SlideShare a Scribd company logo
Page 1 of 5
Bachelor of Technology (Computer Science & Engineering)
Credit-Based Scheme of Studies/Examination
Semester VIII (w.e.f. session 2021-2022 )
S.
No
.
Course Code Subject L:T:P Hours/Week Credits Examination Schedule (Marks) Duratio
n of
Exam
(Hrs)
Major
Test
Minor
Test
Practical Total
1 PE Elective-VI 3:0:0 3 3 75 25 0 100 3
2 OE Open
Elective-III
2:0:0 2 2 75 25 0 100 3
3 OE Open
Elective-IV
2:0:0 2 2 75 25 0 100 3
4 PROJ-CS-
402A
Project-III 0:0:12 12 6 0 40 60 100 3
5 PE-LA Elective-VI
Lab
0:0:4 4 2 0 40 60 100 3
Total 23 15 225 155 120 500
The course of both PE & OE will be offered at 1/3rd strength or 20 students (whichever
is smaller) of the section.
PE Elective-VI
Cloud Computing: PE-CS-A402A
Computer Graphics: PE-CS-A404A
Software Reliability: PE-CS-A406A
Mobile Apps Development: PE-CS-A408A
OE Elective-III OE Elective-IV
Cyber Security: OE-CS-402A Web and Internet Technology: OE-CS-410A
Satellite Communication: OE-CS-404A Automation in Manufacturing: OE-CS-412A
Social Networks Analysis & Mining: OE-CS-
406A
IPR, Bioethics and Biosafety: OE-CS-414A
Agile Software Engineering: OE-CS-408A Signal & Systems: OE-CS-416A
Page 2 of 5
PE-CS-A402A Cloud Computing
Lecture Tutorial Practical Credit Major Test Minor Test Total Time
3 0 0 3 75 25 100 3 Hrs.
Purpose To familiar the concepts of cloud services and storage to deploy various resources and arbitrary
software.
Course Outcomes (CO)
CO1 Summarize main concepts, key technologies, strengths and limitations of Cloud Computing.
CO2 Explore various cloud service and deployment models to utilize different cloud services.
CO3 Interpret various data, scalability & cloud services in order to get efficient database for cloud storage.
CO4 To deal with various security threats and their controlling mechanism for accessing safe cloud
services.
Unit-I
Overview of Computing Paradigm: Recent trends in Computing, Grid Computing, Cluster
Computing, Distributed Computing, Utility Computing, Cloud Computing, evolution of cloud
computing, Business driver for adopting cloud computing. Cloud Computing (NIST Model): History
of Cloud Computing, Cloud service providers, Properties, Characteristics & Disadvantages, Pros and
Cons of Cloud Computing, Benefits of Cloud Computing, Cloud computing vs. Cluster computing vs.
Grid computing, Role of Open Standards.
Unit-II
Cloud Computing Architecture: Cloud computing stack, Comparison with traditional computing
architecture (client/server), Services provided at various levels, How Cloud Computing Works, Role
of Networks in Cloud computing, protocols used, Role of Web services, Service Models (XaaS) -
Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS),
Deployment Models- Public cloud, Private cloud, Hybrid cloud, Community cloud, Cloud
Architecture and open source.
Unit-III
Service Management in Cloud Computing: Service Level Agreements (SLAs), Billing & Accounting,
comparing Scaling Hardware: Traditional vs. Cloud, Economics of scaling: Benefitting enormously,
Managing Data- Looking at Data, Scalability & Cloud Services, Database & Data Stores in Cloud,
Large Scale Data Processing, Cloud management with Puppet.
Case study: Eucalyptus, Microsoft Azure, Amazon EC2.
Unit-IV
Cloud Security: Infrastructure Security, Network level security, Host level security, Application level
security, Data security and Storage, Data privacy and security Issues, Jurisdictional issues raised by
Data location, Identity & Access Management, Access Control, Trust, Reputation, Risk,
Authentication in cloud computing, Client access in cloud, Cloud contracting Model, Commercial and
business considerations, DROPS: Division and Replication of data in Cloud for Optimal Performance
and Security.
Suggested Books: Barrie Sosinsky, Cloud Computing Bible, Wiley-India, 2010. | Rajkumar Buyya,
James Broberg, Andrzej M. Goscinski,Cloud Computing: Principles and Paradigms, Wiley, 2011. |
Nikos Antonopoulos, Lee Gillam, Cloud Computing: Principles, Systems and Applications,
Springer, 2012. | Ronald L. Krutz, Russell Dean Vines, Cloud Security: A Comprehensive Guide to
Secure Cloud Computing, Wiley-India, 2010.
