SYLLABUS WEEKLY SCHEDULE SEMESTER VII DEPARTMENT OF IT IV YEAR COURSE

Size: px
Start display at page:

Download "SYLLABUS WEEKLY SCHEDULE SEMESTER VII DEPARTMENT OF IT IV YEAR COURSE"

Transcription

1 SYLLABUS WEEKLY SCHEDULE SEMESTER VII DEPARTMENT OF IT IV YEAR COURSE # 60, Avadi-Alamathi Road, Chennai Phone: to@velhightech.com Website:

2 SEMESTER V S.N O WEEK FROM TO 1 WEEK WEEK WEEK WEEK WEEK WEEK WEEK WEEK WEEK WEEK WEEK WEEK WEEK WEEK WEEK WEEK WEEK WEEK

3 UNIT TEST-I S.N SUBJECT SUBJECT NAME DATE O CODE 1 IT6701 Information Management Cryptography and Network 2 CS Security Data Ware Housing and Data 3 IT Mining 4 CS6703 Grid and Cloud Computing IT6004 Software Testing S.N SUBJECT SUBJECT NAME DATE O CODE 1 IT6701 Information Management Cryptography and Network 2 CS Security Data Ware Housing and Data 3 IT Mining 4 CS6703 Grid and Cloud Computing IT6004 Software Testing UNIT TEST-II

4 S.N SUBJECT SUBJECT NAME DATE O CODE 1 IT6701 Information Management Cryptography and Network CS6701 Security Data Ware Housing and Data IT6702 Mining 4 CS6703 Grid and Cloud Computing IT6004 Software Testing PRE-MODEL EXAM S.N SUBJECT SUBJECT NAME DATE O CODE 1 IT6701 Information Management Cryptography and Network CS6701 Security Data Ware Housing and Data IT6702 Mining 4 CS6703 Grid and Cloud Computing IT6004 Software Testing MODEL EXAM

5 4. Show the virtual machine migration based on the certain condition from one node to the other. 5. Find procedure to install storage controller and interact with it. 6. Find procedure to set up the one node Hadoop cluster. 7. Mount the one node Hadoop cluster using FUSE. 8. Write a program to use the API's of Hadoop to interact with it. 9. Write a word count program to demonstrate the use of Map and Reduce tasks. LAB EQUIPMENT FOR A BATCH OF 30 STUDENTS: SOFTWARE: Globus Toolkit or equivalent Eucalyptus or Open Nebula or equivalent to HARDWARE Standalone desktops 30 Nos IT6701 INFORMATION MANAGEMENT

6 WEEK I: UNIT I IT6713 GRID AND CLOUD COMPUTING LABORATORY Database design and modelling - Business Rules and Relationship; Java database Connectivity (JDBC) WEEK II: Database connection Manager, Stored Procedures. Trends in Big Data systems including NoSQL - Hadoop HDFS, MapReduce, Hive, and enhancements. WEEK III: UNIT TEST- I WEEK IV: UNIT II Program Security, Malicious code and controls against threats; OS level protection; Security Firewalls. WEEK V: Network Security Intrusion detection systems. Data Privacy principles. Data Privacy Laws and compliance. WEEK VI: UNIT TEST -II WEEK VII: UNIT III Master Data Management (MDM) Overview, Need for MDM, Privacy, regulatory requirements and compliance. WEEK VIII: Data Governance Synchronization and data quality. WEEK IX: Model Exam LIST OF EXPERIMENTS: GRID COMPUTING LAB: Use Globus Toolkit or equivalent and do the following: 1. Develop a new Web Service for Calculator. 2. Develop new OGSA-compliant Web Service. 3. Using Apache Axis develop a Grid Service. 4. Develop applications using Java or C/C++ Grid APIs 5. Develop secured applications using basic security mechanisms available in Globus Toolkit. 6. Develop a Grid portal, where user can submit a job and get the result. Implement it with and without GRAM concept. CLOUD COMPUTING LAB: Use Eucalyptus or Open Nebula or equivalent to set up the cloud and demonstrate. 1. Find procedure to run the virtual machine of different configuration. Check how many virtual machines can be utilized at particular time. 2. Find procedure to attach virtual block to the virtual machine and check whether it holds the data even after the release of the virtual machine. 3. Install a C compiler in the virtual machine and execute a sample program.

7 4. Demonstrate how to provide secure data storage, secure data transmission and for creating digital signatures (GnuPG). 5. Setup a honey pot and monitor the honeypot on network (KF Sensor) 6. Installation of rootkits and study about the variety of options 7. Perform wireless audit on an access point or a router and decrypt WEP and WPA.( Net Stumbler) 8. Demonstrate intrusion detection system (ids) using any tool (snort or any other s/w) LAB EQUIPMENTS FOR A BATCH OF 30 STUDENTS: SOFTWARE: C / C++ / Java or equivalent compiler GnuPG, KF Sensor or Equivalent, Snort, Net Stumbler or Equivalent HARDWARE: Server supporting 30 terminals or more. WEEK X: UNIT IV Principles of Information architecture and framework, Organizing information WEEK XI: Navigation systems and Labelling systems, Conceptual design, Granularity of Content. WEEK XII: UNIT TEST-IV WEEK XIII: UNIT V Data retention policies; Confidential and Sensitive data handling, lifecycle management costs. Archive data using Hadoop. WEEK XIV: Testing and delivering big data applications for performance and functionality; Challenges with data administration WEEK XV: UNIT TEST V WEEK XVI: REVISION ALL FIVE UNIT WEEK XVII: MODEL EXAM WEEK XVIII & XIX: ICD CLASSES & MODEL PRACTICAL EXAM TEXT BOOK: 1. Alex Berson, Larry Dubov MASTER DATA MANAGEMENT AND DATA GOVERNANCE, 2/E, Tata McGraw Hill, Security in Computing, 4/E, Charles P. Pfleeger, Shari Lawrence Pfleeger, Prentice Hall; 200

