0% found this document useful (0 votes)
12 views10 pages

Syllabus 8 Sem B.tech CyberSecurity

Uploaded by

er.ajaydhiwar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views10 pages

Syllabus 8 Sem B.tech CyberSecurity

Uploaded by

er.ajaydhiwar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Chhattisgarh Swami Vivekananda Technical University, Bhilai (C.G.

)
Program / Semester: B.Tech (VIII Sem) Branch: Cyber Security
Subject: Block Chain in Cyber Security Course Code: D131811(022)

Total / Minimum-Pass Marks (End Semester Exam): 100/35 L: 3 T: 1 P: 0 Credits: 4


Class Tests & Assignments to be conducted: 2 each Duration (End Semester Exam): 03 Hours

Course Objectives:
1. Introduce the fundamentals and significance of blockchain technology and consensus mechanisms.
2. Explain cryptographic techniques including hashing, digital signatures, and encryption in blockchain
security.
3. Analyse consensus protocols and identify blockchain vulnerabilities and attack vectors.
4. Develop and deploy smart contracts using Solidity and understand EVM interactions.
5. Evaluate smart contract security issues through case studies and explore blockchain
governance and cybersecurity.

UNIT-I: Blockchain and Smart Contract Fundamental : Introduction to Blockchain, Importance of Blockchain,
need of Blockchain, types of blockchain, Decision Tree, Consensus Mechanism
Cryptography, Hashing, and Digital Signatures: Introduction, Hashing, Hash Function Characteristics, Digital
Signatures, Data Encryption, Denial of Serviceman-in-The-Middle Attack, System Resiliency, Infrastructure
Hardening.

UNIT-II: Consensus Protocols: Proof of Work, Security Issues in Proof of Work, Proof of Stake, Security Issues in
Proof of Stake, Other Consensus
Type of Blockchain Vulnerabilities and Attacks: Network and Consensus Security Issues, Smart Contract
and Code Security Issues, Wallet and Client Security Issues, Centralization security Issues, User Security
Issues.

UNIT-III: Cyber security for Blockchain: Introduction, CIA Triad, AAA of Security, Non-repudiation, Risk
Measurement, Blockchain Governance, Quantum Computing, Smart Contracts.

UNIT-VI: Solidity: Solidity Language Overview, Storage, Memory, and Call Data, Function Selectors, Interacting
with EVM Smart Contracts, Compiling and Deploying Contracts

UNIT-V: Smart Contract Security Issues: Security Hacks on Ethereum, Common Vulnerabilities and Attacks, Case
Study: The DAO Hack, Case Study: The Poly-Network Hack.

Text Books:
1) Ashutosh Saxena “Blockchain Technology: Concepts and Applications”
2) Makoto Yano “Blockchain and Crypto Currency

Reference book:
1) Anand Shinde “Introduction to Cyber Security”

Course Outcomes:
▪ To learn the basics of Blockchain Concepts & Architecture.
▪ To explore knowledge of various process of Cyber-attacks on blockchain.
▪ To understand the basics of security issues.
▪ To implies the basic of solidity and its deployment.
▪ To Assess smart contract security issues through real-world case studies and propose mitigation
strategies for common vulnerabilities.
Chhattisgarh Swami Vivekananda Technical University, Bhilai (C.G.)
Program / Semester: B.Tech (VIII Sem) Branch: Cyber Security
Subject: Identity and Access Management Course Code: D131831(022)
(Professional Elective–IV)
Total / Minimum-Pass Marks (End Semester Exam):100/35 L: 2 T: 1 P: 0 Credits: 3
Class Tests & Assignments to be conducted: 2 each Duration (End Semester Exam): 03 Hours
x
Course Objectives:

1. Understand the principles, frameworks, and challenges of Identity and Access Management (IAM) systems.
2. Explore authentication and authorization protocols including LDAP, SAML, OAuth, and OpenID Connect.
3. Analyse Privileged Access Management (PAM) components and access control models like RBAC.
4. Examine Identity Governance and Administration (IGA) processes including onboarding, auditing, and lifecycle
management.
5. Learn data governance, protection strategies, and compliance with industry laws and incident response processes.