Page 3 of 5
PE-CS-A406A Web and Internet Technology
Lecture Tutorial Practical Credit Major Test Minor Test Total Time
3 0 0 3 75 25 100 3 Hrs.
Purpose To gain a broad understanding of the discipline of Web engineering and its application to the
development and management of Web Applications.
Course Outcomes (CO)
CO1 Learn the basic concepts of internet and its conncetivity.
CO2 Learn about the services of internet, designing and its architecture.
CO3 Understand the basic concepts of Python and its applications as per information industry standards.
CO4 Acquaint the latest programming language for the implementation of object based and procedure
based applications using Python.
Unit I
Intenet, growth of internet, owners of the internet, anatomy of internet, ARPANET and internet
history of the worls wide web, basic internt terminology, internet applications-commerce on the
internet, governance on the internet, impact of internet on society- crime on/through the internet, the
role of information architect, collaboration and communication. Organizing information, Organizing
web sites and Intranets, Creating cohesive organization systems, designing navigation systems, types
of navigation systems, Integrated navigation elements, designing navigation systems, Searching
systems, Searching your web site, designing the search interface.
Unit II
Setting up a connection: Hardware requirement, selection of a modem, software requirement, modem
configuration, common terminologies: Node, Host, Workstation, bandwidth, interoperability, network
administrator, netwotk security, network components: servers, clients, communication medis, service
options- email, News firewall etc.
Introduction to XHTML and HTML5: Origins and Evolution of HTML and XHTML, Basic
Syntax, Standard XHTML Document Structure, Basic Text Markup, Images, Hypertext Links, Lists,
Tables, Forms, HTML5, Syntactic Differences between HTML and XHTML.
Cascading Style Sheets: Introduction, Levels of Style Sheets, Style Specification Formats, Selector
Forms, Property Value Forms, Font Properties, List Properties, Color, Alignment of Text, Box Model,
Background Images
Unit III
Introduction to Python: Applications of python in information industry, Introduction to Python,
Data Types, branching programs, control structures, array and input, iteration.
Functions and scoping: Functions and scoping, recursion and global variables. Creation, insertion and
deletion of items: strings, tuples, lists and dictionaries.
Unit IV
Classes and objects-oriented programming: Abstract data types and classes, inheritance, encapsulation
and information hiding. File handling, exception handling, database (MySQLdb) operation: file check,
table creation, insertion and deletion of data, regular expressions-Res in Python and plotting.
Suggested Books: By Peter Morville, Louis Rosenfeld, “Information Architecture on the World Wide
Web”, O'Reilly Media, 2006. | Robert W. Sebesta, “Programming The World Wide Web”, Eight
Edition, Pearson India, 2015. | Kenneth A. Lambert, “The Fundamentals of Python: First Programs”,
2011, Cengage Learning. | Thomas A Powell, “HTML The Complete Reference”, Tata McGraw Hill
Publications.
Page 4 of 5
PE—CS-
A402AL
Cloud Computing Lab
Lecture TutorialPractical Credit Minor Test Practical Total Time
- - 4 2 40 60 100 3hrs
Purpose Design and Implement various mobile applications using emulators and
learn how to Deploy applications to hand-held devices.
Course Outcomes(CO)
CO1 Know the components and structure of mobile application development
frameworks for Android based mobiles.
CO2 Understand how to work with various mobile application development
frameworks.
CO3 Learn the basic and important design concepts and issues of development
of mobile applications.
CO4 Understand the capabilities of mobile devices.
List of Practicals
1. Write a program to use the API's of Hadoop to interact with it.
2. Install a C compiler in the virtual machine created using virtual box and execute
Simple Programs
3. Install Google App Engine. Create hello world app and other simple web applications
using python/java.
4. Use GAE launcher to launch the web applications.
5. Show the virtual machine migration based on the certain condition from one node to
the other.
6. Write a word count program to demonstrate the use of Map and Reduce tasks.
7. Find procedure to set up the one node Hadoop cluster and run simple applications like
word count.
Page 5 of 5
OE-CS-402A Cyber Security
Lecture Tutorial Practical Credit MajorTest MinorTest Total Time
2 0 0 2 75 25 100 3 Hour
Purpose To gain a broad understanding in order to get predictive ways out related to cyber security.
Course Outcomes
CO 1 To facilitate the basic knowledge of cyber security.