8 3. Information Architecture for the World Wide Web; Peter Morville, Louis Rosenfeld ; O'Reilly Media; 1998 REFERENCES: 1. Jeffrey A. Hoffer, Heikki Topi, V Ramesh - MODERN DATABASE MANAGEMENT, 10 Edition, PEARSON, Next Gen databases that are distributed, open source and scalable LAB EQUIPMENT FOR A BATCH OF 30 STUDENTS: SOFTWARE: WEKA, RapidMiner, DB Miner or Equivalent HARDWARE Standalone desktops 30 Nos Four dimensions of big data and other ebooks on Big Data Analytics IT6712 SECURITY LABORATORY 4. Inside Cyber Warfare: Mapping the Cyber Underworld- Jeffrey Carr, O'Reilly Media; Second Edition 2011 CS6701 WEEK I: UNIT I CRYPTOGRAPHY AND NETWORK SECURITY Services, Mechanisms and attacks-the OSI security architecture- Network security model-classical Encryption techniques (Symmetric cipher model, substitution techniques, transposition techniques, steganography). WEEK II: FINITE FIELDS AND NUMBER THEORY: Groups, Rings, Fields-Modular arithmetic-euclid s algorithm-finite fields- Polynomial Arithmetic Prime numbers-fermat s LIST OF EXPERIMENTS 1. Implement the following SUBSTITUTION & TRANSPOSITION TECHNIQUES concepts: a) Caesar Cipher b) Playfair Cipher c) Hill Cipher d) Vigenere Cipher Rail fence row & Column Transformation 2. Implement the following algorithms a) DES b) RSA Algorithm c) Diffiee-Hellman d) MD5 e) SHA-1 3 Implement the SIGNATURE SCHEME - Digital Signature Standard

9 2. Ron Patton, Software Testing, Second Edition, Sams Publishing, Pearson Education, REFERENCES: 1. Ilene Burnstein, Practical Software Testing, Springer International Edition, Edward Kit, Software Testing in the Real World Improving the Process, Pearson Education, Boris Beizer, Software Testing Techniques 2 nd Edition, Van Nostrand Reinhold, New York, Aditya P. Mathur, Foundations of Software Testing _ Fundamental Algorithms and Techniques, Dorling Kindersley (India) Pvt. Ltd., Pearson Education, IT6711 DATA MINING LABORATORY LIST OF EXPERIMENTS: 1. Creation of a Data Warehouse. 2. Apriori Algorithm. 3. FP-Growth Algorithm. 4. K-means clustering. 5. One Hierarchical clustering algorithm. 6. Bayesian Classification. 7. Decision Tree. 8. Support Vector Machines. 9. Applications of classification for web mining. Case Study on Text Mining or any commercial application and Euler s theorem-testing for primality -The Chinese remainder theorem- Discrete logarithms. WEEK III: UNIT TEST- I WEEK IV: UNIT II Data Encryption Standard-Block cipher principles-block cipher modes of operation-advanced Encryption Standard (AES)-Triple DES-Blowfish-RC5 algorithm. WEEK V: Public key cryptography: Principles of public key cryptosystems-the RSA algorithm-key management - Diffie Hellman Key exchange-elliptic curve arithmetic- Elliptic curve cryptography. WEEK VI: UNIT TEST -II WEEK VII: UNIT III Authentication requirement Authentication function MAC Hash function Security of hash function and MAC MD5 - SHA - HMAC CMAC. WEEK VIII: Digital signature and authentication protocols DSS EI Gamal Schnorr. WEEK IX: Model Exam WEEK X: UNIT IV Authentication applications Kerberos X.509 Authentication services - Internet Firewalls for Trusted System: Roles of Firewalls Firewall related terminology- Types of Firewalls - Firewall designs

10 SET for E-Commerce Transactions. Intruder WEEK XI: Intrusion detection system Virus and related threats Countermeasures Firewalls design principles Trusted systems Practical implementation of cryptography and security. WEEK XII: UNIT TEST-IV WEEK XIII: UNIT V Security: Security Services for -attacks possible through - establishing keys privacy-authentication of the source-message Integrity-Non-repudiation-Pretty Good Privacy- S/MIME. IPSecurity: Overview of IPSec - IP and IPv6- Authentication Header-Encapsulation Security Payload (ESP)- Internet Key Exchange (Phases of IKE, ISAKMP/IKE Encoding). WEEK XIV: Web Security: SSL/TLS Basic Protocol-computing the keysclient authentication-pki as deployed by SSLAttacks fixed in v3-exportability-encoding-secure Electronic Transaction (SET). WEEK XV: UNIT TEST V WEEK XVI: REVISION ALL FIVE UNIT WEEK XVII: MODEL EXAM WEEK XVIII & XIX: ICD CLASSES & MODEL PRACTICAL EXAM TEXT BOOKS: 1. William Stallings, Cryptography and Network Security, 6 th Edition, Pearson Education, March (UNIT I,II,III,IV). services Test Planning Test Plan Components Test Plan Attachments Locating Test Items test management test process Reporting Test Results WEEK XI: The role of three groups in Test Planning and Policy Development Introducing the test specialist Skills needed by a test specialist Building a Testing Group. WEEK XII: UNIT TEST-IV WEEK XIII: UNIT V Software Needed for automation-test automation-skills Needed Scope of automation- Design and architecture for automation WEEK XIV: requirements for a test tool challenges in automation Test metrics and measurements project, progress and productivity metrics. WEEK XV: UNIT TEST V WEEK XVI: REVISION ALL FIVE UNIT WEEK XVII: MODEL EXAM WEEK XVIII & XIX: ICD CLASSES & MODEL PRACTICAL EXAM TEXT BOOKS: 1. Srinivasan Desikan and Gopalaswamy Ramesh, Software Testing Principles and Practices, Pearson

