Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
)
Scheme of Teaching and Examination
M.Tech. Computer Science & Engineering
Specialization in Cyber Forensic & Information Security
Semester – I
Scheme Of
Periods per Credi
Examination Total
Board of Subject week t
S.No Subject Mar
studies Code L+(T
Theory/Practical ks
+P)/2
L T P ESE CT TA
Mathematical
Foundation
Applied
1. 587111(14) of 3 1 - 100 20 20 140 4
Mathematics
Information
Security
Data
Computer Sc. &
2. 587112(22) Communicati 3 1 - 100 20 20 140 4
Engg.
on
Cryptograph
Computer Sc. &
3. 587113(22) y & Network 3 1 - 100 20 20 140 4
Engg.
Security
Computer Sc. & Cyber
4. 587114(22) 3 1 - 100 20 20 140 4
Engg forensics
5. Refer Table – I Elective – I 3 1 - 100 20 20 140 4
Computer Sc. & Information
6. 587121(22) - - 3 75 - 75 150 2
Engg Security Lab
Digital
Signal &
Computer Sc. &
7. 587122(22) Image - - 3 75 - 75 150 2
Engg
Processing
Lab
Total 15 5 6 650 100 250 1000 24
Table - I
Elective – I
Text Books :
1. J.P. Tremblay and R. Manohar, “Discrete Mathematical Structures with applications to Computer
Science”, TataMcGraw-Hill, 2000.
2. Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, “Handbook of Applied
Cryptography”, CRC Press, 2000.
Reference Books :
1. C.L. Liu, “Elements of Discrete Mathematics”, Tata McGraw-Hill, 2002.
2. Jonathan Katz, Yehuda Lindell, “Introduction to Modern Cryptography: Principles and
Protocols”, Ramat Gan, CRC Press Series, 2002.
Semester : I Branch: Cyber Forensic & Information Security
Subject: Data Communication Code : 587112(22)
Total Tutorial Periods: 12 Total Theory Periods: 40
Total Marks in End Semester Exam: 100 Minimum number of Class tests to be conducted: 02
UNIT-I
Introduction
Introduction - OSI reference model-TCP/IP reference model-Electrical interface-Transmission media-
Attenuation-data transmission basics-asynchronous transmission– synchronous transmission - error
detection methods.
UNIT-II
Protocol
Introduction – Error control-Idle RQ - continuous RQ - Character oriented protocols –simplex - half
duplex - duplex protocol - Bit oriented protocol – HDLC
UNIT-III
Local area networks:
Introduction – Wired LANs – Ethernet, Token bus Token Ring, FDDI-Wireless LANs- Bridges-
Transparent bridges, source routing bridges
UNIT-IV
Internetworking
Internet Protocols-Principles of Internetworking-connectionless internetworking-Ipv4-IPv6 - Internetwork
operation - Routing protocols
UNIT-V
Transport & Application Layer
Transport protocols-connection oriented service-TCP-TCP congestion control-UDPNetwork security-
public key encryption and digital signatures-Introduction to Application layer.
Text Books :
1. William Stalling,”Data & Computer Communications”, 6th edition, Pearson Education, 2003.
2. Douglas E. Comer and Ralph E. Droms,” Computer Networks and Internet”, 3rd edition, Pearson
Education, 2001.
Reference:
1. Fred Halsal,”Data Communication, Computer Networks and Open Systems”,Pearson Education, 2001
2. Andrew S. Tanenbaum,”Computer Networks”, 4th edition, PHI, 2000.
Semester : I Branch: Cyber Forensic & Information Security
Subject: Cryptography and Network Security Code : 587113(22)
Total Tutorial Periods: 12 Total Theory Periods: 40
Total Marks in End Semester Exam: 100 Minimum number of Class tests to be
conducted: 02
Unit I
Overview: OSI security architecture - Security Attacks- Security Services Security Mechanisms.
Unit II
Symmetric Ciphers: Classical Encryption Techniques - Block ciphers and Data Encryption Standards.
Public-key Encryption and Hash Functions: Public-Key Cryptography and RSA.