CO 2 To explore and sort issues related to different types of activities in cyber crime.
CO 3 To get enable to fix the various cyber attacks.
CO 4 To deal with the digital forensics and related scenarios of cyber crimes.
Unit-I
Introduction: Fundamentals of Cyber Crime, Nature and Scope of Cyber Crime, Types of Cyber
Crime: crime against individual, Crime against property, Cyber extortion, Drug trafficking, cyber
terrorism.
Cryptanalysis-steganography, stream and block ciphers, modern block ciphers: Block cipher
principles, Shannon’s theory of confusion and diffusion, fiestal structure, Data Encryption Standard
(DES), strength of DES, differential and linear crypt analysis of DES, block cipher modes of
operations, triple DES-AES
Unit-II
Integrity checks and authentication algorithms MD5 message digest algorithm, Secure Hash
Algorithm (SHA), Digital Signatures, authentication protocols, digital signature standards (DSS),
proof of digital signature algorithm, authentication application, Kerberos and X.509, directory
authentication service, electronic mail security, pretty good privacy (PGP), S/MIME.
Unit-III
Introduction to cyber attacks: passive attacks, active attacks, Cyber crime prevention methods,
Application security (Database, E-mail and Internet), Data Security Considerations-Backups, Archival
Storage and Disposal of Data, Security Technology-Firewall and VPNs, Intrusion Detection, Access
Control,Hardware protection mechanisms, OS Security.
Web Security: Secure socket layer and transport layer security-secure electronic transaction (SET)-
system security: Intruders-Viruses and related threats, firewall design principles, trusted systems.
Unit-IV
Digital Forensics: Introduction to Digital Forensics, historical background of digital forensics,
Forensic Software and Hardware, need for computer forensics science, special tools and techniques
digital forensic life cycle, challenges in digital forensic.
Law Perspective: Introduction to the Legal Perspectives of Cybercrimes and Cyber security,
Cybercrime and the Legal Landscape around the World, Why Do We Need Cyber laws, The Indian IT
Act, Cybercrime Scenario in India, Digital Signatures and the Indian IT Act, Cybercrime and
Punishment.
IP Security: Architecture-Authentication header-Encapsulating security payloads, combining security
associations, key management.
Suggested Books: Nelson Phillips and Enfinger Steuart, “Computer Forensics and Investigations”,
Cengage Learning, New Delhi, 2009. | Robert M Slade,” Software Forensics”, Tata McGraw - Hill,
New Delhi, 2005. | Sunit Belapure and Nina Godbole, “Cyber Security: Understanding Cyber Crimes,
Computer Forensics and Legal Perspectives”, Wiley India Pvt. Ltd.

More Related Content

PDF
Design of an IT Capstone Subject - Cloud Robotics
PDF
FiCloud2016 lov4iot second life ontology
PDF
Risk Management of Secure Cloud in Higher Educational Institution
PDF
Fi cloudpresentationgyrardaugust2015 v2
PDF
Multimedia Communications Lab (KOM) - TU Darmstadt - Research Overview
PDF
A computational scientist's wish list for tomorrow's computing systems
PPTX
Building a Computer Science Pathway for Endorsements
PDF
Teaching and practicing the students‘ knowledge using games
Design of an IT Capstone Subject - Cloud Robotics
FiCloud2016 lov4iot second life ontology
Risk Management of Secure Cloud in Higher Educational Institution
Fi cloudpresentationgyrardaugust2015 v2
Multimedia Communications Lab (KOM) - TU Darmstadt - Research Overview
A computational scientist's wish list for tomorrow's computing systems
Building a Computer Science Pathway for Endorsements
Teaching and practicing the students‘ knowledge using games

Similar to CSE NEW_4th yr w.e.f. 2018-19.pdf (20)

PDF
Handout1o
PDF
Cloud Computing of the college .pdf
PPTX
advance computing and big adata analytic.pptx
PDF
VTU_BCS601 - CLOUD COMPUTING - SYLLABUS.pdf
PDF
Cloud-Computing-Course-Description-and-Syllabus-Spring2020.pdf
PDF
PPT_CLOUD COMPUTING_UNIT 1.pptx.pdf
PDF
Cs 643 syllabus
PPTX
Basics of Cloud Computing- 5 th semester
PDF
R15A0529_CloudComputing_Notes-converted.pdf
PPTX
Module 1- Introduction-CCA.pptx
PDF
Project final report
PPTX
Cloud00000000000000000000Computing1.pptx
PPTX
Cloud Computing
PPTX
01 introduction to cloud computing technology
PDF
北航云计算公开课01 introduction to cloud computing technology
PPT
INT529 zero lecture.pptdsfsdffewwretetrtetretr
PPT
Service oriented cloud computing
PPTX
unit 1.pptx
PDF
Vii cse grading
PPTX
CLOUD COMPUTING UNIT-1
Handout1o
Cloud Computing of the college .pdf
advance computing and big adata analytic.pptx
VTU_BCS601 - CLOUD COMPUTING - SYLLABUS.pdf