11 Education, WEEK V: domain testing Using White Box Approach to Test design Test Adequacy Criteria static testing vs. structural testing code functional testing Coverage and Control Flow Graphs Covering Code Logic Paths code complexity testing Evaluating Test Adequacy Criteria. WEEK VI: UNIT TEST -II The need for Levers of Testing Unit Test Unit Test Planning Designing the Unit Tests The Test Harness Running the Unit tests and Recording results Integration tests Designing Integration Tests Integration Test Planning Scenario testing Defect bash elimination System Testing. WEEK VIII: Acceptance testing Performance testing Regression Testing Internationalization testing Ad-hoc testing Alpha, Beta Tests Testing OO systems Usability and Accessibility testing Configuration testing Compatibility testing Testing the documentation Website testing. WEEK IX: Model Exam WEEK X: UNIT IV People and organizational issues in testing Organization structures for testing teams testing 2. Charlie Kaufman, Radia Perlman and Mike Speciner, Network Security, Prentice Hall of India, (UNIT V). REFERENCES: 1. Behrouz A. Ferouzan, Cryptography & Network Security, Tata Mc Graw Hill, Man Young Rhee, Internet Security: Cryptographic Principles, Algorithms and Protocols, Wiley Publications, Charles Pfleeger, Security in Computing, 4 th Edition, Prentice Hall of India, Ulysess Black, Internet Security Protocols, Pearson Education Asia, Charlie Kaufman and Radia Perlman, Mike Speciner, Network Security, Second Edition, Private Communication in Public World, PHI Bruce Schneier and Neils Ferguson, Practical Cryptography, First Edition, Wiley Dreamtech India Pvt Ltd, Douglas R Simson Cryptography Theory and practice, First Edition, CRC Press, IT6702 WEEK I: UNIT I DATA WAREHOUSING AND DATA MINING Data warehousing Components Building a Data warehouse - Mapping the Data Warehouse to a Multiprocessor Architecture

12 WEEK II: DBMS Schemas for Decision Support Data Extraction, Cleanup, and Transformation Tools Metadata. WEEK III: UNIT TEST- I WEEK IV: UNIT II Reporting and Query tools and Applications Tool Categories The Need for Applications Cognos Impromptu Online Analytical Processing (OLAP) WEEK V: Need Multidimensional Data Model OLAP Guidelines Multidimensional versus Multirelational OLAP Categories of Tools OLAP Tools and the Internet. WEEK VI: UNIT TEST -II WEEK VII: UNIT III 1. Frederic Magoules and Jie Pan, Introduction to Grid Computing CRC Press, Daniel Minoli, A Networking Approach to Grid Computing, John Wiley Publication, Barry Wilkinson, Grid Computing: Techniques and Applications, Chapman and Hall, CRC, Taylor and Francis Group, IT6004 SOFTWARE TESTING WEEK I: UNIT I Testing as an Engineering Activity Testing as a Process Testing axioms Basic definitions Software Testing Principles The Tester s Role in a Software Development Organization Origins of Defects WEEK II: Cost of defects Defect Classes The Defect Repository and Introduction Data Types of Data Data Mining Functionalities Interestingness Test Design Defect of Examples Developer/Tester Support of Patterns Classification of Data Mining Systems Data Mining Task Primitives Integration Developing a Defect Repository Defect Prevention of a Data Mining strategies. WEEK VIII: WEEK III: UNIT TEST- I System with a Data Warehouse Issues Data Preprocessing. WEEK IV: UNIT II WEEK IX: Model Exam Test case Design Strategies Using Black Bod Approach to Test WEEK X: UNIT IV Case Design Random Testing Requirements based testing Mining Frequent Patterns, Associations and Correlations Mining Boundary Value Analysis Equivalence Class Partitioning State-

13 WEEK VII: UNIT III WEEK XII: UNIT TEST-IV WEEK XIII: UNIT V Data retention policies; Confidential and Sensitive data handling, lifecycle management costs. Archive data using Hadoop. WEEK XIV: Testing and delivering big data applications for performance and functionality; Challenges with data administration WEEK XV: UNIT TEST V WEEK XVI: REVISION ALL FIVE UNIT WEEK XVII: MODEL EXAM WEEK XVIII & XIX: ICD CLASSES & MODEL PRACTICAL EXAM TEXT BOOK: 1. Kai Hwang, Geoffery C. Fox and Jack J. Dongarra, Distributed and Cloud Computing: Clusters, Grids, Clouds and the Future of Internet, First Edition, Morgan Kaufman Publisher, an Imprint of Elsevier, REFERENCES: 3. Jason Venner, Pro Hadoop- Build Scalable, Distributed Applications in the Cloud, A Press, Tom White, Hadoop The Definitive Guide, First Edition. O Reilly, Bart Jacob (Editor), Introduction to Grid Computing, IBM Red Books, Vervante, Ian Foster, Carl Kesselman, The Grid: Blueprint for a New Computing Infrastructure, 2 nd Edition, Morgan Kaufmann. Methods Mining various Kinds of Association Rules Correlation Analysis Constraint Based Association Mining Classification and Prediction - Basic Concepts - Decision Tree Induction WEEK XI: Bayesian Classification Rule Based Classification Classification by Back propagation Support Vector Machines Associative Classification Lazy Learners Other Classification Methods Prediction. WEEK XII: UNIT TEST-IV WEEK XIII: UNIT V Cluster Analysis - Types of Data Categorization of Major Clustering Methods K-means Partitioning Methods Hierarchical Methods - Density-Based Methods Grid Based Methods WEEK XIV: Model-Based Clustering Methods Clustering High Dimensional Data - Constraint Based Cluster Analysis Outlier Analysis Data Mining Applications. WEEK XV: UNIT TEST V WEEK XVI: REVISION ALL FIVE UNIT WEEK XVII: MODEL EXAM WEEK XVIII & XIX: ICD CLASSES & MODEL PRACTICAL EXAM TEXT BOOKS: 1. Alex Berson and Stephen J.Smith, Data Warehousing, Data Mining and OLAP, Tata McGraw

