or
Darkweb Using TOR : Anonymous Browsing - Access Darknet
or Darkweb Using TOR : Anonymous Browsing.
Virtual Lab Set-up : Installing VMware -Setting Up Kali Linux -
II Target Virtual Machines - Creating the Windows XPTarget - K2 15
Setting Up the Ubuntu 8.10 Target - Creating the Windows 7
Target.

Kali Linux : Linux Command Line - The Linux Filesystem -


III User Privileges - File Permissions - Editing Files- Data K1,K3 15
Manipulation - Managing Installed Packages - Processes and
Services - Managing Networking - Netcat: The Swiss Army Knife
of TCP/IP Connections - Automating Tasks with cron Jobs

Metasploit Framework : Starting Metasploit - Finding


Metasploit Modules - Setting Module Options - Payloads -
IV
Types of Shells - Setting a Payload Manually - Msfcli - Creating K3,K4 15
Standalone Payloads with Msfvenom – Using an Auxiliary
Module
Mobile Hacking : Mobile Attack Vectors - The Smartphone
V Pentest Framework - Remote Attacks - Client-Side Attacks -
K5 15
Malicious Apps - Mobile Post Exploitation

Learning Resources
Text Books 1. Gautam Kumawat, Ethical Hacking & Cyber Security Course : A Complete Package,
Udemy Course, 2017 (First Unit)
2. Georgia Weidman , Penetration testing A Hands-On Introduction to Hacking, no
starchpress, 2014 (II-V unit)
1. Charles P. Pfleeger Shari Lawrence Pfleeger Jonathan Margulies, Security in
Reference
Computing, 5th Edition , Pearson Education , 2015
Books
2 Ramon Natase, Introduction to Hacking, 2018

33
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Website / 1. www.wikipedia.org/wiki/Cybersecurity
Link 2. http://www.freetechbooks.com/introduction-to-cybersecurity-ct240.html

Mapping with Programme Outcomes

CO Number PO1 PO2 PO3 PO4

CO1 M L S L

CO2 S M L M

CO3 M S M L

CO4 S S M M

CO5 L M M S

* S- Strong , M- Medium , L – Low

34
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Subject PRACTICAL IV : CYBER SECURITY LAB


Title USING JAVA Semester IV

Subject 23UCYSP04
Specialization NA
Code

Type Core: Practical


L:T:P:C 45:0:3:2

COURSE OBJECTIVE:
1. Understand the fundamental concepts of cryptography and the different types of encryption techniques
2. Develop an understanding of the different security algorithms and their implementation in open-source
tools like GnuPG and Snort.
3. Gain practical experience in using various network security tools
4. Understand the importance of secure data storage and transmission
LIST OF PROGRAMS
1. Implement the following Substitution & Transposition Techniques concepts: a) Caesar Cipher b) Rail
fence row & Column Transformation
2. Implement the Diffie-Hellman Key Exchange mechanism using HTML and JavaScript
3. Implement the following Attack: a) Dictionary Attack b) Brute Force Attack
4. Installation of Wire shark, tcpdump, etc and observe data transferred in client server communication
using UDP/TCP and identify the UDP/TCP datagram.
5. Installation of rootkits and study about the variety of options.
6. Demonstrate intrusion detection system using any tool (snort or any other s/w).
7. Demonstrate how to provide secure data storage, secure data transmission and for creating digital
signatures

Software Requirements
C, C++, Java or equivalent Compiler GnuPG, Snort
COURSE OUTCOME:
1. Implement the cipher techniques.
2. Develop the various security Algorithms
3. Use different open source tools for network security and analysis.

35
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Semester IV: Add-on Course


Internship Programme
OBJECTIVES:
 To make students acquire practical knowledge by going to a company and learn in a live
environment
 To make students learn team work and work ethics
 To make students to know the recent trends in Web/Mobile Application Development,
Networking or any other area relevant to their study
 To make students analyze their skills and interests
 To help students examine academic and career goals

OUTCOME:

At the end of this internship programme the students will be able to

 Apply theory to real life


 Work as a part of team
 Learn from the company experts
 Learn latest trending technologies
 Come out with a high morale
 Enrich CV

About the internship programme: The internship programme provides students with practical, real-world
experience and a valuable complement to their academic training. It enhances the students’ skills in problem
solving by making him/her work in a live environment in which systematic problem solving methods are
practised.

Duration: Internship requires students to spend a minimum of 15 days (during vacation) employed, full-
time, as IT interns or trainees during vacation at the end of fourth semester. During this period, they are
engaged in work of direct relevance to their programme of study.

Areas: Some of the fields that are open to students include:

 Online Publishing and Editing


 Online Advertising
 Web / Mobile Application Development
 E-Marketing / Online Marketing
 Any other field related to Computer Science / Applications / Information Science

Certificate: A certificate is to be obtained from the organization in which the student undergoes internship
programme. This certificate is to be submitted to the college within fifteen days after the college reopens for
the next semester.

Credits: The Internship programme does not carry any credit.

36
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Subject Title OPERATING SYSTEM Semester V

Subject Code 23UCYS07 Specialization NA


Type Core: Theory L:T:P:C 71:5:0:4

COURSE OBJECTIVE:

 To understand the fundamental concepts and role of Operating System.


 To learn the Process Management and Scheduling Algorithms
 To understand the Memory Management policies
 To gain insight on I/O and File management techniques

CO Number CO Statement Knowledge Level


CO1 K1
Understand the structure and functions of Operating
System
CO2 Compare the performance of Scheduling Algorithms K2
CO3 Understand and organize the memory K1,K3
CO4 Evaluate the deadlock measures K3,K4
CO5 Analyze the I/O hardware and software K5

37
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Subject Title OPERATING SYSTEM Semester V


Subject
23UCYS07 Specialization NA
Code
Type Core: Theory L:T:P:C 71:5:0:4
Unit Contents Levels Sessions
Introduction – History of operating system- Different kinds of
I operating system – Operation system concepts - System calls- K1 11
Operating system structure.
Processes and Threads: Processes – threads – thread model and
II usage – inter process communication. K2 15

III Scheduling - Memory Management: Memory Abstraction –


Virtual Memory - page replacement algorithms. 15
K1,K3
Deadlocks: Resources- introduction to deadlocks – deadlock
IV detection and recovery – deadlocks avoidance – deadlock K3,K4 15
prevention. Multiple processor system: multiprocessors – multi
computers.
Input/Output: principles of I/O hardware - principles of I/O
V software. Files systems: Files – directories - files systems K5 15
implementation – File System Management and Optimization.

Learning Resources
Text Books Andrew S. Tanenbaum, ―Modern Operating Systemsǁ, 2ndEdition, PHI private
Limited, New Delhi, 2008.
1. William Stallings, ―Operating Systems – Internals & Design Principlesǁ, 5th
Reference Edition, Prentice – Hall of India private Ltd, New Delhi, 2004.
Books
2. Sridhar Vaidyanathan, ―Operating Systemǁ, 1st Edition,Vijay Nicole
Publications, 2014.
Website / 3. www.wikipedia.org/wiki/Operating_system
Link 4. http://www.freetechbooks.com/introduction-to-operating-systems-t340.html

Mapping with Programme Outcomes


CO Number
PO1 PO2 PO3 PO4

CO1 S S S -
CO2 S M M S
CO3 S L L M
CO4 M S M S
CO5 S L S S

S- Strong , M- Medium , L – Low


38
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

WEB TECHNOLOGY
Subject Title Semester V
Subject Code 23UCYS08 Specialization NA
Type Core: Theory L:T:P:C 71:5:0:4

COURSE OBJECTIVE:

1. To understand the fundamental concepts and role of Web Technology.


2. To learn the Process of CSS.
3. To understand the web pages.
4. To gain insight on script objects.

CO Knowledge
CO Statement
Number Level
CO1 Understand the structure of the documents in Web. K1
CO2 Remember and understand the table handling tags. K2
CO3 Understand and organize CSS. K1,k3
CO4 Implement scripts in web page. K3,K4
CO5 Evaluate script objects. K5

39
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Subject WEB TECHNOLOGY


Semester V
Title
Subject
23UCYS08 Specialization NA
Code
Type Core: Theory L:T:P:C 71:5:0:4
Unit Contents Levels Sessions
Structuring Documents for the Web: Introducing HTML and
XHTML, Basic Text Formatting, Presentational Elements,
Phrase Elements, Lists, Editing Text, Core Elements and
Attributes, Attribute Groups. Links and Navigation: Basic
I Links, Creating Links with the <a> Element, Advanced E- mail K1 15
Links. Images, Audio, and Video: Adding Images Using the
<img> Element, Using Images as Links Image Maps, Choosing
the Right Image Format, Adding Flash, Video and Audio to
your web pages.
Tables: Introducing Tables, Grouping Section of a Table,
Nested Tables, Accessing Tables. Forms: Introducing Forms,
Form Controls, Sending Form Data to the Server. Frames:
II Introducing Frameset, <frame> Element, Creating Links K2 15
Between Frames, Setting a Default Target Frame Using <base>
Element, Nested Framesets, Inline or Floating Frames with
<iframe>.
Cascading Style Sheets: Introducing CSS, Where you can Add
CSS Rules. CSS Properties: Controlling Text, Text Formatting,
Text Pseudo Classes, Selectors, Lengths, Introducing the Box
III Model. More Cascading Style Sheets: Links, Lists, Tables, K1,K3 15
Outlines, The :focus and :activate Pseudo classes Generated
Content, Miscellaneous Properties, Additional Rules,
Positioning and Layout wit, Page Layout CSS , Design Issues.
Java Script: How to Add Script to Your Pages, Variables and
Data Types – Statements and Operators, Control Structures,
IV Conditional Statements, Loop Statements – Functions - K3,K4 15
Message box, Dialog Boxes, Alert Boxes, Confirm Boxes,
Prompt Boxes
Working with JavaScript: Practical Tips for Writing Scripts,
JavaScript Objects: Window Object - Document object -
V Browser Object - Form Object - Navigator object Screen object K5 11
- Events, Event Handlers, Forms – Validations, Form
Enhancements, JavaScript Libraries.
Learning Resources
Text Jon Duckett, Beginning HTML, XHTML, CSS and Java script , Wiley
Books Publishing

Reference 1. Chris Bates, ―Web Programmingǁ, Wiley Publishing 3d Edition.