Cloud-Computing-Course-Description-and-Syllabus-Spring2020.pdf
PPT_CLOUD COMPUTING_UNIT 1.pptx.pdf
Cs 643 syllabus
Basics of Cloud Computing- 5 th semester
R15A0529_CloudComputing_Notes-converted.pdf
Module 1- Introduction-CCA.pptx
Project final report
Cloud00000000000000000000Computing1.pptx
Cloud Computing
01 introduction to cloud computing technology
北航云计算公开课01 introduction to cloud computing technology
INT529 zero lecture.pptdsfsdffewwretetrtetretr
Service oriented cloud computing
unit 1.pptx
Vii cse grading
CLOUD COMPUTING UNIT-1
Ad

Recently uploaded (20)

DOCX
573137875-Attendance-Management-System-original
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
Lecture Notes Electrical Wiring System Components
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPT
Project quality management in manufacturing
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
Welding lecture in detail for understanding
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
UNIT 4 Total Quality Management .pptx
PDF
PPT on Performance Review to get promotions
PPTX
additive manufacturing of ss316l using mig welding
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
573137875-Attendance-Management-System-original
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Lecture Notes Electrical Wiring System Components
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Project quality management in manufacturing
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Operating System & Kernel Study Guide-1 - converted.pdf
Welding lecture in detail for understanding
R24 SURVEYING LAB MANUAL for civil enggi
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
OOP with Java - Java Introduction (Basics)
UNIT 4 Total Quality Management .pptx
PPT on Performance Review to get promotions
additive manufacturing of ss316l using mig welding
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Ad

CSE NEW_4th yr w.e.f. 2018-19.pdf

  • 1. Page 1 of 5 Bachelor of Technology (Computer Science & Engineering) Credit-Based Scheme of Studies/Examination Semester VIII (w.e.f. session 2021-2022 ) S. No . Course Code Subject L:T:P Hours/Week Credits Examination Schedule (Marks) Duratio n of Exam (Hrs) Major Test Minor Test Practical Total 1 PE Elective-VI 3:0:0 3 3 75 25 0 100 3 2 OE Open Elective-III 2:0:0 2 2 75 25 0 100 3 3 OE Open Elective-IV 2:0:0 2 2 75 25 0 100 3 4 PROJ-CS- 402A Project-III 0:0:12 12 6 0 40 60 100 3 5 PE-LA Elective-VI Lab 0:0:4 4 2 0 40 60 100 3 Total 23 15 225 155 120 500 The course of both PE & OE will be offered at 1/3rd strength or 20 students (whichever is smaller) of the section. PE Elective-VI Cloud Computing: PE-CS-A402A Computer Graphics: PE-CS-A404A Software Reliability: PE-CS-A406A Mobile Apps Development: PE-CS-A408A OE Elective-III OE Elective-IV Cyber Security: OE-CS-402A Web and Internet Technology: OE-CS-410A Satellite Communication: OE-CS-404A Automation in Manufacturing: OE-CS-412A Social Networks Analysis & Mining: OE-CS- 406A IPR, Bioethics and Biosafety: OE-CS-414A Agile Software Engineering: OE-CS-408A Signal & Systems: OE-CS-416A
  • 2. Page 2 of 5 PE-CS-A402A Cloud Computing Lecture Tutorial Practical Credit Major Test Minor Test Total Time 3 0 0 3 75 25 100 3 Hrs. Purpose To familiar the concepts of cloud services and storage to deploy various resources and arbitrary software. Course Outcomes (CO) CO1 Summarize main concepts, key technologies, strengths and limitations of Cloud Computing. CO2 Explore various cloud service and deployment models to utilize different cloud services. CO3 Interpret various data, scalability & cloud services in order to get efficient database for cloud storage. CO4 To deal with various security threats and their controlling mechanism for accessing safe cloud services. Unit-I Overview of Computing Paradigm: Recent trends in Computing, Grid Computing, Cluster Computing, Distributed Computing, Utility Computing, Cloud Computing, evolution of cloud computing, Business driver for adopting cloud computing. Cloud Computing (NIST Model): History of Cloud Computing, Cloud service providers, Properties, Characteristics & Disadvantages, Pros and Cons of Cloud Computing, Benefits of Cloud Computing, Cloud computing vs. Cluster computing vs. Grid computing, Role of Open Standards. Unit-II Cloud Computing Architecture: Cloud computing stack, Comparison with traditional computing architecture (client/server), Services provided at various levels, How Cloud Computing Works, Role of Networks in Cloud computing, protocols used, Role of Web services, Service Models (XaaS) - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), Deployment