14 Hill Edition, Thirteenth Reprint Jiawei Han and Micheline Kamber, Data Mining Concepts and Techniques, Third Edition, Elsevier, REFERENCES: 1. Pang-Ning Tan, Michael Steinbach and Vipin Kumar, Introduction to Data Mining, Person Education, K.P. Soman, Shyam Diwakar and V. Aja, Insight into Data Mining Theory and Practice, Eastern Economy Edition, Prentice Hall of India, G. K. Gupta, Introduction to Data Mining with Case Studies, Eastern Economy Edition, Prentice Hall of India, Daniel T.Larose, Data Mining Methods and Models, Wiley-Interscience, CS6703 WEEK I: UNIT I GRID AND CLOUD COMPUTING Evolution of Distributed computing: Scalable computing over the Internet Technologies for network based systems clusters of cooperative computers - Grid computing Infrastructures WEEK II: cloud computing - service oriented architecture Introduction to Grid Architecture and standards Elements of Grid Overview of Grid Architecture. WEEK III: UNIT TEST- I WEEK IV: UNIT II Introduction to Open Grid Services Architecture (OGSA) Motivation Functionality Requirements WEEK V: Practical & Detailed view of OGSA/OGSI Data intensive grid service models OGSA services. WEEK VI: UNIT TEST -II WEEK VII: UNIT III Cloud deployment models: public, private, hybrid, community Categories of cloud computing: Everything as a service: Infrastructure, platform, software - Pros and Cons of cloud computing WEEK VIII: Implementation levels of virtualization virtualization structure virtualization of CPU, Memory and I/O devices virtual clusters and Resource Management Virtualization for data center automation. WEEK IX: Model Exam WEEK X: UNIT IV Open source grid middleware packages Globus Toolkit (GT4) Architecture, Configuration Usage of Globus Main components and Programming model - Introduction to Hadoop Framework - Mapreduce, Input splitting, map and reduce functions. WEEK XI: specifying input and output parameters, configuring and running a job Design of Hadoop file system, HDFS concepts, command line and java interface, dataflow of

15 File read & File write. VISION, MISSION STATEMENT OF THE INSTITUTION Vision Pursuit of excellence in technical education to create civic responsibility with competency. Mission To impart the attributes of global engineers to face industrial challenges with social relevance. To indoctrinate as front runners through moral practices. To attain the skills through lifelong learning.

SRI VENKATESWARA COLLEGE OF ENGINEERING

SRI VENKATESWARA COLLEGE OF ENGINEERING COURSE DELIVERY PLAN - THEORY Page 1 of 6 Department of Information Technology B.E/B.Tech :IT/CS Regulation:2013 LP: CS6701 Rev. No: 01 Date: 30.06.2017 Sub. Code / Sub. Name : CS6701 CRYPTOGRAPHY & NETWORK

More information

SYLLABUS WEEKLY SCHEDULE VII SEMESTER DEPARTMENT OF INFORMATION TECHNOLOGY IV YEAR DEGREE COURSE

SYLLABUS WEEKLY SCHEDULE VII SEMESTER DEPARTMENT OF INFORMATION TECHNOLOGY IV YEAR DEGREE COURSE VELTECH MULTI TECH Dr RANGARAJAN Dr. SAKUNTHALA ENGINEERING COLLEGE (Owned by Vel Trust 1997) (An ISO 9001: 2008 Certified Institution) Accredited By NAAC with A Grade and NBA Accredited Institution (Approved

More information

SL. COURSE No. CODE THEORY ANNA UNIVERSITY, CHENNAI AFFILIATED INSTITUTIONS R-2013 B.TECH INFORMATION TECHNOLOGY SEMESTER VII COURSE TITLE L T P C 1. IT6701 Information Management 2. CS6701 Cryptography

More information

Academic Course Description

Academic Course Description BEC012 - CRYPTOGRAPHY AND NETWORK SECURITY Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication Engineering BEC012 Cryptography

More information

BE COMPUTER SCIENCE & ENGINEERING

BE COMPUTER SCIENCE & ENGINEERING BE COMPUTER SCIENCE & ENGINEERING Elective Courses (Regulation - 2013) S.No Semester Subject Subject Name 1. 6 GE6757 Total Quality Management 2. 6 IT6702 Data Warehousing & Data Mining 3. 7 CS6003 Ad

More information

A & B Section. Day. A Mrs. Krishnaveni S 1204 UB

A & B Section. Day. A Mrs. Krishnaveni S 1204 UB SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF SOFTWARE ENGINEERING COURSE PLAN Course Code : SE1102 Course Title : NETWORKS SECURITY Semester : IV Course Time : FEB MAY 2016 Day A

More information

SUMMARY OF INFORMATION ON EACH COURSE

SUMMARY OF INFORMATION ON EACH COURSE 1. Name of Course Applied Cryptography 2. Course Code TAC 3121 3. Status of Course Specialisation Core for B.IT Security Technology [Applies to (cohort) ] 4. MQF Level/Stage Note : Certificate MQF Level

More information

Department of Information Technology

Department of Information Technology FT/GN/68/00/21.04.15 COURSE DELIVERY PLAN - THEORY Page 1 of 6 Department of Information Technology B.Tech : Information Technology Regulation: 2008 Sub. Code / Sub. Name : IT2032 / Software Testing Unit

More information

10EC832: NETWORK SECURITY

10EC832: NETWORK SECURITY 10EC832: NETWORK SECURITY Objective: In this electronic age, security and privacy are two of the issues whose importance cannot be stressed enough. How do we ensure the systems we use are resistant to

More information

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National

More information

SCHEME OF TEACHING AND EXAMINATION B.E. (ISE) VIII SEMESTER (ACADEMIC YEAR )

SCHEME OF TEACHING AND EXAMINATION B.E. (ISE) VIII SEMESTER (ACADEMIC YEAR ) SCHEME OF TEACHING AND EXAMINATION B.E. (ISE) VIII SEMESTER (ACADEMIC YEAR 2016-17) Sl Subject Code Subject Credits Hours/Week Examination Marks No Lecture Tutorial Practical CIE SEE Total 1 UIS00XX Elective

More information

CRYPTOGRAPHY AND NETWORK SECURITY

CRYPTOGRAPHY AND NETWORK SECURITY CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE FIFTH EDITION William Stallings Prentice Hall Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai

More information

M. PHIL. COMPUTER SCIENCE (FT / PT) PROGRAMME (For the candidates to be admitted from the academic year onwards)

M. PHIL. COMPUTER SCIENCE (FT / PT) PROGRAMME (For the candidates to be admitted from the academic year onwards) BHARATHIDASAN UNIVERSITY TIRUCHIRAPPALLI 620 024 M. PHIL. COMPUTER SCIENCE (FT / PT) PROGRAMME (For the candidates to be admitted from the academic year 2007-2008 onwards) SEMESTER I COURSE TITLE MARKS