Books
2. M. Srinivasan, ―Web Technology: Theory and Practiceǁ, Pearson Publication

40
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Website/ www.tutorialspoint.com/internet_technologies/index.htm
Link

Mapping with Programme Outcomes

CO Number
PO1 PO2 PO3 PO4

CO1 S S S -
CO2 S M M S
CO3 S L L M
CO4 M S M S
CO5 S L S S

S- Strong , M- Medium , L – Low

41
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Subject PRACTICAL V : WEB TECHNOLOGY LAB


Semester V
Title
Subject
21UCSP05 Specialization NA
Code
Type Core: Practical L:T:P:C 45:0:3:2

COURSE OBJECTIVE:

1. To impart Practical Training in Control panel tools.


2. Familiarize with HTML Tags.
3. Build programs using Java script.
4. Provide knowledge on working with events and methods.

LIST OF PROGRAMS:
1. Create a form having number of elements (Textboxes, Radio buttons, Checkboxes, and so
on). Write JavaScript code to count the number of elements in a form.
2. Create a HTML form that has number of Textboxes. When the form runs in the Browser fill
the Text boxes with data. Write JavaScript code that verifies that all textboxes has been
filled. If a textboxes has been left empty, popup an alert indicating which textbox has been
left empty.
3. Develop a HTML Form, which accepts any Mathematical expression. Write JavaScript code
to Evaluates the expression and Displays the result.
4. Create a page with dynamic effects. Write the code to include layers and basic
animation.
5. Write a JavaScript code to find the sum of N natural Numbers. (Use user-defined function).
6. Write a JavaScript code block using arrays and generate the current date in words, this should
include the day, month and year.
7. Create a form for Student information. Write JavaScript code to find Total, Average, Result
and Grade.
8. Create a form for Employee information. Write JavaScript code to find DA, HRA, PF, TAX,
Gross pay, Deduction and Net pay.
9. Create a form consists of a two Multiple choice lists and one single choice list
(a)The first multiple choice list, displays the Major dishes available.
(b) The second multiple choice list, displays the Starters available.
(c)The single choice list, displays the Soft drinks available.

COURSE OUTCOME:
1. Study all the Basic tools.
2. Practice the usage of web page creation and useable objects.
3. Apply various effects on webpage.
4. Analysis the use of java script and html code.

42
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Subject Title ETHICAL HACKING & Semester V


CYBER SECURITY
Subject Code 23UCYS09 Specialization NA
Type Core: Theory L:T:P:C 71:4:0:4

COURSE OBJECTIVE:
1. To introduce the concepts of security and various kinds of attacks
∙ 2. To explain about system hacking and penetration testing

CO Knowledge
CO Statement
Number Level
CO1 Classify Various hacking techniques and attacks K1
CO2 Understand Where information networks are most vulnerable K2
CO3 Understand and apply the concepts of system Hacking K2,K3
CO4 Understand and apply the programming concepts for hacking K4
CO5 Distinguish and examine the function and phases in K3,K4
penetration testing

43
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Subject ETHICAL HACKING &


Semester V
Title CYBER SECURITY
Subject 23UCYS09
Specialization NA
Code
Type Core: Theory L:T:P:C 71:4:0:4
Unit Contents Levels Sessions

Introduction to Hacking – Importance of Security – Elements


of Security – Phases of an Attack – Types of Hacker Attacks –
I Hacktivism – Vulnerability Research – Introduction to K1 15
Footprinting – Information Gathering Methodology –
Footprinting Tools – WHOIS Tools – DNS Information
Tools– Locating the Network Range – Meta Search Engines.

Introduction to Scanning – Objectives – Scanning Methodology


– Tools – Introduction toEnumeration – Enumeration
II Techniques – Enumeration Procedure – Tools K2 15

System Hacking: Introduction – Cracking Passwords –


Password Cracking Websites – Password Guessing –Password
Cracking Tools – Password Cracking Countermeasures –
III Escalating Privileges –Executing Applications – Keyloggers K1,K3 15
and Spyware.

Programming For Security Professionals: Programming


Fundamentals – C language – HTML – Perl – Windows OS
IV Vulnerabilities – Toolsfor Identifying Vulnerabilities – K3,K4 15
Countermeasures – Linux OS Vulnerabilities – Tools for
IdentifyingVulnerabilities – Countermeasures

Penetration Testing: Introduction – Security Assessments –


Types of Penetration Testing- Phases of PenetrationTesting–
V Tools – Choosing Different Types of Pen-Test Tools – K5 11
Penetration Testing Tools.

Learning Resources
Text 1. EC-Council, ―Ethical Hacking and Countermeasures: Attack Phases, Cengage
Books Learning,2010.
2. Michael.T.Simpson, Kent Backman, James.E.Corley, “Hands on
Ethical Hacking and Network Defense”, Cengage Learning, 2013
44
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Reference 1. Patrick Engebretson, ―The Basics of Hacking and Penetration Testing –


Books Ethical Hackingand Penetration Testing Made Easy, Second Edition,
Elsevier, 2013
2. RafayBoloch, ―Ethical Hacking and Penetration Testing Guideǁ, CRC Press,
2014
3. Jon Erickson, ―Hacking, The Art of Exploitation, 2nd Edition:No Starch Press
Inc., 2008
Website/ 1. https://www.scribd.com/document/538684936/Hands-On-Ethical-Hacking-and-
Link Network-Defense-PDFDrive

Mapping with Programme Outcomes

CO Number PO1 PO2 PO3 PO4

CO1 S L M L

CO2 S M M L

CO3 M S M M

CO4 S S M M

CO5 L M M S

*S-Strong; M-Medium; L-Low

45
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Subject PRACTICAL VI : ETHICAL HACKING


Title LAB Semester V

Subject 23UCYSP06
Specialization NA
Code

Type Core: Practical


L:T:P:C 45:0:3:2

COURSE OBJECTIVE

1. Understanding the basics of computer security and common vulnerabilities.


2. Learning how to conduct a thorough vulnerability assessment and penetration testing.
3. Familiarizing with various tools used for ethical hacking and their usage.
4. Developing an understanding of the laws and regulations governing ethical hacking.
5. Gaining knowledge of how to report and document findings from ethical hacking tests.

LIST OF PROGRAMS
1. Use Google and Whois for REconnaisasance.
2. Use CryptTool to encrypt and decrypt passwords.
3. Using TraceRoute, Ping,ifconfig, netstat command
4. Using Nmap scanner to perform port scanning of various forms ACK,SYN,FIN,NULL, XMAS
5. Use WireShark sniffer to capture network traffic and analyse
6. Simulate persistent cross site scripting attack
7. Session impersonation using Firefox and Tamper data add-on
8. Perform SQL injection attack.
9. Using Metaspoilt to exploit

COURSE OUTCOME
1. A comprehensive understanding of the principles and concepts of ethical hacking.
2. Proficiency in identifying and exploiting common vulnerabilities in computer systems and networks.
3. Knowledge of various tools and techniques used for ethical hacking.
4. An understanding of how to conduct a vulnerability assessment and penetration testing.
5. Familiarity with the legal and ethical considerations surrounding ethical hacking.

46
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

SBEC II: MOBILE APPLICATION


Subject Title Semester V
DEVELOPMENT LAB
Subject Code 23UCYSSP02 Specialization NA
Type SBEC: Practical L:T:P:C 45:0:3:3

COURSE OBJECTIVE:

1. To impart Practical Training in android developer tools.


2. Build programs using eclipse environment.
3. Provide knowledge on working with simple android apps.

LIST OF PROGRAMS:

1. Sample application about Layouts.


2. Sample application about Internets.
3. Sample application about User Interfaces.
4. Sample application about Animations.
5. Create calculator app in Android.
6. Create sample android Camera Application.
7. Create basic list view demo in Android.
8. Create Google map in Android.

COURSE OUTCOME:

1. Study all the Basic Tools.


2. Practice the usage of control panel objects.
3. Apply various commands for layouts and animations.
4. Analysis the use of SQLite

47
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Subject Title PROGRAMMING IN PYTHON Semester VI


Subject Code 23UCYS10 Specialization NA
Type Core: Theory L:T:P:C 86:6:0:5

COURSE OBJECTIVE:
1. To understand the basic components of computer programming using the Python
language.
2. To demonstrate significant experience with the Python program development
environment.

CO
CO Statement Knowledge Level
Number
CO1 K1
Understand the Basic Programming Logic.
CO2 Understand the basic Statements. K2
CO3 Implement Files and SQL. K3
CO4 Evaluate Graphics in python. K4
CO5 Analyze Version control system. K5

48
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Subject
PROGRAMMING IN PYTHON Semester VI
Title
Subject
23UCYS10 Specialization NA
Code
Type Core: Theory L:T:P:C 86:6:0:5
Session
Unit Contents Levels
s
Python – origins – features – variable and assignment - Python
basics – statement and syntax – Identifiers – Basic style
I guidelines – Python objects – Standard types and other built-in K1 13
types – Internal types – Standard type operators – Standard type
built-in functions.
Numbers – Introduction to Numbers – Integers – Double
precision floating point numbers – Complex numbers –
II Operators – Numeric type functions – Sequences: Strings, Lists K2 13
and Tuples – Sequences – Strings and strings operators – String
built-in methods – Lists – List type Built in Methods – Tuples.
Mapping type: Dictionaries – Mapping type operators –
Mapping type Built-in and Factory Functions - Mapping type
built in methods – Conditionals and loops – if statement – else
Statement – elif statement – conditional expression – while
III statement – for statement – break statement – continue statement K3 20
– pass statement – Iterators and the iter( ) function - Files and
Input/Output – File objects – File built-in functions – File built-
in methods – File built-in attributes – Standard files – command
line arguments.
Functions and Functional Programming – Functions – calling
functions – creating functions – passing functions – Built-in
IV Functions: apply( ), filter( ), map( ) and reduce( ) - Modules – K4 20
Modules and Files – Modules built-in functions - classes –
class attributes – Instances.
Database Programming – Introduction - Basic Database
Operations and SQL - Example of using Database Adapters,
V K5 20
Mysql - Regular Expression – Special Symbols and Characters –
REs and Python.
Learning Resources
Text Books Title of Book Publisher Year of Publication 1 Wesley J. Chun Core
Python Programming Pearson Education Publication 2012
Reference 1. Wesley J. Chun Core Python Application Programming Pearson Education
Books Publication 2015
2. Eric Matthes Python crash course William pollock 2016
3.Zed Shaw Learn Python the hard way Addition Wesley 2017
4.Mark Lutz Python pocket reference O’Reilly Media 2014 Pedagogy
Website / 1.https://www.tutorialspoint.com/python/
Link 2.www.spoken-tutorial.org

49
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Mapping with Programme Outcomes

CO Number
PO1 PO2 PO3 PO4

CO1 S S M ---
CO2 M M M S
CO3 S M L M
CO4 M S M S
CO5 S M L L

S- Strong , M- Medium , L – Low

50
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

Subject
PYTHON PROGRAMMING Semester VI
Title
Subject
21UCSP07 Specialization NA
Code
Type Core: Practical L:T:P:C 60:0:4:3

COURSE OBJECTIVE:
1. To impart Practical Training in basic python statements.
2. Familiarize with control flow tools.
3. Build programs using data structure concepts.
4. Provide knowledge on working with exception and string handling.