Models- Public cloud, Private cloud, Hybrid cloud, Community cloud, Cloud Architecture and open source. Unit-III Service Management in Cloud Computing: Service Level Agreements (SLAs), Billing & Accounting, comparing Scaling Hardware: Traditional vs. Cloud, Economics of scaling: Benefitting enormously, Managing Data- Looking at Data, Scalability & Cloud Services, Database & Data Stores in Cloud, Large Scale Data Processing, Cloud management with Puppet. Case study: Eucalyptus, Microsoft Azure, Amazon EC2. Unit-IV Cloud Security: Infrastructure Security, Network level security, Host level security, Application level security, Data security and Storage, Data privacy and security Issues, Jurisdictional issues raised by Data location, Identity & Access Management, Access Control, Trust, Reputation, Risk, Authentication in cloud computing, Client access in cloud, Cloud contracting Model, Commercial and business considerations, DROPS: Division and Replication of data in Cloud for Optimal Performance and Security. Suggested Books: Barrie Sosinsky, Cloud Computing Bible, Wiley-India, 2010. | Rajkumar Buyya, James Broberg, Andrzej M. Goscinski,Cloud Computing: Principles and Paradigms, Wiley, 2011. | Nikos Antonopoulos, Lee Gillam, Cloud Computing: Principles, Systems and Applications, Springer, 2012. | Ronald L. Krutz, Russell Dean Vines, Cloud Security: A Comprehensive Guide to Secure Cloud Computing, Wiley-India, 2010.
  • 3. Page 3 of 5 PE-CS-A406A Web and Internet Technology Lecture Tutorial Practical Credit Major Test Minor Test Total Time 3 0 0 3 75 25 100 3 Hrs. Purpose To gain a broad understanding of the discipline of Web engineering and its application to the development and management of Web Applications. Course Outcomes (CO) CO1 Learn the basic concepts of internet and its conncetivity. CO2 Learn about the services of internet, designing and its architecture. CO3 Understand the basic concepts of Python and its applications as per information industry standards. CO4 Acquaint the latest programming language for the implementation of object based and procedure based applications using Python. Unit I Intenet, growth of internet, owners of the internet, anatomy of internet, ARPANET and internet history of the worls wide web, basic internt terminology, internet applications-commerce on the internet, governance on the internet, impact of internet on society- crime on/through the internet, the role of information architect, collaboration and communication. Organizing information, Organizing web sites and Intranets, Creating cohesive organization systems, designing navigation systems, types of navigation systems, Integrated navigation elements, designing navigation systems, Searching systems, Searching your web site, designing the search interface. Unit II Setting up a connection: Hardware requirement, selection of a modem, software requirement, modem configuration, common terminologies: Node, Host, Workstation, bandwidth, interoperability, network administrator, netwotk security, network components: servers, clients, communication medis, service options- email, News firewall etc. Introduction to XHTML and HTML5: Origins and Evolution of HTML and XHTML, Basic Syntax, Standard XHTML Document Structure, Basic Text Markup, Images, Hypertext Links, Lists, Tables, Forms, HTML5, Syntactic Differences between HTML and XHTML. Cascading Style Sheets: Introduction, Levels of Style Sheets, Style Specification Formats, Selector Forms, Property Value Forms, Font Properties, List Properties, Color, Alignment of Text, Box Model, Background Images Unit III Introduction to Python: Applications of python in information industry, Introduction to Python, Data Types, branching programs, control structures, array and input, iteration. Functions and scoping: Functions and scoping, recursion and global variables. Creation, insertion and deletion of items: strings, tuples, lists and dictionaries. Unit IV Classes and objects-oriented programming: Abstract data types and classes, inheritance, encapsulation and information hiding. File handling, exception handling, database (MySQLdb) operation: file check, table creation, insertion and deletion of data, regular expressions-Res in Python and plotting. Suggested Books: By Peter Morville, Louis Rosenfeld, “Information Architecture on the World Wide Web”, O'Reilly Media, 2006. | Robert W. Sebesta, “Programming The World Wide Web”, Eight Edition, Pearson India, 2015. | Kenneth A. Lambert, “The Fundamentals of Python: First Programs”, 2011, Cengage Learning. | Thomas A Powell, “HTML The Complete Reference”, Tata McGraw Hill Publications.