UNIT-I
Identity and access management (IAM): framework, key principles, Capability maturity framework, Common challenges
and key considerations: Governance, program delivery, sustain compliance, identity lifecycle, control access, operations.
Identity and access intelligence, peer group, outlier analysis, role analysis, resource allocation and analysis, risk and
fraud systems integration, Kerberos, biometrics, Okta platform, security concepts: job rotation, least privileges,
separation of duty.
Cloud based IAM, deployment models, service models, security and risk management. Access request, approval and
provisioning: system overview, key components, data management, authentication, authentication implementation
approaches, authorization, logging and monitoring, access review and certification process.

UNIT-II
LDAP: Basics, Configuration, Managing data, operational consideration. SAML: assertions, protocols, profiles, OAuth:
roles, tokens, grants. OpenID connect, proxy: load balancing, access control and security, rate limiting, Caching and
compression, telemetry, monetization, API v Web proxies, open-source web proxies. Strong Authentication: OTP,
HOTP, TOTP, mutual SSL/TLS, FIDO, W3C web authentication and CTAP.

UNIT-III
Privileged Access Management (PAM), Privileged Account, Privileged Account Monitoring, PAM components:
credential management, access management, session management, logging, security, reporting, Application whitelisting.
Types of access control models, RBAC model, access management life cycle, RBAC implementation considerations.
Future of identity and access management

UNIT-IV
Identity Governance and Administration (IGA), User Onboarding, User Termination & Role changes, Access control
models, Access validation & certification, Segregation of Duties, Auditing and Reporting, Identity lifecycle
management, cross domain identity management.

UNIT-V
Data Governance and Protection, data types, intellectual property, data classification, industry and local laws &
regulations, Data type management & monitoring, security policy framework, data breach and incident response process,
notifiable data breaches.

Text Books:
1. Identity and Access Management by Ertem Osmanoglu, Syngress, 2013.
2. Securing the Perimeter: Deploying identity and access management with free open source software by Michael
Schwartz, Maciej Machulak, Apress, 2018.
Reference Books :

1. Keycloak - Identity and Access Management for Modern Applications: Harness the power of Keycloak, OpenID
Connect, and OAuth 2.0 protocols to secure applications by Stian thorgersen,Packt publishing ltd, 2021.
2. Focus on IAM (Identity and Access Management): CSFs, metrics, checklists, best practices, and guidelines for
defining IAM processes and implementing IAM solutions by Kiran Kumar Pabbathi, ServiceManagers.org,2014.
3. Digital Identity and Access Management: Technologies and Frameworks (Premier Reference Source) 1st Edition
by Raj Sharman, Sanjukta Das Smith, Manish Gupta.

Course Outcomes:
· Understanding of fundamentals and frameworks of identity and access management
· Application and usage of various authentication protocols
· Study of Injection vulnerabilities against hacking and web attacks
· Understanding of identity governance and data governance.
· Enforce data governance and security policies for breach prevention
Chhattisgarh Swami Vivekananda Technical University, Bhilai (C.G.)
Program / Semester: B.Tech (VIII Sem) Branch: Cyber Security
Subject: Biometric Security (Professional Elective–IV) Course Code: D131832(022)
Total / Minimum-Pass Marks (End Semester Exam):100/35 L: 2 T: 1 P: 0 Credits: 3
Class Tests & Assignments to be conducted: 2 each Duration (End Semester Exam): 03 Hours

Course Objectives :

1. Understand the fundamentals, functionalities, and design principles of biometric systems and their applications.
2. Explore fingerprint and facial recognition techniques including acquisition, feature extraction, and matching.
3. Analyse iris recognition systems and other biometric traits like ear, gait, and hand geometry.
4. Examine behavioural biometrics such as signature, keystroke dynamics, and voice, along with their challenges.
5. Investigate biometric system applications, architecture, deployment, and privacy concerns.