More information

M.D UNIVERSITY SCHEME OF STUDIES AND EXAMINATION M.TECH 2nd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER 3rd CBCS Scheme effective from

M.D UNIVERSITY SCHEME OF STUDIES AND EXAMINATION M.TECH 2nd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER 3rd CBCS Scheme effective from M.D UNIVERSITY SCHEME OF STUDIES AND EXAMINATION M.TECH 2nd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER 3rd CBCS Scheme effective from 2017-18 Sl. No Course No. Subject Teaching Schedule Examination

More information

PESIT- Bangalore South Campus Hosur Road (1km Before Electronic city) Bangalore

PESIT- Bangalore South Campus Hosur Road (1km Before Electronic city) Bangalore Data Warehousing Data Mining (17MCA442) 1. GENERAL INFORMATION: PESIT- Bangalore South Campus Hosur Road (1km Before Electronic city) Bangalore 560 100 Department of MCA COURSE INFORMATION SHEET Academic

More information

GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) Semester: IV

GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) Semester: IV GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) Semester: IV Subject Name: Elective I Data Warehousing & Data Mining (DWDM) Subject Code: 2640005 Learning Objectives: To understand

More information

KALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER COURSE PLAN

KALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER COURSE PLAN KALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER 2008-2012 COURSE PLAN Name of the Staff(s) : Mr. M.Raja Name of the Subject / Code : Cryptography and Network / CSE

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 14: Folklore, Course summary, Exam requirements Ion Petre Department of IT, Åbo Akademi University 1 Folklore on

More information

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK UNIT-1 1. Answer the following: a. What is Non-repudiation b. Distinguish between stream and block ciphers c. List out the problems of one time pad d. Define

More information

For Tricia: never dull, never boring, the smartest and bravest person I know

For Tricia: never dull, never boring, the smartest and bravest person I know For Tricia: never dull, never boring, the smartest and bravest person I know Vice President and Editorial Director, ECS: Marcia J. Horton Executive Editor: Tracy Johnson (Dunkelberger) Editorial Assistant:

More information

VELTECH MULTI TECH SYLLABUS WEEKLY SCHEDULE VII SEMESTER DEPARTMENT OF CSE IV YEAR DEGREE COURSE

VELTECH MULTI TECH SYLLABUS WEEKLY SCHEDULE VII SEMESTER DEPARTMENT OF CSE IV YEAR DEGREE COURSE VELTECH MULTI TECH Dr RANGARAJAN Dr. SAKUNTHALA ENGINEERING COLLEGE (Owned by Vel Trust 1997) (An ISO 9001: 2008 Certified Institution) Accredited By NAAC with A Grade and NBA Accredited Institution (Approved

More information

Course File Leaf (Theory) For the Academic Year (Odd/Even Semester)

Course File Leaf (Theory) For the Academic Year (Odd/Even Semester) Nadar Saraswathi College of Engineering and Technology, Vadapudupatti, Theni - 625 531 (Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai) Course File Leaf (Theory) For the Academic

More information

MLR Institute of Technology

MLR Institute of Technology MLR Institute of Technology Laxma Reddy Avenue, Dundigal, Quthbullapur (M), Hyderabad 500 043 Phone Nos: 08418 204066 / 204088, Fax: 08418 204088 COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION Course

More information

Total No. of Questions : 09 ] [ Total No.of Pages : 02

Total No. of Questions : 09 ] [ Total No.of Pages : 02 CS / IT 321 (CR) Total No. of Questions : 09 ] [ Total No.of Pages : 02 III/IV B. TECH. DEGREE EXAMINATIONS, OCT / NOV - 2015 Second Semester COMPUTER SCIENCE & ENGINEERING NETWK SECURITY Time : Three

More information

KALASALINGAM UNIVERSITY

KALASALINGAM UNIVERSITY KALASALINGAM UNIVERSITY (Kalasalingam Academy of Research and Education) DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CLASS NOTES CRYPTOGRAPHY AND NETWOTK SECURITY (CSE 405) Prepared by M.RAJA AP/CSE

More information

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology Question Bank Subject: Information Security (160702) Class: BE Sem. VI (CE/IT) Unit-1: Conventional

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security CRYPTOGRAPHY AND NETWORK SECURITY PRAKASH C. GUPTA Former Head Department of Information Technology Maharashtra Institute of Technology Pune Delhi-110092 2015 CRYPTOGRAPHY

More information

Introduction. Ahmet Burak Can Hacettepe University. Information Security

Introduction. Ahmet Burak Can Hacettepe University. Information Security Introduction Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr Information Security 1 Books Textbook: Network Security: Private Communication in a Public World, 2nd Edition. C. Kaufman, R. Perlman,

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, yderabad - 500 043 COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Course Code Regulation Course Structure Course Coordinator

More information

Name of chapter & details.

Name of chapter & details. Course Title Course Code Information Security IT707 Theory : 03 Course Credit Practical : 01 Tutorial : 00 Course Learning Outcomes Credits : 04 On the completion of the course, students will be able to:

More information

Syllabus CS 430 Introduction to Computer Security Winter 2016

Syllabus CS 430 Introduction to Computer Security Winter 2016 Syllabus CS 430 Introduction to Computer Security Winter 2016 Meeting Times Instructor TA Textbooks Lect: 3:00-3:50 M, Tu, Wed, Th, HB 106 Lab: 3:00-3:50 M, HB 203 Dr. Razvan Andonie, HB 214-E, Office

More information

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements CONTENTS Preface Acknowledgements xiii xvii Chapter 1 TCP/IP Overview 1 1.1 Some History 2 1.2 TCP/IP Protocol Architecture 4 1.2.1 Data-link Layer 4 1.2.2 Network Layer 5 1.2.2.1 Internet Protocol 5 IPv4

More information

Faculty of Science & Information Technology

Faculty of Science & Information Technology Faculty of Science & Information Technology Department: Computer Science COURSE SYLLABUS Short Description Student s Copy One copy of this course syllabus is provided to each student registered in this

More information

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010 Cryptography Chapter 8 Network Security Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security An Introduction