Unit III
Network Security Practices: Authentication applications: Kerberos – X.509 Authentication Service –
public-key Infrastructure - Electronic Mail Security: Pretty Good Privacy – S/MIME
Unit IV
Network Security Practices: IP Security: Overview – IP Security Architecture –Authentication Header –
Encapsulating Security Payload – Combining Security Associations – Key Management – Web security:
Web security considerations SSL and Transport Layer Security.
Unit V
System Security: Intruders: Intrusion Detection – Password Management –Malicious Software: Virus and
related threats – Denial of Service attacks – Firewalls : Firewall design principles – Trusted systems –
Common Criteria for IT security evaluation.
Text Book:
1. “Cryptography and Network Security – Principles and Practices”, William Stallings Prentice-Hall,
Fourth edition, Nov 2005
2. “Cryptography and Network Security, Atul Kahate”, McGraw Hill Education (India) Private Limited;
Third edition
Reference:
1. “Introduction to cryptography”, Johannes A, Buchanan, Springer-Verlag, Second Edition, 2004.
2. “Applied Cryptography: Protocols & Algorithms”, Schneier & Bruce, MGH International.
3. “Cryptography and Security – by Dr T R Padmanabhan N Harini “, Wiley India Pvt Ltd, 2011.
Semester : I Branch: Cyber Forensic & Information Security
Subject: Cyber Forensics Code : 587114(22)
Total Tutorial Periods: 12 Total Theory Periods: 40
Total Marks in End Semester Exam: 100 Minimum number of Class tests to be conducted: 02
Unit I
Cyber forensics
Introduction to Cyber forensics, Information Security Investigations , Corporate Cyber Forensics,
Scientific method in forensic analysis, Investigating large scale Data breach cases., Analyzing Malicious
software.
Unit II
Ethical Hacking
Essential Terminology, Windows Hacking , Malware, Scanning, Cracking.
Unit III
Digital Evidence in Criminal Investigations
The Analog and Digital World, Training and Education in digital evidence, The digital crime scene,
Investigating Cybercrime, Duties Support Functions and Competencies.
Unit IV
Investigating Network Intrusions and Cyber Crime, Network Forensics and Investigating logs,
Investigating network Traffic, Investigationg Web attacks, Router Forensics.
Unit V
Cyber forensics tools and case studies.
Text Book:
1. CyberForensics: Understanding Information Security Investigations (Springer's Forensic
Laboratory Science Series) by Jennifer Bayuk
2. Handbook of Digital and Multimedia Forensic Evidence [Paperback] John J. Barbara
References:
1. Live Hacking: The Ultimate Guide to Hacking Techniques & Countermeasures for Ethical Hackers
& IT Security Experts Ali Jahangiri
2. Computer Forensics: Investigating Network Intrusions and Cyber Crime (Ec-Council Press Series:
Computer Forensics)
st
Semester:– 1 Branch: Cyber Forensics & Information Security
Subject: Information Theory and Coding (ELECTIVE – I) Code : 587131(22)
Total Theory Periods: 40 Total Tutorial Periods: 12
Total Marks in End Semester Exam: 100 Minimum number of Class tests to be
conducted: 02
Text Book:
1. Ranjan Bose, “Information theory: Coding and Cryptography”, Tata McGraw Hill, 2002.
2. Communication Systems by R. P. Singh and S. D. Sapre, 2 nd Edition TMH
Reference Books :
Text Books :
nd
1. William, C Y Lee, “Mobile Cellular Telecommunications”, 2 Edition McGraw Hill, 2002.
2. Mischa Schwartz, “Mobile Wireless Communications”, Cambridge University Press, 2005.
Reference Books :
nd
1. Theodore S Rapport, “Wireless Communication Principles and Practice”, 2 Edition Pearson
Education, 2002.
2. Lawrence Harte, “3G Wireless Demystified”, McGraw Hill publication, 2002.
3. Kaveh Pahlavan and Prashant Krishnamurthy, “Principles of Wireless Networks”, PHI, 2000.
st
Semester: M.Tech. – 1 Branch: Cyber Forensic & Information Security
Subject: Data-mining And Data-Warehousing Code : 587133(22)
Total Theory Periods: 40 Total Tutorial Periods: 12
Total Marks in End Semester Exam: 100 Minimum number of Class tests to be conducted:
02
UNIT I
Introduction
Relation to statistics, databases, machine learning - Taxonomy of data mining tasks - Steps in data mining
process - Overview of data mining techniques.