UNIT I
INTRODUCTION: Person Recognition – Biometric systems –Biometric functionalities: verification, identification –
Biometric systems errors - The design cycle of biometric systems – Applications of Biometric systems – Security and
privacy issues.

UNIT II
FINGER PRINT AND FACIAL RECOGNITION: FINGERPRINT: Introduction – Friction ridge pattern- finger print
acquisition: sensing techniques, image quality –Feature Extraction –matching –indexing. FACE RECOGNITION:
Introduction –Image acquisition: 2D sensors ,3D sensors- Face detection-Feature extraction –matching.

UNIT III
IRIS AND OTHER TRAITS: Design of an IRIS recognition system-IRIS segmentation- normalization – encoding and
matching IRIS quality –performance evaluation –other traits- ear detection – ear recognition –gait feature extraction and
matching –challenges- hand geometry –soft biometrics.

UNIT IV
BEHAVIORAL BIOMETRICS: Introduction –Features- classification of behavioural biometrics –properties of
behavioural biometrics – signature –keystroke dynamics –voice- merits –demerits –applications- error sources-types –
open issues –future trends.

UNIT V
APPLICATIONS AND TRENDS: Application areas: surveillance applications- personal applications –
design and deployment -user system interaction-operational processes – architecture – application
development –design validation-disaster recovery plan-maintenance-privacy concerns.

TEXT BOOKS:
1. James wayman, Anil k. Jain ,Arun A. Ross ,Karthik Nandakumar, ―Introduction to Biometrics‖, Springer, 2011
2. John Vacca "Biometrics Technologies and Verification Systems" Elsevier 2007
REFERENCE BOOKS:
1. James Wayman, Anil Jain, David Maltoni, DasioMaio(Eds) "Biometrics Systems Technology", Design and
Performance Evalution. Springer
2. Khalid saeed with Marcin Adamski, Tapalina Bhattasali, Mohammed K. Nammous, Piotr panasiuk, mariusz
Rybnik and Soharab H.Sgaikh, ―New Directions in Behavioral Biometrics, CRC Press
3. Paul Reid "Biometrics for Network Security "Person Education 2004
4. Shimon K. Modi, Biometrics in Identity Management :concepts to applications‖, Artech House 2011.

Course Outcomes:
· Identify the various Biometric technologies.
· Design of biometric recognition for the organization.
· Develop simple applications for privacy.
· Understand the need of biometric in the society
· Apply biometric systems in real-world applications considering privacy and deployment challenges
Chhattisgarh Swami Vivekananda Technical University, Bhilai (C.G.)
Program / Semester: B.Tech (VIII Sem) Branch: Cyber Security
Subject: Intrusion Detection and Prevention Course Code: D131834(022)
(Professional Elective–IV)
Total / Minimum-Pass Marks (End Semester Exam): 100/35 L: 2 T: 1 P: 0 Credits: 3
Class Tests & Assignments to be conducted: 2 each Duration (End Semester Exam): 03 Hours

Course Objectives :
1. Understand the architecture, components, and detection methodologies of IDPS technologies.
2. Analyse host and network-based attacks and apply defense mechanisms including encrypted protocols and port security.
3. Explore network behaviour analysis and honeypot deployment for intrusion detection and traffic monitoring.
4. Work with SNORT IDS to configure rules, plugins, and integrate with databases for effective threat detection.
5. Examine multiple and wireless IDPS technologies, their integration, and detection of hybrid device attacks.

UNIT-I
Introduction to IDPS: Introduction of Intrusion detection and Prevention Systems (IDPS), Components and Architecture
Implementation, Uses of IDPS Technologies, Key Functions, Common Detection Methodologies--Signature, Anomaly
and Stateful Protocol Analysis, Types of IDPS Technologies.
Host and Network IDPS: Application, Transport, Network and Hardware Layer attacks, Sniffing Network Traffic,
Replay Attacks, Command Injection, Internet Control Message Protocol Redirect, DDoS, Dangers and defences with Man-
in the Middle, Secure Socket Layer attacks, DNS Spoofing, Defence- in-Depth Approach, Port Security, Use Encrypted
Protocols.