More information

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads Cryptography p y Chapter 8 Network Security Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security An Introduction

More information

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography Code No: RR410504 Set No. 1 1. Write short notes on (a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography 3. (a) Illustrate Diffie-hellman Key Exchange scheme for GF(P) [6M] (b) Consider

More information

8. SU-02 June-2016 All Syllabus Science Facutly B.Sc. Computer Maintance [Optional] Sem. V & VI - 1 -

8. SU-02 June-2016 All Syllabus Science Facutly B.Sc. Computer Maintance [Optional] Sem. V & VI - 1 - - 1-1 - 2-2 - 3 - DR. BABASAHEB AMBEDKAR MARATHWADA UNIVERSITY, AURAIMGABAD 4 Revised SYLLABUS B.Sc. Computer Maintenance (OPTIONAL) {Effective from 2016-2017 } B.Sc. Computer Maintenance (Optional) Course

More information

DEPARTMENT OF COMPUTER APPLICATIONS B.C.A. - THIRD YEAR ( REGULATION) SIXTH SEMESTER LESSON PLAN SRM UNIVERSITY

DEPARTMENT OF COMPUTER APPLICATIONS B.C.A. - THIRD YEAR ( REGULATION) SIXTH SEMESTER LESSON PLAN SRM UNIVERSITY DEPARTMENT OF COMPUTER APPLICATIONS B.C.A. - THIRD YEAR (2011-2012 REGULATION) SIXTH SEMESTER LESSON PLAN SRM UNIVERSITY FACULTY OF SCIENCE AND HUMANITIES SRM NAGAR, KATTANKULATHUR 603 203 Semester Course

More information

Lecture 1: Introduction to Security Architecture. for. Open Systems Interconnection

Lecture 1: Introduction to Security Architecture. for. Open Systems Interconnection Lecture 1: Introduction to Security Architecture for Open Systems Interconnection 1. Purpose of Document This document includes notes to guide the self-study of the students of the lectures on Network

More information

Introduction and Overview. Why CSCI 454/554?

Introduction and Overview. Why CSCI 454/554? Introduction and Overview CSCI 454/554 Why CSCI 454/554? Get Credits and Graduate Security is important More job opportunities More research funds 1 Workload Five homework assignments Two exams (open book

More information

SCHEME OF COURSE WORK. Data Warehousing and Data mining

SCHEME OF COURSE WORK. Data Warehousing and Data mining SCHEME OF COURSE WORK Course Details: Course Title Course Code Program: Specialization: Semester Prerequisites Department of Information Technology Data Warehousing and Data mining : 15CT1132 : B.TECH

More information

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of

More information

Information Security: Principles and Practice Second Edition. Mark Stamp

Information Security: Principles and Practice Second Edition. Mark Stamp Information Security: Principles and Practice Second Edition Mark Stamp August 10, 2009 Contents Preface Second Edition Preface About The Author Acknowledgments xvii xix xxiii xxv 1 Introduction 1 1.1

More information

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus The University of Jordan Accreditation & Quality Assurance Center COURSE Syllabus 1 Course title Computer Security 2 Course number 1901463 Credit hours (theory, practical) 3 3 Contact hours (theory, practical)

More information

Cryptography MIS

Cryptography MIS Cryptography MIS-5903 http://community.mis.temple.edu/mis5903sec011s17/ Cryptography History Substitution Monoalphabetic Polyalphabetic (uses multiple alphabets) uses Vigenere Table Scytale cipher (message

More information

Contents. Foreword to Second Edition. Acknowledgments About the Authors

Contents. Foreword to Second Edition. Acknowledgments About the Authors Contents Foreword xix Foreword to Second Edition xxi Preface xxiii Acknowledgments About the Authors xxxi xxxv Chapter 1 Introduction 1 1.1 Why Data Mining? 1 1.1.1 Moving toward the Information Age 1

More information

Business Intelligence Roadmap HDT923 Three Days

Business Intelligence Roadmap HDT923 Three Days Three Days Prerequisites Students should have experience with any relational database management system as well as experience with data warehouses and star schemas. It would be helpful if students are

More information

VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year & Semester : III & VI Section : CSE - 2 Subject Code : IT6702 Subject Name : Data warehousing

More information

DATA WAREHOUING UNIT I

DATA WAREHOUING UNIT I BHARATHIDASAN ENGINEERING COLLEGE NATTRAMAPALLI DEPARTMENT OF COMPUTER SCIENCE SUB CODE & NAME: IT6702/DWDM DEPT: IT Staff Name : N.RAMESH DATA WAREHOUING UNIT I 1. Define data warehouse? NOV/DEC 2009

More information

Course Name: Information and Computers Networks Security Course Code: IT423

Course Name: Information and Computers Networks Security Course Code: IT423 Course Name: Information and Computers Networks Security Course Code: IT423 I. Basic Course Information Major or minor element of program: Major Department offering the course:information Technology Department

More information

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107) Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience

More information

New Scheme for Integrated M. Sc. (5 years) Programme (Computer Science) starting from 2013

New Scheme for Integrated M. Sc. (5 years) Programme (Computer Science) starting from 2013 New Scheme for Integrated M. Sc. (5 years) Programme (Computer Science) starting from 3 Semester Course Course ID Credit L T P I Computer Fundamentals & Programming in C C Programming Lab CS CS 3 II Object

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives

More information

Kris Gaj Research and teaching interests: ECE 646 Cryptography and Computer Network Security. Course web page: Contact: ECE 646

Kris Gaj Research and teaching interests: ECE 646 Cryptography and Computer Network Security. Course web page: Contact: ECE 646 646 and Computer Network Security Course web page: web page Courses 646 Kris Gaj Research and teaching interests: cryptography network security computer arithmetic FPGA & ASIC design and testing Contact:

More information

APNIC elearning: Cryptography Basics

APNIC elearning: Cryptography Basics APNIC elearning: Cryptography Basics 27 MAY 2015 03:00 PM AEST Brisbane (UTC+10) Issue Date: Revision: Introduction Presenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security

More information

BCA III Network security and Cryptography Examination-2016 Model Paper 1

BCA III Network security and Cryptography Examination-2016 Model Paper 1 Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 1 M.M:50 The question paper contains 40 multiple choice questions with four choices and student will have to pick the correct

