Back close

Course Detail

Course Name Introduction to Cyber Security
Course Code 19EAC401
Program B. Tech. in Electronics and Computer Engineering
Year Taught 2019

Syllabus

Module I

Introduction-Computer Security, Threats, Harm, Vulnerabilities, Controls. Toolbox-Authentication, Access Control and Cryptography. Programs and Programming-Unintentional (Non-malicious) Programming Oversights, Malicious Code-Malware, Countermeasures.

Module II

The Web User side- Browser Attacks, Web Attack Targeting Users, Obtaining user or website Data, Email Attacks. Operating Systems-Security in OS, Security in the design of OS, Rootkit.Networks-Network concepts, Threats to Network Communications, Wireless Network Security, Denial of Service, Distributed Denialof-Service, Strategic Defenses: Security Countermeasures, Cryptography in Network Security, Firewalls, Intrusion Detection and Prevention Systems, Network Management.

Module III

Databases – Introduction to Databases, Security Requirements of Databases, Reliability and Integrity, Database Disclosure, Data Mining and Big Data.

Objectives and Outcomes

Course Objectives

  • To give an introduction to cybersecurity.
  • To help to understand the security requirements of Databases.
  • To give an exposure to practical security methods in cyber domain.

Course Outcomes

  • CO1: Understanding the basic concepts of Cyber Security.
  • CO2: Gain Basic Programming Knowledge for Cyber Security
  • CO3: Understand the various attacks in web interface.
  • CO4: Understand the level of security in operating systems.
  • CO5: Know the concepts of Network Security.
  • CO6: Understand and apply the security concepts in data base management systems.

CO – PO Mapping

PO/PSO/
CO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 1
CO2 1 2
CO3 1 1 2 1
CO4 1 1 2 1
CO5 1 2 3 2 1
CO6 1 1 1 1 2 2 1

Textbook / References

Textbook / References

  • Pfleeger, C.P., Security in Computing 5th Edition, Prentice Hall, Copyright 2010 ISBN 0-13-239077-9. Schneier, Bruce. Applied Cryptography, Second Edition, John Wiley & Sons, 1996.

Evaluation Pattern

Assessment Internal External
Periodical 1 (P1) 15
Periodical 2 (P2) 15
*Continuous Assessment (CA) 20
End Semester 50
*CA – Can be Quizzes, Assignment, Projects, and Reports.

DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.

Admissions Apply Now