LIST OF PROGRAMS:

1. Create a simple calculator to do all the arithmetic operations.


2. Write a program to use control flow tools like if.
3. Write a program to use for loop.
4. Data structures
a. use list as stack.
b. use list as queue.
c. tuple, sequence.
5. Create new module for mathematical operations and use in your program.
6. Write a program to read and write files, create and delete directories.
7. Write a program with exception handling.
8. Write a program using classes.
9. Connect with MySQL and create address book.
10. Write a program using string handling and regular expressions.

COURSE OUTCOME:
1. Study all the Basic commands.
2. Practice the usage of control flow statements.
3. Apply various commands in files and directories.
4. Analysis the use of MYSQL to connect database.

51
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

PROJECT
III YEAR / VI SEM
OBJECTIVES:
The aim of the mini project is that the student has to understand the real time software
development environment. The student should gain a thorough knowledge in the problem and
language / software which he/she has selected for their project work.

Project Planning:
B.Sc (Computer Science / Information Science)/BCA Mini Project is an involved exercise,
which has to be planned well in advance. The topic should be chosen in the beginning of final
year itself. Related reading training and discussions of project should be completed in the first
term of final year.

I Selection of Team
To meet the stated objectives, it is imperative that mini project is done through a team effort.
Though it would be ideal to select the team members at random and this should be strongly
recommended, due to practical consideration students may also be given the choice of forming
themselves into teams with Two members. A team leader shall be selected. Team shall maintain
the minutes of meeting of the team members and ensure that tasks have been assigned to every
team member in writing. Team meeting minutes shall form a part of the project report. Even if
students are doing project as groups, each one must independently take different modules of the
work and must submit the report.

II Selection of Tools
No restrictions shall be placed on the students in the choice of platform/tools/languages to be
utilized for their project work, though open source is strongly recommended, wherever possible.
No value shall be placed on the use of tools in the evaluation of the project.

III Project Evaluation:


Continuous Internal Assessment : 40 Marks
Evaluation (External) : 40 Marks
Viva-voce (jointly) : 20 Marks

There shall be a common written examination conducted for all the candidates in each group
together for a minimum of 10 minutes.
(i) Requirement Specification of Project
(ii) Design of Project
(iii) Testing and Implementation of Project

IV REGULATIONS OF PROJECT WORK

 Three copies of the project report must be submitted by each student..


 The final outer dimensions of the project report shall be 21cm X 30 cm.
 Only hard binding should be done. The text of the report should be set in 12
pt, Times New Roman, 1.5 spaced.

52
B.Sc - Computer Science (Cyber Security) Syllabus under CBCS Pattern with effect from 2023-2024 Onwards

 Headings should be set as follows: CHAPTER HEADINGS 16 pt, Arial,


Bold, All caps, Centered.
 Section Headings 14 pt Bookman old style, Bold, Left adjusted.
 Section Sub-heading 12 pt, Bookman old style.
 Title of figures tables etc are done in 12 point, Times New Roman, Italics,
centered.
 Only 1.5 space need be left above a section or subsection heading and no
space may be left after them.
 References shall be IEEE format (see any IEEE magazine for detail) While
doing the project keep note of all books you refer, in the correct format and
include them in alphabetical order in your reference list.
 The Candidate should submit the filled in format as given in Annexure-I to the
department for approval during the First Week of December.
 Periodically the project should be reviewed.
 A Sample format is enclosed in Annexure-II.
 Format of the Title page and Certificate are enclosed in Annexure III.
 The students may use power point presentation during their viva voce
examination.

53
B.Sc-Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

ANNEXURE - I

PERIYAR UNIVERSITY

Name of the College :


Programme :
Name of the Student :
Register Number :
Title of the Project Work :
Address of Organization / Institution :

Name of the Internal Guide :

Qualification :

Place :
Date : Signature of Internal Guide

54
B.Sc-Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

ANNEXURE II
CONTENTS

Chapter Page No.


COLLEGE BONAFIDE CERTIFICATE
ACKNOWLEDGEMENT
SYNOPSIS
1. INTRODUCTION
ORGANIZATION PROFILE (optional)
SYSTEM SPECIFICATION
HARDWARE CONFIGURATION
SOFTWARE SPECIFICATION
2. SYSTEM STUDY
EXISTING SYSTEM
DESCRIPTION
DRAWBACKS
PROPOSED SYSTEM
DESCRIPTION
FEATURES
3. SYSTEM DESIGN AND DEVELOPMENT
FILE DESIGN
INPUT DESIGN
OUTPUT DESIGN
CODE DESIGN
DATABASE DESIGN
SYSTEM DEVELOPMENT
DESCRIPTION OF MODULES
(Detailed explanation about the project
work)
4. TESTING AND
IMPLEMENTATION
5. CONCLUSION
6. BIBLIOGRAPHY

APPENDICES
A. DATA FLOW DIAGRAM
B. TABLE STRUCTURE
C. SAMPLE CODING
D. SAMPLE INPUT
E. SAMPLE OUTPUT

55
B.Sc-Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

ANNEXURE III

A. Format of the title page

TITLE OF THE PROJECT WORK

A Project Work submitted in partial fulfillment of


the requirements for the degree of
Bachelor of Science in Computer Science /
Information Science
to the
Periyar University, Salem - 11

By

NAME OF THE
STUDENT REG. NO.

College
emblem

COLLEGE NAME
(AFFILIATED TO PERIYAR UNIVERSITY)
PLACE with Pin Code

MONTH – YEAR

56
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

B. Format of the Certificate

Name and Address of the Internal Guide

Date

CERTIFICATE

This is to certify that the Project Work entitled

submitted in partial fulfillment of the requirements of the degree of Bachelor of Science in Computer

Sciences to the Periyar University, Salem is a record of bonafide work carried out by

......................………… Reg. No. .................... under my supervision and guidance.

Internal Guide
Head of the Department

Date of Viva-voice:

Internal Examiner External Examiner

57
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Subject Title SBEC-III: SOCIAL MEDIA & SECURITY Semester VI

Subject Code 23UCYSS01 Specialization NA

Type Core: Theory L:T:P:C 41:3:0:3

COURSE OBJECTIVE:
1. Understand the important features of social computing
2. Learn to analyze the data left behind in social media.

CO
CO Statement Knowledge Level
Number
CO1 Understanding the concept of Social Media K1,K2
CO2 Analyze and review the hacking methodologies K3
CO3 Understanding the good and bad media campaigns K1,K2
CO4 Evaluating the risks in social media K1,K3,K5
CO5 Understanding Policy and its privacies K1,K4

58
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Subject SBEC-III: SOCIAL MEDIA &


Semester VI
Title SECURITY
Subject 23UCYSS01
Specialization NA
Code
Type Core: Theory L:T:P:C 41:3:0:3
Unit Contents Levels Sessions
Introduction to Social Media, Understanding Social Media,
Different Types and Classifications, The Value of Social Media,
I Cutting Edge Versus Bleeding Edge, The Problems That Come K1 8
With Social Media, Is Security Really an Issue? Taking the Good
With the Bad.
Dark side Cybercrime, Social Engineering, Hacked accounts,

II cyberstalking, cyberbullying, predators, phishing, hackers. K2 8

Being bold versus being overlooked Good social media


campaigns, Bad social media campaigns, sometimes it’s better to
III 8
be overlooked, Social media hoaxes, The human factor, Content K1,K3
management, Promotion of social media.

Risks of Social media Introduction Public embarrassment, Once


it’s out there, it’s out there False information, Information
IV K3,K4 8
leakage, Retention and archiving, Loss of data and equipment.

Policies and Privacy Blocking users controlling app privacy,


Location awareness, Security Fake accounts passwords, privacy
V K5 9
and information sharing.

Learning Resources
Text 1. Interdisciplinary Impact Analysis of Privacy in Social Networks, Recognizing Your
Books
DigitalFriends, Encryption for Peer-to-Peer Social Networks Crowd sourcing and
Ethics, Authors:Altshuler Y, EloviciY, Cremers A.B, Aharony N, Pentland A. (Eds.).
2.SocialMediasecurity
Https://www.sciencedirect.com/science/article/pii/B97815974998660000

59
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Reference 1. Michael Cross, Social Media Security Leveraging Social Networking While
Books
Mitigating Risk. 2. Online Social Networks Security, Brij B. Gupta, Somya Ranjan
Sahoo, Principles, Algorithm, Applications, and Perspectives, CRC press.

Website/ https://www.trendmicro.com/en_in/research/21/f/best-practices-for-social-media-
Link security.html

Mapping with Programme Outcomes

CO Number PO1 PO2 PO3 PO4

CO1 S L M L

CO2 S M M L

CO3 M S M M

CO4 S S M M

CO5 L M M S

*S-Strong; M-Medium; L-Low

60
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Subject Title ELECTIVE-I :OPEN SOURCE Semester V


TECHNOLOGY

Subject Code 23UCYSE01 Specialization NA

Type Core: Theory L:T:P:C 86:6:0:4

COURSE OBJECTIVE:
1. Introduces Open Source methodologies.
2. To make the students to gain experience using open source tools, languages and frameworks to prepare for
careers in software development.

CO
CO Statement Knowledge Level
Number
CO1 Understanding the concepts of softwares K1,K2
CO2 Understanding Open source History and Initiatives K3
CO3 Importance of Communities in Open software K1,K2
CO4 Analyze the servers K1,K3,K5
CO5 Understand the concept of ethics in open source K1,K4

61
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Subject ELECTIVE-I :OPEN SOURCE


Semester V
Title TECHNOLOGY
Subject 23UCYSE01
Specialization NA
Code
Type Core: Theory L:T:P:C 86:6:0:4
Unit Contents Levels Sessions
Introduction : Open Source, Free Software, Free
Software vs. Open Source software, Public Domain
Software, FOSS does not mean no cost. History : 14
BSD, The Free Software Foundation and the GNU
I Project. K1

Open Source History, Initiatives, Principle and


methodologies. Philosophy : Software Freedom,
Open Source Development Model Licences and 18
II Patents: What Is A License, Important FOSS K2
Licenses (Apache,BSD,GPL, LGPL), copyrights
and copylefts, Patents Economics of FOSS : Zero
Marginal Cost, Income-generation opportunities,
Problems with traditional commercial software,
Internationalization

Community Building: Importance of Communities


in Open Source Movement- JBoss Community- 18
Starting and Maintaining an Open Source Project -
III Open Source Hardware K1,K3

Apache HTTP Server and its flavors- WAMP server (Windows,


Apache, MySQL, PHP)- Apache, MySQL, PHP, JAVA as
IV development platform K3,K4 18

Open source vs. closed source Open source


government, Open source ethics. Social and
V Financial impacts of open source technology, Shared K5
18
software, Shared source.