UNIT-II
Network Behaviour Analysis: Components and Architecture Typical, Network Architecture, Sensor Locations.
Honeypots: Honeynets- Gen I, II and III, Detecting the Attack - Intrusion Detection, Network Traffic Capture, Monitoring
on the box, Setting up the Realistic Environment, Open Canary, Cowrie honeypots deployment.

UNIT-III
Working with SNORT IDS: Introduction to Snort, Snort Alert Modes and Format, Working with Snort Rules, Rule
Headers, Rule Options, The Snort Configuration File etc, Plugins, Pre-processors and Output Modules, Using Snort with
MySQL.

UNIT-IV
Multiple IDPS Technologies: Need for multiple IDPS Technologies, Integrating Different IDPS Technologies - Direct
and Indirect, Firewalls, Routers and Honeypots, IPS using IP Trace back - Probabilistic and Deterministic Packet Marking,
Marking.

UNIT-V
Wireless IDPS: Exception WLAN Standards, WLAN Components, Threats against WLANs, 802.11 Wireless
Infrastructure Attacks, WEP Attacks, Wireless Client Attacks, Bluetooth Attacks, Cell phones, Personal Digital
Assistance and Other Hybrid Devices Attack Detection, Jailbreaking.

TEXT BOOKS:
1. Shui Yu, Distributed Denial of Service Attack and Defense, Springer, 2014.
2. Bradd Lhotsky, OOSEC Host based Intrusion detection, PACKT Publication, 2013.
REFERENCE BOOKS:
1. Sandeep Kumar Shukla, Manindra Agrawal, Cyber Security in India, Springer, 2020.

Course Outcomes:
· Understand IDPS components, architectures, and detection methodologies.
· Analyse host and network-based attacks and apply layered defense strategies.
· Deploy and configure honeypots and network behaviour analysis tools.
· Implement and manage SNORT IDS and integrate multiple IDPS technologies.
· Evaluate wireless IDPS threats and apply detection techniques for hybrid devices.
Chhattisgarh Swami Vivekananda Technical University, Bhilai (C.G.)
Program / Semester: B.Tech (VIII Sem) Branch: Cyber Security
Subject: Social Networks (Professional Elective–IV) Course Code: D131833(022)
Total / Minimum-Pass Marks (End Semester Exam):100/ 35 L: 2 T: 1 P: 0 Credits: 3
Class Tests & Assignments to be conducted: 2 each Duration (End Semester Exam): 03 Hours
Course Objectives:

1. Understand the evolution of the Semantic Web and key concepts in social network analysis.
2. Explore ontology-based knowledge representation and data modelling for social networks.
3. Apply techniques for extracting and mining communities in web-based social networks.
4. Analyse and predict human behaviour using social data and reality mining approaches.
5. Examine privacy, trust models, and context-aware issues in online social networks
UNIT-I
INTRODUCTION: Introduction to Semantic Web: Limitations of current Web - Development of Semantic Web -
Emergence of the Social Web - Social Network analysis: Development of Social Network Analysis - Key concepts and
measures in network analysis - Electronic sources for network analysis: Electronic discussion networks, Blogs and online
communities -
Web-based networks - Applications of Social Network Analysis.
UNIT-II
MODELLING, AGGREGATING AND KNOWLEDGE REPRESENTATION : Ontology and their role in the Semantic
Web: Ontology-based knowledge Representation - Ontology languages for the Semantic Web: Resource Description
Framework - Web Ontology Language - Modeling and aggregating social network data: State-of-the-art in network data
representation - Ontological representation of social individuals - Ontological representation of social relationships -
Aggregating and reasoning with social network data – Advanced representations.
UNIT-III
EXTRACTION AND MINING COMMUNITIES IN WEB SOCIAL NETWORKS : Extracting evolution of Web
Community from a Series of Web Archive - Detecting communities in social networks - Definition of community -
Evaluating communities
- Methods for community detection and mining - Applications of community mining algorithms - Tools for
detecting communities social network infrastructures and communities - Decentralized online social networks.
UNIT-IV
PREDICTING HUMAN BEHAVIOUR : Understanding and predicting human behaviour for social communities - User
data management - Inference and Distribution - Enabling new human experiences - Reality mining
UNIT-V
PRIVACY ISSUES : Context - Awareness - Privacy in online social networks - Trust in online environment - Trust
models based on subjective logic - Trust network analysis.