  • 4. Page 4 of 5 PE—CS- A402AL Cloud Computing Lab Lecture TutorialPractical Credit Minor Test Practical Total Time - - 4 2 40 60 100 3hrs Purpose Design and Implement various mobile applications using emulators and learn how to Deploy applications to hand-held devices. Course Outcomes(CO) CO1 Know the components and structure of mobile application development frameworks for Android based mobiles. CO2 Understand how to work with various mobile application development frameworks. CO3 Learn the basic and important design concepts and issues of development of mobile applications. CO4 Understand the capabilities of mobile devices. List of Practicals 1. Write a program to use the API's of Hadoop to interact with it. 2. Install a C compiler in the virtual machine created using virtual box and execute Simple Programs 3. Install Google App Engine. Create hello world app and other simple web applications using python/java. 4. Use GAE launcher to launch the web applications. 5. Show the virtual machine migration based on the certain condition from one node to the other. 6. Write a word count program to demonstrate the use of Map and Reduce tasks. 7. Find procedure to set up the one node Hadoop cluster and run simple applications like word count.
  • 5. Page 5 of 5 OE-CS-402A Cyber Security Lecture Tutorial Practical Credit MajorTest MinorTest Total Time 2 0 0 2 75 25 100 3 Hour Purpose To gain a broad understanding in order to get predictive ways out related to cyber security. Course Outcomes CO 1 To facilitate the basic knowledge of cyber security. CO 2 To explore and sort issues related to different types of activities in cyber crime. CO 3 To get enable to fix the various cyber attacks. CO 4 To deal with the digital forensics and related scenarios of cyber crimes. Unit-I Introduction: Fundamentals of Cyber Crime, Nature and Scope of Cyber Crime, Types of Cyber Crime: crime against individual, Crime against property, Cyber extortion, Drug trafficking, cyber terrorism. Cryptanalysis-steganography, stream and block ciphers, modern block ciphers: Block cipher principles, Shannon’s theory of confusion and diffusion, fiestal structure, Data Encryption Standard (DES), strength of DES, differential and linear crypt analysis of DES, block cipher modes of operations, triple DES-AES Unit-II Integrity checks and authentication algorithms MD5 message digest algorithm, Secure Hash Algorithm (SHA), Digital Signatures, authentication protocols, digital signature standards (DSS), proof of digital signature algorithm, authentication application, Kerberos and X.509, directory authentication service, electronic mail security, pretty good privacy (PGP), S/MIME. Unit-III Introduction to cyber attacks: passive attacks, active attacks, Cyber crime prevention methods, Application security (Database, E-mail and Internet), Data Security Considerations-Backups, Archival Storage and Disposal of Data, Security Technology-Firewall and VPNs, Intrusion Detection, Access Control,Hardware protection mechanisms, OS Security. Web Security: Secure socket layer and transport layer security-secure electronic transaction (SET)- system security: Intruders-Viruses and related threats, firewall design principles, trusted systems. Unit-IV Digital Forensics: Introduction to Digital Forensics, historical background of digital forensics, Forensic Software and Hardware, need for computer forensics science, special tools and techniques digital forensic life cycle, challenges in digital forensic. Law Perspective: Introduction to the Legal Perspectives of Cybercrimes and Cyber security, Cybercrime and the Legal Landscape around the World, Why Do We Need Cyber laws, The Indian IT Act, Cybercrime Scenario in India, Digital Signatures and the Indian IT Act, Cybercrime and Punishment. IP Security: Architecture-Authentication header-Encapsulating security payloads, combining security associations, key management. Suggested Books: Nelson Phillips and Enfinger Steuart, “Computer Forensics and Investigations”, Cengage Learning, New Delhi, 2009. | Robert M Slade,” Software Forensics”, Tata McGraw - Hill, New Delhi, 2005. | Sunit Belapure and Nina Godbole, “Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives”, Wiley India Pvt. Ltd.