Learning Resources
Text 1. 1 Sumitabha Das “Unix Concepts and Applications, Tata
Books McGraw Hill Education 006
2. The Official Ubuntu Book, 8th Edition
3. Kailash Vedera, Bhavyesh Gandhi, “Open Source Technology”,
University Science press

62
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Reference 1. Paul Kavanagh, “Open Source Software: Implementation and


Books Management”, Elsevier Digital Press
2. The Linux Documentation Project : http://www.tldp.org

Website/ Docker Project Home : http://www.docker.com


Link

Mapping with Programme Outcomes

CO Number PO1 PO2 PO3 PO4

CO1 S L M L

CO2 S M M L

CO3 M S M M

CO4 S S M M

CO5 L M M S

*S-Strong; M-Medium; L-Low

63
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Subject Title ELECTIVE I : DIGITAL FORENSICS Semester V

Subject Code 23UCYSE02 Specialization NA

Type Core: Theory L:T:P:C 86:6:0:4

COURSE OBJECTIVE:

1. To understand the basic digital forensics and techniques for conducting the forensic examination on different
digital devices.

2. To understand how to examine digital evidences such as the data acquisition, identification analysis.

CO
CO Statement Knowledge Level
Number
CO1 Understand the Basics of digital forensics K1
CO2 Understand the concepts of investigations and procedures K1,K2
CO3 Apply the different digital forensic tools K2,K3
CO4 Analysing the crime and digital evidence K4
CO5 Understand and apply tools and techniques in digital forensic K3,K4

64
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Subject ELECTIVE I : DIGITAL FORENSICS


Semester V
Title
Subject 23UCYSE02
Specialization NA
Code
Type Core: Theory L:T:P:C 86:6:0:4
Unit Contents Levels Sessions
Computer forensics fundamentals, Benefits of forensics,
computer crimes, computer forensics evidence and courts, legal
14
concerns and private issues.
I K1

Data acquisition- understanding storage formats and digital


evidence, determining the best acquisition method, acquisition 18
II K2
tools, validating data acquisitions, performing RAID data
acquisitions, remote network acquisition tools, other forensics
acquisitions tools.

Understanding Computing Investigations – Procedure for


corporate High-Tech investigations, understanding data recovery 18
III K1,K3
work station and software, conducting and investigations.

Processing crimes and incident scenes, securing a computer


IV incident or crime, seizing digital evidence at scene, storing digital K3,K4 18
evidence, obtaining digital hash, reviewing case.

Current computer forensics tools- software, hardware tools,


V validating and testing forensic software, addressing data-hiding K5
18
techniques, performing remote acquisitions, E-Mail
investigations- investigating email crime and violations,
understanding E-Mail servers, specialized E-Mail forensics tool

65
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Learning Resources
Text 1 Warren G. Kruse II and Jay G. Heiser, “Computer Forensics: Incident Response
Books
Essentials”, Addison Wesley, 2002.

2.Nelson, B, Phillips, A, Enfinger, F, Stuart, C., “Guide to Computer Forensics and


Investigations, 2nd ed., Thomson Course Technology, 2006, ISBN: 0-619-21706-5.

Reference 1 Vacca, J, Computer Forensics, Computer Crime Scene Investigation, 2nd Ed, Charles
Books
River Media, 2005, ISBN: 1-58450-389.

Website/ https://www.udemy.com/course/digital-forensics-course/
Link

Mapping with Programme Outcomes

CO Number PO1 PO2 PO3 PO4

CO1 S L L L

CO2 S L M L

CO3 M S M S

CO4 L L S M

CO5 L M M S

*S-Strong; M-Medium; L-Low

66
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Subject Title ELECTIVE - I :ECOMMERCE & DIGITAL Semester V


PAYMENT

Subject Code 23UCYSE03 Specialization NA

Type Core: Theory L:T:P:C 86:6:0:4

COURSE OBJECTIVE:
1. This course provides an introduction to information systems for business and management. It is designed
to familiarize students with organizational and managerial and technical foundations of systems.
2. Digital transactions are to reduce the costs and risks of handling cash. focuses on learning of new
technologies.

CO
CO Statement Knowledge Level
Number
CO1 Determine key terminologies and concepts including IT, K1
marketing, management, economics, accounting, finance in
the major areas of business.
CO2 Design, develop and implement Information Technology K2,K3
solutions for business problems.
CO3 Analyze the impact of E-commerce on business models and K2,K4
strategy.
CO4 Understand ethical issues that occur in business, evaluate K4
alternative courses of actions and evaluate the implications of
those actions .
CO5 Assess electronic payment systems. Describe Internet trading K4,K5
relationships including Business to Consumer, Business-to-
Business, Intra-organizational.

67
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Subject ELECTIVE - I :ECOMMERCE &


Semester V
Title DIGITAL PAYMENT
Subject 23UCYSE03
Specialization NA
Code
Type Core: Theory L:T:P:C 86:6:0:4
Unit Contents Levels Sessions
E-commerce: The revolution is just beginning, Ecommerce : A

I Brief History, Understanding Ecommerce: organizing Themes. K1


14

E-commerce Business Models, Major Business to Consumer


(B2C) business models, Major Business to Business (B2B)
business models, Business models in emerging E-commerce 18
II K2
areas, How the Internet and the web change business: strategy,
structure and process, The Internet: Technology Background, The
Internet Today, Internet II- The Future Infrastructure, The World
Wide Web, The Internet and the web : features.

A systematic Approach, The e-commerce security environment,


Security threats in the e-commerce environment, Technology 18
solution, Management policies, Business procedures, and public K1,K3
III
law.

The Internet Audience and Consumer Behaviour, Basic


Marketing Concepts, Internet Marketing Technologies, B2C and
IV B2B E-commerce marketing and business strategies, The Retail K3,K4 18
sector, Analyzing the viability of online firms, E-commerce in
action: E-tailing Business Models, Common Themes in online
retailing, The service sector: offline and online, Online financial
services, Online Travel Services, Online career services

Introduction to digital payment - different methods for digital


payment - benefits of digital payment - Economic Progress -
V Payment Gateway. K5
18

Learning Resources
Text 1. Kenneth C. Laudon, “E-Commerce : Business, Technology, Society”,
Books 5th Edition, Pearson, 2019.
2. S. J Joseph,” E-Commerce: an Indian perspective”, PHI. 5th Edition,
2010
Reference 1 Daniel Minoli & Emma Minoli, “Web Commerce Technology Handbook”. Tata
Books McGraw Hill – 2017.
2. Jaspal Singh , “ Digital Payments in India -Background, Trends and Opportunities”.

68
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Website/ https://www.tutorialspoint.com/e_commerce/e_commerce_payment_systems.html
Link

Mapping with Programme Outcomes

CO Number PO1 PO2 PO3 PO4

CO1 L L S M

CO2 S S M S

CO3 M S S M

CO4 L M M S

CO5 M S S S

*S-Strong; M-Medium; L-Low

69
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

ELECTIVE -II :MOBILE


Subject Title COMPUTING Semester VI

Subject Code 22UCYSE04 Specialization NA


Type Elective : Theory L:T:P:C 86:6:0:4

COURSE OBJECTIVE:

1. To make the student to understand the concepts of mobile computing.


2. To familiar with the network protocol stack.
3. To be exposed to Ad-Hoc networks.
4. Gain knowledge about different mobile platforms and application development.

CO
CO Statement Knowledge Level
Number
CO1 Remember the basic concepts of mobile K1
computing.
CO2 Understanding mobile IP. K1,K2
CO3 Apply Mobile Telecommunication system. K3
CO4 Evaluate mobile ad hoc system. K4
CO5 Implement mobile operating system. K5

70
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Subject Title ELECTIVE -II :MOBILE Semester VI


COMPUTING
Subject
23UCYSE04 Specialization NA
Code
Type Elective : Theory L:T:P:C 86:6:0:4
Unit Contents Levels Sessions
Introduction-Mobile Computing – Mobile Computing Vs
wireless Networking – Mobile Computing Applications –
Characteristics of Mobile computing – Structure of Mobile
I K1 14
Computing Application. MAC Protocols – Wireless MAC
Issues. Fixed Assignment Schemes – Random Assignment
Schemes – Reservation Based Schemes
Mobile Internet Protocol and Transport Layer-Overview of
Mobile IP – Features of Mobile IP – Key Mechanism in
II Mobile IP – route Optimization. Overview of TCP/IP – K1,K2 18
Architecture of TCP/IP- Adaptation of TCP Window –
Improvement in TCP Performance.
Mobile Telecommunication System-Global System for
Mobile Communication (GSM) – General Packet Radio
III K3 18
Service (GPRS) – Universal Mobile Tele communication
System (UMTS).
Mobile Ad-Hoc Networks-Ad-Hoc Basic Concepts –
Characteristics – Applications – Design Issues – Routing –
IV Essential of Traditional Routing Protocols –Popular Routing K4 18
Protocols – Vehicular Ad Hoc networks ( VANET) –
MANET Vs VANET –Security.
Mobile Platforms and Applications-Mobile Device Operating
Systems – Special Constrains & Requirements – Commercial
Mobile Operating Systems – Software Development Kit: iOS,
V K5 18
Android, BlackBerry, Windows Phone – M-Commerce –
Structure– Pros & Cons – Mobile Payment System – Security
Issues.
Learning Resources
Prasant Kumar Pattnaik, Rajib Mall, ―Fundamentals of Mobile Computingǁ,
Text Books
PHI Learning Pvt. Ltd, New Delhi 2012.

1. Jochen H. Schller, ―Mobile Communicationsǁ, Pearson Education, New Delhi,


2007, 2nd Edition.
Reference 2. Dharma Prakash Agarval, Qing and An Zeng, "Introduction to Wireless
Books and Mobile systems", Thomson Asia Pvt Ltd. 2005.
3. Uwe Hansmann, LotharMerk, Martin S. Nicklons and Thomas Stober,
―Principles of Mobile Computingǁ, Springer 2003.