TEXT BOOKS:
1. Peter Mika, Social Networks and the Semantic Web‖, First Edition, Springer 2007.
2. Borko Furht, Handbook of Social Network Technologies and Applications, 1st Edition, Springer, 2010.

REFERENCES BOOKS:
1. Guandong Xu ,Yanchun Zhang and Lin Li, Web Mining and Social Networking Techniques and applications‖,
First Edition, Springer, 2011.
2. Dion Goh and Schubert Foo, Social information Retrieval Systems: Emerging Technologies and
Applications for Searching the Web Effectively‖, IGI Global Snippet, 2008.

Course Outcomes:
· Demonstrate proficiency in the use of social networks for business and personal use
· Demonstrate proficiency in the use of social network analysis concepts and techniques.
· Demonstrate proficiency in the use of social network developer tools.
· Examine the various types of processors and demonstrate proficiency in the use of social network
concepts for solving real world issues.
· Explore applications and design strategies for deploying semantic and social web systems.
Chhattisgarh Swami Vivekananda Technical University, Bhilai (C.G.)
Program / Semester: B.Tech (VIII Sem) Branch: Cyber Security
Subject: Cyber Security Block Chain (Lab) Course Code: D131821(022)

Total / Minimum-Pass Marks (End Semester Exam): 40/ 20 L: 0 T: 0 P: 2 Credits: 1

Lab Outcomes:
Students will be able to understand:
· Implement solidity programming language.
· Implement various process of blockchain network.
· Implement meta mask to execute the smart contract.
· Implement various type of smart contract and its deployment.

List of Programs:
1. Write a program in remix that calculate the prime number in solidity.
2. Write a program to implement various hash function used in cryptography Technique.
3. Deposit some Ether in your MetaMask accounts.
4. Create several accounts and make some transactions between these accounts on Rinkeby Network.
5. Test some properties of cryptographic hashing like small change in input results in big change in output.
6. Write a smart contract in remix that execute different data types in solidity.
7. Write a smart contract in remix that execute different Error handling functions in solidity.
8. Write a smart contract in remix that execute concept of inheritance in solidity.
9. Write a smart contract in remix that execute different loops in solidity.
10. Write a program in remix that execute different events in solidity.
Chhattisgarh Swami Vivekananda Technical University, Bhilai (C.G.)
Program / Semester: B.Tech (VIII Sem) Branch: Cyber Security
Subject: Advance AI (Lab) / Linux (Lab) Course Code: D131822(022)

Total / Minimum-Pass Marks (End Semester Exam): 40 / 20 L: 0 T: 0 P: 2 Credits: 1

Lab Outcomes:
Students will be able to understand:

· Solve AI problems using constraint satisfaction and search algorithms.


· Implement game-playing strategies using Mini-max and Tic-Tac-Toe.
· Develop basic AI applications like chatbots and problem-solving agents.
· Apply machine learning techniques using Naïve Bayes models.
· Demonstrate pathfinding and optimization using BFS, DFS, A*, and Hill Climbing.

List of Experiments (to be conducted in python):

1. Write a program to solve constraint satisfaction problems.


2. To Implement Mini-max algorithm for game playing.
3. Write a program to implement simple Chat bot.
4. To implement Naïve Bayes Models.
5. Write a program to Implement of Towers of Hanoi Problem.
6. Write a Program to Implement Breadth First Search.
7. Write a Program to Implement Depth First Search.
8. Write a program to implement Hill Climbing Algorithm.
9. Write a program to implement A* Algorithm.
10. Write a program to implement Tic-Tac-Toe game.
11. Write a program to implement Water Jug Problem.

You might also like