CE4151 Principles of Cyber Security Syllabus:
CE4151 Principles of Cyber Security Syllabus – Anna University PG Syllabus Regulation 2021
COURSE OBJECTIVES:
To know the cyber security principles, as well as the issues, policy and standards
To understand the difference between threat, risk, attack and vulnerability and how threats materialize into attacks.
To be familiar with the typical threats, attacks and exploits and the motivations behind them.
To study the defensive techniques against these attacks
To describe remedies for various existing cyber security breaches and to show the methodologies required to make future systems less prone to security failures
UNIT I INTRODUCTION TO CYBER SECURITY
Basic Cyber Security Concepts, layers of security, Vulnerability, Threat, Harmful acts, Internet Governance – Controls – Authentication -Access Control and Cryptography – Challenges and Constraints, Computer Criminals, CIA Triad, Motive of Attackers, Active Attacks, Passive Attacks, Software Attacks, Hardware Attacks, Spectrum of Attacks, Browser Attacks – Web Attacks Targeting Users – Obtaining User or Website Data – Email Attacks, Taxonomy of various attacks, IP spoofing, Methods of defence, Security Models, risk management, Cyber Threats-Cyber Warfare, Cyber Crime, Cyber terrorism, Cyber Espionage, Malicious code , Countermeasures.
UNIT II SECURITY IN OPERATING SYSTEMS & NETWORKS
Security in Operating Systems – Security in the Design of Operating Systems -Rootkit – Network Security Attack- Threats to Network Communications – Wireless Network Security – Denial of Service – Distributed Denial-of-Service.
UNIT III DEFENCES: SECURITY COUNTERMEASURES
Cryptography in Network Security – Firewalls – Intrusion Detection and Prevention Systems – Network Management – Databases – Security Requirements of Databases – Reliability and Integrity – Database Disclosure – Data Mining and Big Data. Cloud Security Tools & Techniques,
UNIT IV PRIVACY IN CYBERSPACE
Privacy Concepts -Privacy Principles and Policies -Authentication and Privacy – Data Mining – Privacy on the Web – Email Security – Privacy Impacts of Emerging Technologies – Where the Field Is Headed.
UNIT V MANAGEMENT AND INCIDENTS
Comprehensive Cyber Security Policy Security Planning – Business Continuity Planning – Handling Incidents – Risk Analysis – Dealing with Disaster – Emerging Technologies – The Internet of Things – Economics – Electronic Voting – Cyber Warfare- Cyberspace and the Law – International Laws – Cyber-crime – Cyber Warfare and HomeL and Security.
TOTAL:45 PERIODS
LIST OF EXPERIMENTS:
1. Implementation to gather information from any PC connected to the LAN using whois, port scanners, network scanning, Angry IP scanners etc.
2. Implementation of Claiming ownership of digital entity
3. Implementation of Tracing the digital theft in cyberspace
4. Implementation of Data hiding in different image types
5. Implementation of MITM- attack using wireshark/ network sniffers
6. Implementation of Windows security using firewall and other tools
7. Implementation to identify web vulnerabilities, using OWASP project
8. Implementation of IT Audit, malware analysis and Vulnerability assessment and generate the report.
9. Implementation of OS hardening and RAM dump analysis to collect the artifacts and other information.
10. Implementation of Cyber Forensics tools for Disk Imaging, Data acquisition, Data extraction and Data Analysis and recovery.
TOTAL: 30 PERIODS
TOTAL:45+30=75 PERIODS
COURSE OUTCOMES:
At the end of this course, the students will be able to:
CO1: Understand the broad set of technical, social & political aspects of Cyber Security
CO2: Describe the operational and organizational Cyber Security Aspects
CO3: Identify and assess different types of Cyber security breaches and possible solutions for a robust system
CO4: understand cyber-attacks, and also how to protect the entire Internet community from such attacks
CO5: Demonstrate the ability to select and design among available security solutions based on different domains of cyber systems
REFERENCES:
1. Charles P. Pfleeger Shari Lawrence Pfleeger Jonathan Margulies, Security in Computing, 5th Edition , Pearson Education , 2018
2. Nina Godbole, Sunit Belapure, “Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives”, Wiley India Pvt. Ltd. , 2011
3. B. B. Gupta, D. P. Agrawal, Haoxiang Wang, Computer and Cyber Security: Principles, Algorithms, Applications, and Perspectives, CRC Press, 2018.
4. George K.Kostopoulos, Cyber Space and Cyber Security, CRC Press, 2013.
5. Martti Lehto, Pekka Neittaanmäki, Cyber Security: Analytics, Technology and Automation, Springer International Publishing Switzerland 2015
6. Chwan-Hwa (John) Wu, J. David Irwin, Introduction to Computer Networks and Cyber security, CRC Press T&F Group, 2013.
7. James Graham, Richard Howard and Ryan Otson, Cyber Security Essentials, CRC Press T&F Group, 2011