Website / NPTEL & MOOC courses titled Mobile Computing


Link
1. https://nptel.ac.in/courses/106/106/106106147/

71
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Mapping with Programme Outcomes

CO Number
PO1 PO2 PO3 PO4

CO1 M S M L
CO2 S M M L
CO3 S M M L
CO4 M S M L
CO5 S M L L

S- Strong , M- Medium , L – Low

72
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

ELECTIVE -II : WIRELESS


Subject Title NETWORK Semester VI

Subject Code 23UCYSE05 Specialization NA


Type Elective : Theory L:T:P:C 86:6:0:4

COURSE OBJECTIVE:

1. To understand about Wireless Networks,


2. To familiar with Protocol Stack and Standards.
3. To be exposed to 3G/4G Services.
4. Gain knowledge about Its Protocols and Applications.

CO
CO Statement Knowledge Level
Number
CO1 Remember the basic concepts of WLAN K1
technologies.
CO2 Understanding mobile IP. K2
CO3 Apply TCP enhancements. K3
CO4 Evaluate UTMS. K4
CO5 Implement 4G. K5

73
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

ELECTIVE -II : WIRELESS


Subject
NETWORK Semester VI
Title
Subject
23UCYSE05 Specialization NA
Code
Type Elective : Theory L:T:P:C 86:6:0:4
Unit Contents Levels Sessions
Introduction-WLAN Technologies: Infrared, UHF Narrowband,
Spread Spectrum -IEEE802.11: System Architecture, Protocol
Architecture, Physical Layer, MAC Layer, 802.11b, 802.11a –
14
Hiper LAN: WATM, BRAN, HiperLAN2 – Bluetooth:
I K1
Architecture, Radio Layer, Baseband Layer, Link Manager
Protocol, Security – IEEE802.16-WIMAX: Physical Layer,
MAC, Spectrum Allocation For WIMAX.

Introduction – Mobile IP: IP Packet Delivery, Agent


Discovery, Tunneling And Encapsulation, IPV6-Network
II Layer In The Internet- Mobile IP Session Initiation Protocol K2 18
– Mobile Ad-Hoc Network: Routing, Destination Sequence
Distance Vector, Dynamic Source Routing.
TCP Enhancements For Wireless Protocols – Traditional TCP:
Congestion Control, Fast Retransmit/Fast Recovery,
18
Implications Of Mobility – Classical TCP Improvements:
III K3
Indirect TCP, Snooping TCP, Mobile TCP, Time Out Freezing,
Selective Retransmission, Transaction Oriented TCP – TCP
Over 3G Wireless Networks.
Overview Of UTMS Terrestrial Radio Access Network-UMTS
Core Network Architecture: 3G-MSC, 3G-SGSN, 3G-GGSN,
IV SMS-GMSC/SMS-IWMSC, Firewall, DNS/DHCP-High Speed K4 18
Downlink Packet Access (HSDPA) - LTE Network
Architecture And Protocol.
4G Introduction – 4G Vision – 4G Features And Challenges –
Applications Of 4G – 4G Technologies: Multicarrier
V Modulation, Smart Antenna Techniques, OFDM-MIMO K5
18
Systems, Adaptive Modulation And Coding With Time Slot
Scheduler, Cognitive Radio.
Learning Resources
1. Jochen Schiller, ǁMobile Communicationsǁ, Second Edition, Pearson
Text Education 2012.(Unit I,II,III)
Books 2. Vijay Garg , ―Wireless Communications And Networkingǁ, First Edition,
Elsevier 2007.(Unit IV,V)

74
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

1. Erik Dahlman, Stefan Parkvall, Johan Skold And Per Beming, ―3G Evolution
HSPA And LTE For Mobile Broadbandǁ, Second Edition, Academic Press,
2008.
Reference
2. Anurag Kumar, D.Manjunath, Joy Kuri, ―Wireless Networkingǁ, First Edition,
Books
Elsevier 2011.
3. Simon Haykin , Michael Moher, David Koilpillai, ―Modern Wireless
Communicationsǁ, First Edition, Pearson Education 2013

www.tutorialspoint.com/wireless-network
Website /
www.iqytechnicalcollege.com
Link
www.rejinPaul.com

Mapping with Programme Outcomes

CO Number
PO1 PO2 PO3 PO4

CO1 M S S L
CO2 S S M L
CO3 S M L L
CO4 M S L L
CO5 S M M L

S- Strong , M- Medium , L – Low

75
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Subject Title ELECTIVE : II CYERCRIME AND LAW Semester VI

Subject Code 23UCYSE06 Specialization NA

Type Core: Theory L:T:P:C 86:6:0:4

Course Objectives:
1. Understanding the nature of cybercrime
2. Legal and ethical considerations
3. Cyber security
4. Investigation and forensics
5. Prevention and response
6. Emerging trends and technologies

CO
CO Statement Knowledge Level
Number
CO1 Remember the basic concepts of Cyber Crimes K1, K2
CO2 Analyze the concepts of Digitalization K1,K4
CO3 Implementation of Digitalization K3,K2
CO4 Functionalities and Authorization of digital transactions K5
CO5 Understanding the laws and its acts K1,K2

76
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Subject ELECTIVE : II CYERCRIME AND LAW


Semester VI
Title
Subject 23UCYSE06
Specialization NA
Code
Type Core: Theory L:T:P:C86:6:0:4
Unit Contents Levels Sessions
Cyber Crimes Introduction — Computer Crime and Cyber K1, K2
Crimes: Distinction between Cyber Crime and Conventional
14
Crimes; Cyber Forensic; Kinds of Cyber Crimes — Cyber
I
Stalking, Cyber Terrorism, Forgery and Fraud, Crimes Related to
IPRs, Computer Vandalism: Privacy of Online Data; Cyber
Jurisdiction; Copyright Issues; Domain Name Dispute, etc.
Definition and Terminology (Information Technology Act, 2000) K1,K4
Concept of Internet, Internet Governance, E-contract, E-forms,
Encryption, Data Security. Access, Addressee, Adjudicating 18
II Officer, Affixing Digital Signatures, Appropriate Government,
Certifying Authority, Certification Practice Statement, Computer,
Computer Network, Computer Resource, Computer System,
Cyber Appellate Tribunal, Data, Digital Signature, Electronic
Form, Electronic Record.

Electronic Records Authentication of Electronic Records; Legal K3,K2


Recognition of Electronic Records; Legal Recognition of Digital 18
Signatures; Use of Electronic Records and Digital Signatures in
III Government and its Agencies; Retention of Electronic Records;
Attribution, Acknowledgement and Dispatch of Electronic
Records; Secure Electronic Records and Digital Signatures.

Regulatory Framework Regulation of Certifying Authorities; K5


Appointment and Functions of Controller; License to Issue
IV Digital Signatures Certificate; Renewal of License; Controller’s
18
Powers; Procedure to be Followed by Certifying Authority;
Issue, Suspension and Revocation of Digital Signatures
Certificate, Duties of Subscribers; Penalties and Adjudication;
Appellate Tribunal; Offences
Cyber law in India: Need for cyber law in India, History of cyber K1,K2
law in India, Information Technology Act,2000, Overview of
V other laws amended by the IT Act 2000, National Policy on 18
Information Technology 2012.

77
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Learning Resources
Text 1. Cyber Crimes and Laws, Dr.U.S.Pandey, Dr.Verinder Kumar, Dr.Harman Preet
Books Singh, Himalaya Publishing House,2017 edition.

Reference Text book on Cyber Law, Pavan Duggal, second Edition, Universal law 2017
Books

Website/ https://www.mygreatlearning.com/academy/learn-for-free/courses/introduction-to-
Link cyber-crime

Mapping with Programme Outcomes

CO Number PO1 PO2 PO3 PO4

CO1 S L S M

CO2 M S S L

CO3 S S L M

CO4 L S S M

CO5 S M L S

*S-Strong; M-Medium; L-Low

78
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Subject Title ELECTIVE : III CRYPTOGRAPHY Semester VI

Subject Code 23UCYSE07 Specialization NA

Type Core: Theory L:T:P:C 86:6:0:4

COURSE OBJECTIVES:
1. To understand Cryptography Theories, Algorithms and Systems.
2. To understand necessary Approaches and Techniques to build protection mechanisms in order to secure
computer networks.

CO
CO Statement Knowledge Level
Number
CO1 Understand the fundamentals of networks security, security K1,K2,K3
architecture, threats and vulnerabilities
CO2 Apply the different cryptographic operations of symmetric K2,K3
cryptographic algorithms
CO3 Apply the different cryptographic operations of public key K4,K1
cryptography
CO4 Apply the various Authentication schemes to simulate K4,K5
different applications
CO5 Understand various Security practices and System security K1,K3
standards

79
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Subject ELECTIVE III : CRYPTOGRAPHY


Semester VI
Title
Subject 23UCYSE07
Specialization NA
Code
Type Core: Theory L:T:P:C 86:6:0:4
Unit Contents Levels Sessions

Security trends - Legal, Ethical and Professional Aspects of


Security, Need for Security at Multiple levels, Security Policies -
14
Model of network security – Security attacks, services and
I mechanisms – OSI security architecture – Classical encryption K1
techniques: substitution techniques, transposition techniques,
steganography).- Foundations of modern cryptography: perfect
security – information theory – product cryptosystem –
cryptanalysis.

MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY:


Algebraic structures - Modular arithmetic-Euclid‘s algorithm- 18
II Congruence and matrices - Groups, Rings, Fields- Finite fields- K2
SYMMETRIC KEY CIPHERS: SDES – Block cipher Principles
of DES – Strength of DES – Differential and linear cryptanalysis
- Block cipher design principles – Block cipher mode of
operation.

MATHEMATICS OF ASYMMETRIC KEY


18
CRYPTOGRAPHY: Primes – Primality Testing – Factorization –
III Euler‘s totient function, Fermat‘s and Euler‘s Theorem - Chinese K1,K3
Remainder Theorem – Exponentiation and logarithm -
ASYMMETRIC KEY CIPHERS: RSA cryptosystem – Key
distribution – Key management – Diffie Hellman key exchange -
ElGamal cryptosystem – Elliptic curve arithmetic-Elliptic curve
cryptography.

Authentication requirement – Authentication function – MAC –


IV Hash function – Security of hash function and MAC – SHA – K3,K4 18
Digital signature and authentication protocols – DSS- Entity
Authentication: Biometrics, Passwords, Challenge Response
protocols- Authentication applications - Kerberos, X.509

80
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Electronic Mail security – PGP, S/MIME – IP security – Web


V Security - SYSTEM SECURITY: Intruders – Malicious software K5
18
– viruses – Firewalls.

Learning Resources
Text William Stallings, Cryptography and Network Security: Principles and Practice, PHI
Books 3rd Edition, 2006.