UNIT II
Visualization And Statistical Perspectives
Visualization - Dimension reduction techniques - Data summarization methods - Statistical Perspective -
Probabilistic - Deterministic models - Clustering - Regression analysis - Time series analysis – Bayesian
learning.
UNIT III
Predictive Modeling
Predictive Modeling - Classification - Decision trees - Patterns - Association rules - Algorithms.
UNIT IV
Data Warehousing
Design - Dimensional Modeling - Meta data - Performance issues and indexing -VLDB issues –
Development life cycle - Merits.
UNIT V
Applications
Tools - Applications - Case Studies.
Text Books:
1. Jiawei Han, Micheline Kamber, Data Mining Concepts and Techniques, Morgan Kauffmann
Publishers,2000
2. Data warehousing- concepts, Techniques, Products and Applications by Prabhu, Prentice hall of India
References
1. Data Warehousing Fundamentals by Paulraj Ponniah, John Wiley.
2. Usama M.Fayyad, Geogory Piatetsky - Shapiro, Padhrai Smyth and Ramasamy Uthurusamy,
"Advances in Knowledge Discovery and Data Mining", The M.I.T Press, 1996.
3. Sean Kelly, "Data Warehousing in Action", John Wiley & Sons Inc., 1997.
Semester : I Branch: Cyber Forensic & Information Security
Subject: Information Security Lab Code : 587121(22)
Total Lab Periods: 40 Total Marks in End Semester Exam: 75
Experiments to be performed:
References :
· http://linuxcommand.org/man_pages/openssl1.html
· http://www.openssl.org/docs/apps/openssl.html
· http://www.queen.clara.net/pgp/art3.html
· http://www.ccs.ornl.gov/~hongo/main/resources/contrib/gpg-howto/gpg-howto.html
· https://netfiles.uiuc.edu/ehowes/www/gpg/gpg-com-0.htm
· http://www.ethereal.com/docs/user-guide/
st
Semester: – 1 Branch: Cyber Forensic & Information Security
Subject: Digital Signal and Image Processing Lab Code : 587122(22)
Total Lab Periods: 40 Total Marks in End Semester Exam: 75
List of Experiments :
1. Study and Analyze important Signal Processing and Statistics toolbox functions with at least
two types of Signals.
2. Write a Matlab Code for the implementation of Convolution theorem and its applications.
3. Write a Matlab Code for the observation of frequency response and phase response of the
signal.
4. Repeat the above problem for the following cases :
a) Human Speech (Male).
b) Human Speech (Female).
c) Human Speech (Child).
5. Write a Matlab code to observe the Impulse response of different types of signals.
6. Write a Matlab code to implement DFT, FFT, DWT, CWT and DCT of any type of signal.
7. Write a Matlab code of the detection and counting Zero-Crossings of Speech Signal.
8. Write a Matlab code for the study of all types of Windowing techniques and its performance
measures over any signal.
9. Write a Matlab program for the study and analysis of different Biometrical Signal traits of Human
being for the gender, age, and prosodic features.
10. Study and Analyze important Image Processing toolbox functions with at least two standard
images like Cameraman, Lena, Monkey, and others.
11. Write a Matlab Code for Image reading and displaying the results in matrix form and hence
changing the matrix elements by multiplying with the factor 0.001 and hence writing to a file
with extension .jpeg format and hence plot a histogram.
12. Write a Menu driven program for implementing the following :
Converting Color to Gray Scale and hence enhancement with segmentation.
Color Image enhancement and Segmentation.
Comparison of the above two options through Histogram plotting.
Quit with a dialog box for confirmation of yes and No command button.
13. Write a program to hide a word in an image file and retrieve it (Stegnography).
14. Write a Menu driven program for the study and analysis of different Biometrical Images like Iris,
finger print, Human Gait, Human face (frontal), Human face (from Side-view), Human face
(temporal view) and any other Biometrical traits for the implementation of enhancement,
segmentation, and features extraction.
15. Case studies through Matlab on the following :
a) Mapping process for Trained and Test Speech Signal.
b) Mapping process for Trained and Test Images.