More information

ECE 646 Cryptography and Computer Network Security. Course web page: Kris Gaj Research and teaching interests: Contact: ECE web page Courses ECE 646

ECE 646 Cryptography and Computer Network Security. Course web page: Kris Gaj Research and teaching interests: Contact: ECE web page Courses ECE 646 646 Cryptography and Computer Network Security Course web page: web page Courses 646 Kris Gaj Research and teaching interests: cryptography network security computer arithmetic FPGA & ASIC design and testing

More information

Study Guide to Mideterm Exam

Study Guide to Mideterm Exam YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467b: Cryptography and Computer Security Handout #7 Professor M. J. Fischer February 20, 2012 Study Guide to Mideterm Exam For the exam, you are responsible

More information

PESIT SOUTH CAMPUS 10IS835: INFORMATION AND NETWORK SECURITY. Faculty Name: Aisha Begam No. of Hours: 52

PESIT SOUTH CAMPUS 10IS835: INFORMATION AND NETWORK SECURITY. Faculty Name: Aisha Begam No. of Hours: 52 10IS835: INFORMATION AND NETWORK SECURITY Faculty Name: Aisha Begam No. of Hours: 52 Objectives In this electronic age, security and privacy are two of the issues whose importance cannot be stressed enough.

More information

Introduction to information Security

Introduction to information Security First lecture Introduction to information Security Why Computer and information Security Cryptography Secret key algorithms: DES/AES Public key algorithms: RSA One-way hash functions & message digests:

More information

L13. Reviews. Rocky K. C. Chang, April 10, 2015

L13. Reviews. Rocky K. C. Chang, April 10, 2015 L13. Reviews Rocky K. C. Chang, April 10, 2015 1 Foci of this course Understand the 3 fundamental cryptographic functions and how they are used in network security. Understand the main elements in securing

More information

FIT5044 Network security. Unit Guide. Semester 1, 2010

FIT5044 Network security. Unit Guide. Semester 1, 2010 FIT5044 Network security Unit Guide Semester 1, 2010 The information contained in this unit guide is correct at time of publication. The University has the right to change any of the elements contained

More information

ECE 646 Fall 2009 Final Exam December 15, Multiple-choice test

ECE 646 Fall 2009 Final Exam December 15, Multiple-choice test ECE 646 Fall 2009 Final Exam December 15, 2009 Multiple-choice test 1. (1 pt) Parallel processing can be used to speed up the following cryptographic transformations (please note that multiple answers

More information

Pretty Good Privacy (PGP

Pretty Good Privacy (PGP PGP - S/MIME - Internet Firewalls for Trusted System: Roles of Firewalls Firewall related terminology- Types of Firewalls - Firewall designs - SET for E-Commerce Transactions. Pretty Good Privacy (PGP

More information

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures MIS5206 Week 11 Identity and Access Control Week 10 continued Cryptography, Public Key Encryption and

More information

C - Cryptography

C - Cryptography Coordinating unit: 270 - FIB - Barcelona School of Informatics Teaching unit: 749 - MAT - Department of Mathematics Academic year: Degree: 2017 BACHELOR'S DEGREE IN INFORMATICS ENGINEERING (Syllabus 2010).

More information

VEL TECH MULTI TECH Dr RANGARAJAN Dr.SAKUNTHALA ENGINEERING COLLEGE

VEL TECH MULTI TECH Dr RANGARAJAN Dr.SAKUNTHALA ENGINEERING COLLEGE Vt VEL TECH MULTI TECH Dr RANGARAJAN Dr.SAKUNTHALA ENGINEERING COLLEGE (An ISO 9001: 2008 Certified Institution) (Owned by VEL Shree R. Rangarajan Dr. Sakunthala Rangarajan Educational Academy) (Approved

More information

Security in Computing

Security in Computing 1111 --" iiimiitlll Security in Computing Second Edition Charles P. Pfleeger Trusted Information Systems, Inc. Prentice-Hall International, Inc. * Contents PREFACE 1 ISTHERE A SECURITY PROBLEM IN COMPUTING?

More information

Department of Computer Science & Engineering Indian Institute of Technology Patna CS701 DISTRIBUTED SYSTEMS AND ALGORITHMS

Department of Computer Science & Engineering Indian Institute of Technology Patna CS701 DISTRIBUTED SYSTEMS AND ALGORITHMS CS701 DISTRIBUTED SYSTEMS AND ALGORITHMS 3-0-0-6 Basic concepts. Models of computation: shared memory and message passing systems, synchronous and asynchronous systems. Logical time and event ordering.

More information

Security+ SY0-501 Study Guide Table of Contents

Security+ SY0-501 Study Guide Table of Contents Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators

More information

VEL TECH MULTI TECH Dr RANGARAJAN Dr.SAKUNTHALA ENGINEERING COLLEGE

VEL TECH MULTI TECH Dr RANGARAJAN Dr.SAKUNTHALA ENGINEERING COLLEGE Vt VEL TECH MULTI TECH Dr RANGARAJAN Dr.SAKUNTHALA ENGINEERING COLLEGE (An ISO 9001: 2008 Certified Institution) (Owned by VEL Shree R. Rangarajan Dr. Sakunthala Rangarajan Educational Academy) (Approved

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous)

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) INTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) INFORMATION TECNOLOGY COURE DECRIPTION FORM Course Title Course Code Regulation Course tructure Course Coordinator Team of Instructors INFORMATION ECURITY

More information

INSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad INTITUTE OF AERONAUTICAL ENGINEERING Dundigal, yderabad - 500 043 INFORMATION TECNOLOGY COURE DECRIPTION FORM Course Title Course Code Regulation Course tructure Course Coordinator Team of Instructors

More information

S.No QUESTIONS COMPETENCE LEVEL UNIT -1 PART A 1. Illustrate the evolutionary trend towards parallel distributed and cloud computing.