Reference C K Shyamala, N Harini and Dr. T R Padmanabhan: Cryptography and Network


Books Security, Wiley India Pvt.Ltd
2. Behrouz A. Forouzan, Cryptography and Network Security, Tata McGraw Hill 2007.
3. Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: PRIVATE
Communication in a PUBLIC World, Prentice Hall, ISBN 0-13-046019-2

Website/ https://www.geeksforgeeks.org/cryptography-and-its-types/
Link

Mapping with Programme Outcomes

CO Number PO1 PO2 PO3 PO4

CO1 M L S L

CO2 S L M L

CO3 M S L M

CO4 S L M M

CO5 L M M S

*S-Strong; M-Medium; L-Low

81
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

ELECTIVE - III : NETWORK


Subject Title SECURITY Semester VI

Subject Code 23UCYSE08 Specialization NA


Type Elective : Theory L:T:P:C 86:6:0:4

COURSE OBJECTIVE:
1. To Understand OSI security architecture.
2. To acquire fundamental knowledge of finite fields and number theory.
3. To Understand various block cipher and stream cipher models.
4. Study the principles of symmetric & public key crypto systems.
5. To learn the system security practices.

CO
CO Statement Knowledge Level
Number
CO1 Remember the OSI Security Architecture. K1
CO2 Understanding Number theory and finite fields. K2
CO3 Apply Block Ciphers and Data Encryption Std. K3
CO4 Evaluate Public Key Cryptography and RSA. K4
CO5 Implement Hash functions. K5

82
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Subject ELECTIVE - III : NETWORK


Semester VI
Title SECURITY
Subject 23UCYSE08 Specialization NA
Code
Type Elective : Theory L:T:P:C 86:6:0:4
Unit Contents Levels Sessions
OSI Security Architecture – Security attacks, services and
mechanisms – Network security Model – Classical encryption
I K1 14
techniques: Symmetric cipher model, Substitution techniques –
Transposition techniques – Rotor machines – Steganography
Number theory and finite fields: The Euclidean algorithm –
Modular arithmetic - Groups, Rings and Fields – Finite fields of
II K2 18
the Form GF (p) – Polynomial arithmetic – prime numbers –
Fermat’s and eulers theorems
Block Ciphers and Data Encryption Standard: Traditional block
cipher structure – Data Encryption – Strengths of DES –
III Block Cipher Design Principles – Advanced Encryption K3 18
Standard – AES structure – AES transformation functions –
AES Key expansion – implementation

Public Key Cryptography and RSA – Principles of Public-key


IV Crypto systems – RSA algorithm - Diffie – Hellman Key K4 18
exchange - Elgamal Cryptographic System

Hash functions – Applications – two simple hash functions –


V Hash functions based on Cipher block chaining - Secure Hash K5 18
Algorithm (SHA)

Learning Resources
Text William Stallings, ―Cryptography and Network Security: Principles and Practiceǁ,
Books Pearson Education 2013,6th Edition.
1. Behrouz A. F-erouzan, ―Cryptography & Network Securityǁ, Tata McGraw
Hill 2007.
2. Man Young Rhee, ―Internet Security: Cryptographic Principles, Algorithms
and Protocolsǁ, Wiley Publications 2003.
Reference 3. Charles Pfleeger, ―Security in Computingǁ, Prentice Hall of India 2006, 4th
Books Edition.
4. Ulysess Black, ―Internet Security Protocols”, Pearson Education Asia 2000.
5. Charlie Kaufman and Radia Perlman, Mike Speciner, ―Network Security,
Private Communication in Public Worldǁ, PHI 2002, 2nd Edition.

Website 1.NPTEL & MOOC courses titled Network Security


/Link 2.https://nptel.ac.in/courses/106/105/106105031/

83
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Mapping with Programme Outcomes

CO Number
PO1 PO2 PO3 PO4

CO1 S M M L
CO2 S M L L
CO3 S M L L
CO4 M L S M
CO5 S M M L

S- Strong , M- Medium , L – Low

84
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

ELECTIVE - III:
Subject Title Semester VI
SOFTWARE ENGINEERING
Subject Code 23UCYSE09 Specialization NA
Type Elective : Theory L:T:P:C 71:5:0:4

COURSE OBJECTIVE:

1. To introduce the software development life cycles.


2. To introduce concepts related to structured and objected oriented analysis & design.
3. To provide an insight into UML and software testing techniques.

CO Number CO Statement Knowledge Level


CO1 Remember the basic concepts of software K1
Engineering.
CO2 Understanding requirement analysis. K1,K2
CO3 Apply software design. K3
CO4 Evaluate with UML. K4
CO5 Implement coding and testing. K5

85
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

ELECTIVE - III:
Subject Title Semester VI
SOFTWARE ENGINEERING
Subject Code 23UCYSE09 Specialization NA
Type Elective : Theory L:T:P:C 71:5:0:4
Unit Contents Levels Sessions
Introduction – Evolution – Software Development projects –
Emergence of Software Engineering.
I Software Life cycle models – Waterfall model – Rapid K1 15
Application Development – Agile Model – Spiral Model

Requirement Analysis and Specification – Gathering and


II K1,K2 15
Analysis – SRS – Formal System Specification
Software Design – Overview – Characteristics – Cohesion &
Coupling – Layered design – Approaches Function Oriented
III K3 15
Design – Structured Analysis – DFD – Structured Design –
Detailed design
Object Modeling using UML – OO concepts – UML –
IV Diagrams – Use case, Class, Interaction, Activity, State Chart K4 15
– Postscript

Coding & Testing – coding – Review – Documentation –


V Testing – Black-box, White-box, Integration, OO Testing, K5 11
Smoke testing.
Learning Resources

Text Books Rajib Mall, ―Fundamentals of Software Engineeringǁ, PHI 2018, 5th Edition.

1. Roger S. Pressman, ―Software Engineering - A Practitioner’s Approachǁ,


Reference McGraw Hill 2010, 7th Edition.
Books 2. Pankaj Jalote, ―An Integrated Approach to Software Engineeringǁ, Narosa
Publishing House 2011, 3rd Edition.
NPTEL online course – Software Engineering -
Website /
https://nptel.ac.in/courses/106105182/
Link

Mapping with Programme Outcomes

CO Number PO1 PO2 PO3 PO4


CO1 S M M L
CO2 S M L L
CO3 S M M L
CO4 M S L L
CO5 S M M L
S- Strong , M- Medium , L – Low

86
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

ALLIED OPTION I

SEMESTER I/III PAPER – I


Subject Title Semester I/III
FUNDAMENTALS OF COMPUTERS
Subject Code 23UCSA01 Specialization NA
Type Allied: Theory L:T:P:C 86:6:0:4

COURSE OBJECTIVE:
1. To Understand the basics of computers.
2. To prepare the students for the analyze of data processing.

CO
CO Statement Knowledge Level
Number
CO1 Remember the basics of computers. K1
CO2 Understand the number system. K2
CO3 Demonstrate the functions of computer system. K3
CO4 Study the input and output system . K4
CO5 Analyze of data processing. K5

87
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Subject SEMESTER I/III PAPER – I


Semester I/III
Title FUNDAMENTALS OF COMPUTERS
Subject
23UCSA01 Specialization NA
Code
Type Allied: Theory L:T:P:C 86:6:0:4
Unit Contents Levels Sessions
Introduction to Computer: Introduction – Types of computers
– Characteristics of Computers. Generations of Computers: First
Generation – Second Generation – Third Generation – Fourth
I K1 17
Generation – Fifth Generation. Classification of Digital Computers:
Introduction – Microcomputers – Personal Computer – Portable
Computers – Mini Computers – Super Computers – Main Frames.
Number System: Introduction – Decimal Number System – Binary
Number System – Binary-Decimal Conversion – Decimal Binary
Conversion – Binary Addition – Binary Subtraction –
II K2 17
Complements – 9's Complement – 10's Complement – 1's
Complements – 2's Complements – BCD - Bits, Bytes, Words –
Octal – Hexadecimal Number System.
Anatomy of Digital Computer : Functions and Components of
Computer – Central Processing Unit – Control Unit –
III Arithmetic – Logic Unit – Memory – Registers – Addresses. K3 17
Memory Units: RAM, ROM, PROM, EPROM, EEPROM, and
Flash Memory.
Input Devices: Introduction – Keyboard – Mouse – Types of Mice
– Connections – Mouse pad – Trackball – joystick – Digitizing
Tablet – Scanners – Digital Camera – MICR – OCR – OMR – Bar
IV Code Reader – Speech Input Device- Touch Screen – Touch Pad – K4 17
Light Pen. Output Devices: Introduction – Monitor – Classification
of Monitors – Monochrome – Gray Scale – Color – Digital Monitor
– Analog Monitor – Characteristics of monitor – Printers.
Computer Software:Introduction – Operating System – Utilities –
Compiler and Interpreters – Word Processor – Spreadsheets –
Presentation Graphics – DBMS – Programming Languages:
V Machine Language – Assembly Language – High level language – K5 18
Types of High Level Language. Data Processing: Data VS
Information – File Processing – Sequential File Processing – Direct
Access file Processing.
Learning Resources
Text Alexis Leon and Mathews Leon, ―Fundamentals of Computer Science and
Books Communication Engineeringǁ, Leon Techworld, 1998.

Reference 1. B Ram and Sanjay Kumar, ―Computer Fundamentalsǁ, 5th Edition, New Age
Books International Publishers, 2014.
2. Pradeep K Sinha, Priti Sinha, ―Computer Fundamentalsǁ, BPB Publications, 2004.
Anita Goel, ―Computer Fundamentalsǁ, 1st Edition, Pearson Education India, 2010.

88
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Website/ https://www.gopeople.edu/blog/the_basics_of_computer_science_how_to_get_started/
Link www.tutorialspoint.com>basics_of_computer

Mapping with Programme Outcomes

CO Number
PO1 PO2 PO3 PO4

CO1 S M M ---
CO2 M M - S
CO3 S M L M
CO4 M S M -
CO5 S M - L

S- Strong , M- Medium , L – Low

89
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

COMPUTER APPLICATIONS IN
Subject Title Semester II/IV
OFFICE
Subject Code 23UCSA02 Specialization NA
Type Allied: Theory L:T:P:C 56:4:0:4

COURSE OBJECTIVE:
1. To improve the quality of students in office automation process.
2. To prepare the students for various ability to prepare reports and presentations.

CO
CO Statement Knowledge Level
Number
CO1 K1
Remember the basics of MS word.
CO2 Understand MS word. K2
CO3 Demonstrate the functions of MS excel. K3
CO4 Study the basics of MS excel workbooks. K4
CO5 Analyze of data processing with MS power point. K5

90
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Subject
COMPUTER APPLICATIONS IN OFFICE Semester II/IV
Title
Subject
23UCSA02 Specialization NA
Code
Type Allied: Theory L:T:P:C 56:4:0:4
Unit Contents Levels Sessions

MS Word Exploring Word 2007: Working in the Word


Environment – Opening, Moving Around in, and closing
Document – Creating and Saving A Document – Previewing and
I K1 12
Printing Document – Editing and Proofreading Documents:
Making Changes to document – Inserting Saved Text – Finding
the Most Appropriate Word – Reorganizing a Document Outline –
Finding and Replacing Text – Correcting spelling and
Grammatical errors – Finalizing Document

MS Word Changing the Look of Text: Quickly Formatting Text


and Paragraphs – Manually changing the look of characters –
Manually changing the look of paragraphs – Creating and
II K2 12
modifying Lists-Presenting Information in Columns and Tables :
Presenting Information in Columns – Creating Tabular List –
Presenting Information in a Table – Formatting Table Information
– Performing Calculations in a Table- Using a Table to control
Page Layout.

MS Excel Setting Up a Workbook : Creating Workbooks –


Modifying Workbooks - Modifying Worksheets – Working with
Data and Data Tables : Entering and Revising Data – Moving K3 12
III Data within a Workbook- Finding and Replacing Data –
Correcting and Expanding Upon Worksheet Data – Defining a
Table – Performing Calculations on Data : Naming Groups of
Data – Creating Formulas to Calculate Values – Summarizing
Data that meets Specific Conditions –Finding and Correcting
Errors in Calculations- Changing Document Appearance.

IV MS-Access: Introduction – Parts of an Window: - Creating a New K4 10


Data Base – Table Wizard – Renaming – Saving the Database –
Relationships – Query – Form – Reports – Exiting MS-Access

MS PowerPoint Starting a New Presentation – Working with Slide


Text : Entering Text – Editing Text – Adding and Manipulating
Text Boxes –Correcting and Sizing text – Checking Spelling –
V Finding and replacing text and fonts – Changing the size, K5 10
Alignment, Spacing – Adjusting the Slide Layout, Order and Look
: Changing the Layout of a slide – Rearranging Slides in a
Presentation – Applying a theme -Switching to a Different Color
Scheme – Adding Shading and texture to the background of a
slide – Delivering a Presentation Electronically.

91
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Learning Resources
Text 1. Step by Step 2007 Microsoft Office System -Joyce Cox and Team ,PHI
Books learning Private ltd, New delhi 2009
2. Sanjay Saxena, ―MS-Office 2000 for everyoneǁ, Vikas Publishing House Pvt.
Ltd, Reprint 2006

Reference 1. Nellai Kannan, ―MS-Officeǁ, Nels Publications, 3rd Edition, 2004.


Books
2. John Walkenbach, Herb Tyson, Michael R.Groh, Faithe Wempen and Lisa
A.Bucki , ― Microsoft Office 2010 Bible ―, Wiley India Pvt. Ltd , Reprint
2010

1. https://ptgmedia.pearsoncmg.com/images/9780735623026/samplepag
es/9780735623026.pdf
2.https://www.dit.ie/media/ittraining/msoffice/MOAC_Excel_2016_Core. pdf
Website/
Link 3.https://ptgmedia.pearsoncmg.com/images/9780735697799/samplepag
es/9780735697799.pdf 2010

Mapping with Programme Outcomes

CO
PO1 PO2 PO3 PO4
Number
CO1 S M M M
CO2 S M L M
CO3 S S L M
CO4 M S L M
CO5 S M M L

S- Strong , M- Medium , L – Low

92
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Subject OFFICE AUTOMATION LAB


Semester II/IV
Title
Subject
23UCSAP01 Specialization NA
Code
Type Allied: Practical L:T:P:C 30:0:2:2

COURSE OBJECTIVE:
1. To enable the students to design and develop the Office applications.
2. To qualify the students working in editor, spread sheet and slide preparation.
3. To improve creative thinking in presentation software.
4.
LIST OF PROGRAMS
I. MS-WORD
1. Text Manipulation: Write a paragraph about your institution and Change the font size and type, Spell
check, Aligning and justification of Text.
2. Bio data: Prepare a Bio-data.
3. Find and Replace: Write a paragraph about yourself and do the following. Find and Replace - Use
Numbering Bullets, Footer and Headers.
4. Tables and manipulation: Creation, Insertion, Deletion (Columns and Rows). Create a mark sheet.
5. Mail Merge: Prepare an invitation to invite your friends to your birthday party. Prepare at least five
letters.

II. MS-EXCEL
1. Data sorting-Ascending and Descending (both numbers and alphabets).
2.Mark list preparation for a student.
3.Individual Pay Bill preparation.
4.Invoice Report preparation.
5.Drawing Graphs. Take your own table.

III. MS-POWERPOINT
1.Create a slide show presentation for a seminar.
2.Preparation of Organization Charts.
3.Create a slide show presentation to display percentage of marks in each semester for all students.
4.Use bar chart (X-axis: Semester, Y-axis: % marks).
5.Use different presentation template different transition effect for each slide.

COURSE OUTCOME:
On successful completion of the course, the students will
1. Understand the features in MS Word.
2. Select and apply worksheet and functions in MS EXCEL.
3. Combine multiple features in MS POWER POINT to prepare presentations.

93
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

ALLIED OPTION II

Subject Title DATABASE SYSTEMS Semester I/III

Subject Code 23UCSA03 Specialization NA


Type Allied: Theory L:T:P:C 86:6:0:4

COURSE OBJECTIVE:
1. To improve the understanding of database theory and practices.
2. To prepare the students implement database manipulation in SQL.

CO
CO Statement Knowledge Level
Number
CO1 K1
Remember the basics of Database.
CO2 Understand Database Systems Concept and Architecture. K2
CO3 Demonstrate the functions of the Relational Data Model K3
and SQL.
CO4 Study the basics of Basics SQL. K4
CO5 Analyze advanced SQL commands and statements. K5

94
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Subject DATABASE SYSTEMS


Semester I/III
Title
Subject
23UCSA03 Specialization NA
Code
Type Allied: Theory L:T:P:C 86:6:0:4
Unit Contents Levels Sessions
Introduction to Databases – Introduction - Characteristics of the
I Database Approach -Advantages of Using the DBMS Approach -A K1 14
Brief History of Database Applications.
Database Systems Concept and Architecture : Data Models,
Schemas, and Instances - Three Schema Architecture and Data
II Independence - Database Languages and Interfaces- - The Database K2 18
System Environment - Centralized and Client/Server Architectures
for DBMSs- Classification of Database Management Systems.
The Relational Data Model and SQL - Database Constraints -
Relational Model Concepts- Key concepts - Relational Model K3 18
III
Constraints and Relational Database Schemas - Update Operations,
Transactions, and Dealing with Constraint Violations.
Basic SQL - SQL Data Definition and Data Types - Specifying
Constraints in SQL - Basic Retrieval Queries in SQL - INSERT,
IV K4 18
DELETE, and UPDATE Statements in SQL - Additional Features
of SQL.
More SQL: Complex Queries, Triggers, Views, and Schema
Modification - More Complex SQL Retrieval Queries - Specifying
V K5 18
Constraints as Assertions and Actions as Triggers -Views (Virtual
Tables) in SQL.
Learning Resources
Text RamezElmasri and Shamkant B. Navathe, ―Fundamentals of database
Books systemsǁ,6thEdition, Addison-Wesley Publication, 2011.
Reference Raghu Ramakrishnan, Madison,Johannes Gehrke,―Database Management Systemsǁ, 3rd
Books Edition,McGraw-Hill Higher Education, 2003.
1.www.db-book.com/db7
Website/
2.www.mheducation.co.in
Link

95
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Mapping with Programme Outcomes

CO Number
PO1 PO2 PO3 PO4

CO1 S S M M
CO2 S M L S
CO3 S M L M
CO4 M S M M
CO5 S M L L

S- Strong , M- Medium , L – Low

96
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

E-COMMERCE TECHNIQUES
Subject Title Semester II/IV
Subject Code 23UCSA04 Specialization NA
Type Allied: Theory L:T:P:C 56:4:0:4

COURSE OBJECTIVE:
1. To improve the understanding of E-COMMERCE and E-payments.
2. To prepare the students implement HTML and E- mail creation.

CO
CO Statement Knowledge Level
Number
CO1 K1
Remember the basics of Ecommerce and Indian Business.
CO2 Understand WWW. K2
CO3 Demonstrate the E payment system. K3
CO4 Study the basics of Web Designing. K4
CO5 Analyze Email components. K5

97
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Subject E-COMMERCE TECHNIQUES


Semester II/IV
Title
Subject
23UCSA04 Specialization NA
Code
Type Allied: Theory L:T:P:C 56:4:0:4
Unit Contents Levels Sessions
History of E-commerce and Indian Business Context: E-Commerce
–Emergence of the Internet – Emergence of the WWW –
Advantages of E-Commerce – Transition to E-Commerce in India
– The Internet and India – E-transition Challenges for Indian
I Corporate. Business Models for E-commerce: Business Model – E- K1 12
business Models Based on the Relationship of Transaction Parties -
E-business Models Based on the Relationship of Transaction
Types.
.
Enabling Technologies of the World Wide Web: World Wide Web
– Internet Client-Server Applications – Networks and Internets –
II Software Agents – Internet Standards and Specifications – ISP.E- K2 12
Marketing : Traditional Marketing – Identifying Web Presence
Goals – Online Marketing – E-advertising – E-branding.
E-Payment Systems: Main Concerns in Internet Banking – Digital
Payment Requirements – Digital Token-based e-payment Systems
– Classification of New Payment Systems – Properties of K3 12
III Electronic Cash – Cheque Payment Systems on the Internet.
Information systems for Mobile Commerce: Introduction –
Wireless Applications – Cellular Network – Wireless Spectrum –
Technologies for Mobile Commerce – Wireless Technologies.
HTML and Web Designing: Brief History of HTML – HTML Tags
IV – Table Creation – Hyperlink – Reference – Headings – Alignment K4 10
- Simple Web Page Creation.

E-mail: Email – Email Components - use of Email–Email creation–


V K5 10
browsing–search engines–downloads.

Learning Resources
Text 1. P.T.Joseph, ―E-Commerce - An Indian Perspectiveǁ, 4th Edition, PHI Learning,
Books 2012.
2. C Xavier, ―World Wide Web Design with HTMLǁ, 13th Reprint, Tata McGraw
Hill, 2006.
3. A.Leon and M.Leon, ―Introduction to Information Technologyǁ, 1stEdition, Vijay
Nicole Publications, 2013.
Reference 1. David Whiteley, ―E-Commerce Strategy, Technologies and Applicationsǁ, 1st
Books Edition, Tata Mc-Graw-Hill, 2001.
2. Kamalesh K Bajaj and Debjani Nag, ―E-Commerce – The cutting edge of
Businessǁ, 2nd Edition, Tata McGraw-Hill Education, 2005.

98
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

3. Alexis Leon and Mathews Leon, ―Internet for Everyoneǁ, 15th Anniversary Edition,
Leon Tech world, UBS Publications, 2012.
4. Ritendra Goel, ―e-commerceǁ, New Age International Publishers, 2016.
https://e_commerce_pdf_download.peatix.com/
www.tutorialpoints.com/html
Website/
https://books.google.com/books/about/a//_wide_web_design_with_html.html?id
Link
=6apoxl=z4nwc

Mapping with Programme Outcomes

CO Number
PO1 PO2 PO3 PO4

CO1 S M L L
CO2 S M L L
CO3 S M L L
CO4 M S M M
CO5 S M M L

S- Strong , M- Medium , L – Low

Note: This paper should be handled and valued by Department of Computer Science
(Cyber Security).

99
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

ALLIED OPTION III

SEMESTER I/III PAPER – I


Subject Title Semester I/III
PROGRAMMING IN C

Subject Code 23UCSA05 Specialization NA

Type Allied: Theory L:T:P:C 56:4:0:4

Course objective:
1. To apprehend the basic concepts of C- Programming language. This course introduces
fundamental concepts such as arrays and structures.
2. It covers concepts such as arrays, pointers and file handling methods.
3. It provides technical skills to design and develop various applications.

CO
CO Statement Knowledge Level
Number
CO1 Recognize the Basic Terminologies of C K1
Programming
CO2 Understanding the statement structure and apply K2,K3
simple problems
CO3 Understand and apply the pre-defined functions K3
and user defined functions and then apply in
simple problems
CO4 Demonstrate the operation of Structures and K3,K4
unions.
CO5 Recognize the operation of Files K3,K4

100
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

ALLIED PRACTICAL - II
Subject
HTML PROGRAMMING Semester II/IV
Title
Subject
23UCSAP02 Specialization NA
Code
Type Allied: Practical L:T:P:C 30:0:2:2

COURSE OBJECTIVE:
1. To enable the students to design and develop the WEB PAGES.
2. To qualify the students working with tags in table .
3. To improve creative thinking in forms ,lists and frames.

LIST OF PROGRAMS

1. Write HTML code to develop a web page that contains the different background and foreground color,
with various styles.
2. Write HTML code to create a Webpage that contains an Image at its left hand side of the page when user
clicks on the image; it should open another web page that displays the details of that image.
3. Create a web Page using HREF tag having the attribute ALINK, VLINK etc.
4. Create a web page, when user clicks on the link it should go to the bottom of the page.
5. Write a HTML code to create a web page of pink color and display moving message in red color.
6. Create a web page, showing an ordered list of name of your five friends and unordered list of any five
your hobbies.
7. Create a HTML document containing a nested list showing the content page of any book.
8. Create a student mark list in HTML using Tables.
9. Create a HTML page to demonstrate the usage of Frames. Choose the content of the page on your own.
10. Design an application for pay slip through HTML forms.

COURSE OUTCOME:
On successful completion of the course, the students will

1. Understand the features in HTML.


2. Select and apply tags for create text, list and table.
3. Combine multiple features in forms, frames and texts.

Note: For University Practical Exam, both Internal and External should be appointed from
Department of Computer Science (Cyber Security).

101
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Subject SEMESTER I/III PAPER – I


Semester I/III
Title PROGRAMMING IN C

Subject
23UCSA05 Specialization NA
Code

Type Allied: Theory L:T:P:C 56:4:0:4

Unit Contents Levels Sessions


Overview of C: History of C - Importance of C - Basic structure of
C programs. Constants, variables and data types: Character set - C
Tokens - Keywords and identifiers - Constants - Variables - Data
types - Declaration of Variables- Declaration of storage classes -
Assigning values to variables - Defining symbolic constants.
I Operators and expression: Types of Operators - Arithmetic K1 12
Expressions- Evaluation of expressions - Precedence of arithmetic
operators - Type conversions in expressions - Operator precedence
and associativity. Managing input and output operations: Reading
and writing a character - Formatted input and output.

Decision making and branching: Simple IF, IF-ELSE, Nesting of


IF-ELSE, ELSE-IF ladder, Switch statements- GOTO statements.
Decision making and looping: WHILE statement - DO statement -
II FOR statement - Jumps in loops. Arrays: Definition & Detection - K2 12
One dimensional - Two dimensional - Multi dimensional arrays -
Dynamic arrays.

Character arrays and strings: Introduction - Declaring and


initializing string variables- Reading strings from terminal -
Writing strings to screen - String handling functions - Table of K3 12
strings. User - Defined functions: Introduction - Need for user -
defined function - A Multi - function program - Elements of user -
III defined function - Definition of functions - Return values and their
types - Function calls - Function declaration - All category of
functions - Nesting of functions - Recursion - Passing arrays to
functions - Passing strings to function.

Structures and Unions: Introduction - Defining a structure -


IV Declaring structure variables - Accessing structure members - K4 10
Structure initialization - Copying and comparing structure variables

102
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

- Arrays of structures - Arrays within structures -Structure within


structures - Structures and functions - Unions - Size of structures -
Bits fields.

Pointers: Introduction - Understanding pointers - Accessing the


address of a variable - Initializing of pointer variables. Chain of
pointers - Pointer expression - Pointers and arrays - Pointers and
character strings - Arrays of pointers - Pointers as function
arguments - Functions returning pointers - Pointers to functions -
V K5 10
Pointer and structures. File Management: Introduction - Defining
and opening a file - Closing a file – Input/Output operation on files
– Error handling during I/O operations – Random access files –
Command line arguments.

Learning Resources

Text books Programming in ANSI C, E. Balgurusamy Tata McGraw Hall, New Delhi, 5th Edition.

Reference 1. Schaum’s outlines, programming with C, Byron S Gottfried, 2nd Edition.


Books 2. Let Us C.Yashavant Kanetkar.

http://www.learn-c.org/
Website/
Link http://crasseux.com/books/ctutorial/

Mapping with Programme Outcomes

CO
PO1 PO2 PO3 PO4
Number
CO1 S S S -
CO2 S M M S
CO3 S L L M
CO4 M S M S
CO5 S L S S
S- Strong , M- Medium , L – Low

103
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Subject
PROGRAMMING IN VISUAL BASIC Semester II/IV
Title

Subject
23UCSA06 Specialization NA
Code

Type Allied: Theory L:T:P:C 56:4:0:4

Course objective:
 To introduce the basics of VB.
 To understand the concepts MDI Applications, ADO and Active X.
 To improve creative thinking in creating forms.

CO Number CO Statement Knowledge Level

CO1 K1
Remember the basics of VB.

CO2 Understand data and files in VB. K2

CO3 Demonstrate the MDI Applications. K3

CO4 Study of data control. K4

CO5 Analyze the ADO and Active X. K5

104
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Subject
PROGRAMMING IN VISUAL BASIC Semester II / IV
Title

Subject
23UCSA06 Specialization NA
Code

Type Allied: Theory L:T:P:C 56:4:0:4

Unit Contents Levels Sessions


Welcome to Visual Basic – Creating an Application – IDE
I Forms and Controls – Variables in Visual Basic. K1 10

II Writing Code in Visual Basic – Working with File – Menu K2 10


Multiple Document Interface Applications – Debugging Tips –
III The Common Dialog Control. K3 12

Introduction to Database – Working with the Data Control –


IV Data Access Objects. K4 12

V ActiveX Data Objects – Crystal and Data Report – Active X.


K5 12
Learning Resources

Text books Programming with Visual Basic 6.0, Mohammed Azam, Vikas Publishing House Pvt.
Ltd., Chennai.

Reference 1. Gary Cornell, "Visual Basic 6 from the Ground up", McGraw-Hill
Books Education,1998
2. Julia Case Bradley and Anita C.Millspaugh, "Programming in Visual Basic 6.0",
Tata McGraw-Hill Edition, 2011.
Website/  NPTEL & MOOC courses titled VB
Link  https://www.freetutes.com/learn-vb6/
Mapping with Programme Outcomes

CO Number
PS01 PS02 PS03 PS04

CO1 S M M --
CO2 M S L -
CO3 S M L M
CO4 S M M L
CO5 S M L L

S- Strong , M- Medium , L – Low

105
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

Subject PROGRAMMING IN C & VISUAL BASIC


Semester II/IV
Title PRACTICAL
Subject
23UCSAP03 Specialization NA
Code
Type Allied: Practical L:T:P:C 30:0:2:2

COURSE OBJECTIVE:

1. To impart Practical Training in C Programming Language.

2. Familiarize the different control and decision making statements in ―Cǁ.

3. Build programs using arrays and strings.

4. Provide knowledge on working with files and functions.

PROGRAMMING IN C PRACTICAL LIST :

1. Create a program to find the Simple Interest.


2. Create a program to find the Arithmetic Mean and Standard Deviation.

3. Create a program to find the Biggest value among given 3 number.


4. Create a program to calculate the Area of perimeter of square and rectangle.
5. Create a program to convert Binary to Decimal conversion.
6. Create a program to convert Decimal to Binary conversion.
7. Create a program to print the Fibonacci series using Recursion.
8. Create a program to swap the given two integers.
9. Create a program to print the factorial of a number.
10. Create a program to display the multiplication table.

106
B.Sc Computer Science Syllabus under CBCS Pattern with effect from 2021-2022

PROGRAMMING IN VISUAL BASIC PRACTICAL LIST:

1. Write a VB program to implement Forms.


2. Write a VB program to implement Input box, and Message box.
3. Write a VB program to implement Control Statements and Loops.
4. Write a VB program to implement Command box, Option button, and Check box.
5. Write a VB program to implement Combo box, List box, and Scroll bars.
6. Write a VB program to implement Timer.

7. Write a VB program to implement MDI Forms.


8. Write a VB program to implement DAO.
9. Write a VB program to implement ADO.
10. Write a VB program to implement a Calculator.

COURSE OUTCOME:
1. Study all the Basic Statements in C Programming.
2. Practice the usage of branching and looping statements.
3. Apply string functions and arrays usage.
4. Analysis the use of pointers and files.
5. Understand the features in VB.
6. Select and apply statements for design forms.
7. Combine multiple features in interface and database.

. .
Note: For University Practical Exam, both Internal and External should be appointed from
Department of Computer Science (Cyber Security) .

107

You might also like