S.No QUESTIONS COMPETENCE LEVEL UNIT -1 PART A 1. Illustrate the evolutionary trend towards parallel distributed and cloud computing. VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year & Semester : IV & VII Section : CSE -1& 2 Subject Code : CS6703 Subject Name : Grid

More information

COURSE PLAN. Computer Science & Engineering

COURSE PLAN. Computer Science & Engineering COURSE PLAN FACULTY DETAILS: Name of the Faculty:: Designation: Department:: Asst. Professor Computer Science & Engineering COURSE DETAILS Name Of The Programme:: Lesson Plan Batch:: 2011-2015 Designation::Assistant

More information

( It will be applied from Fall)

( It will be applied from Fall) İZMİR INSTITUTE OF TECHNOLOGY GRADUATE SCHOOL OF ENGINEERING AND SCIENCES DEPARTMENT OF COMPUTER ENGINEERING MASTER OF SCIENCE PROGRAM IN COMPUTER ENGINEERING Core Courses ECTS *CENG 590 Seminar (0-2)

More information

DEPARTMENT OF COMPUTER APPLICATIONS B.C.A. - THIRD YEAR ( REGULATION) SIXTH SEMESTER LESSON PLAN SRM INSTITUTE OF SCIENCE AND TECHNOLOGY

DEPARTMENT OF COMPUTER APPLICATIONS B.C.A. - THIRD YEAR ( REGULATION) SIXTH SEMESTER LESSON PLAN SRM INSTITUTE OF SCIENCE AND TECHNOLOGY DEPARTMENT OF COMPUTER APPLICATIONS B.C.A. - THIRD YEAR (2015-2016 REGULATION) SIXTH SEMESTER LESSON PLAN SRM INSTITUTE OF SCIENCE AND TECHNOLOGY FACULTY OF SCIENCE AND HUMANITIES SRM NAGAR, KATTANKULATHUR

More information

CUNY John Jay College of Criminal Justice MATH AND COMPUTER SCIENCE

CUNY John Jay College of Criminal Justice MATH AND COMPUTER SCIENCE Instructor: Prof Aftab Ahmad Office: NB 612 Telephone No. (212)393-6314 Email Address: aahmad@jjay.cuny.edu Office Hours: By appointment TEXT & REFERENCE MATERIAL Text Notes from instructor posted on Blackboard

More information

EIGTH SEMESTER LIST OF ELECTIVE FOR EIGTH SEMESTER: (TWO)

EIGTH SEMESTER LIST OF ELECTIVE FOR EIGTH SEMESTER: (TWO) EIGTH SEMESTER CODE COURSE TITLE L T P C CS402 Mobile Communication Systems 3 0 0 3 HM402 Software Project Management 3 0 0 3 Elective IV 3 0 0 3 Elective V 3 0 0 3 CS498 Project Work 6 TOTAL CREDITS 18

More information

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls 32.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 32.2 Figure 32.1 Common structure

More information

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING SHRI ANGALAMMAN COLLEGE OF ENGINEERING & TECHNOLOGY (An ISO 9001:2008 Certified Institution) SIRUGANOOR,TRICHY-621105. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year / Semester: IV/VII CS1011-DATA

More information

C - Cryptography

C - Cryptography Coordinating unit: 270 - FIB - Barcelona School of Informatics Teaching unit: 749 - MAT - Department of Mathematics Academic year: Degree: 2018 BACHELOR'S DEGREE IN INFORMATICS ENGINEERING (Syllabus 2010).

More information

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography Principles of Information Security, Fourth Edition Chapter 8 Cryptography Learning Objectives Upon completion of this material, you should be able to: Chronicle the most significant events and discoveries

More information

SKP Engineering College

SKP Engineering College SKP Engineering College Tiruvannamalai 606611 A Course Material on Cryptography and Network Security By G.Rajkumar Assistant Professor Electronics and Communication Engineering Electronics and Communication

More information

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security 1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security Dr. L. Christofi 1 0. Overview As the knowledge of computer networking and protocols has become more widespread, so the threat of

More information

CS6703 GRID AND CLOUD COMPUTING. Question Bank Unit-I. Introduction

CS6703 GRID AND CLOUD COMPUTING. Question Bank Unit-I. Introduction CS6703 GRID AND CLOUD COMPUTING Question Bank Unit-I Introduction Part A 1. Define Grid Computing. 2. Define Cloud Computing. 3. Analyze the working of GPUs. 4. List out the cluster design. 5. Differentiate

More information

IT443 Network Security Administration Spring Gabriel Ghinita University of Massachusetts at Boston

IT443 Network Security Administration Spring Gabriel Ghinita University of Massachusetts at Boston IT443 Network Security Administration Spring 2018 Gabriel Ghinita University of Massachusetts at Boston Contact Information Instructor: Dr. Gabriel Ghinita Email: Gabriel.Ghinita@umb.edu (preferred contact)

More information

Topics. Number Theory Review. Public Key Cryptography

Topics. Number Theory Review. Public Key Cryptography Public Key Cryptography Topics 1. Number Theory Review 2. Public Key Cryptography 3. One-Way Trapdoor Functions 4. Diffie-Helman Key Exchange 5. RSA Cipher 6. Modern Steganography Number Theory Review

More information

Nepal Telecom Nepal Doorsanchar Company Ltd.

Nepal Telecom Nepal Doorsanchar Company Ltd. Nepal Telecom Nepal Doorsanchar Company Ltd. Syllabus lg=g+= 124 ;+u ;DalGwt cg';'lr - 3_ Part II: (Specialized subject for Computer Engineer Level 7 Tech. - Free and Internal competition) Time: 2 hours

More information

San José State University School/Department Computer Science 265: Cryptography and Computer Security, Fall 2017

San José State University School/Department Computer Science 265: Cryptography and Computer Security, Fall 2017 Course and Contact Information Instructor: Auston Davis Office Location: MacQuarrie Hall 217 Telephone: 650-454-6044 Email: Office Hours: Class Days/Time: auston.davis@sjsu.edu (preferred) Mon 6pm 7pm

More information

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes: Page 1 of 6 I. Common Principles and Approaches to Privacy A. A Modern History of Privacy a. Descriptions, definitions and classes b. Historical and social origins B. Types of Information a. Personal information

More information

DISTRIBUTED SYSTEMS. Second Edition. Andrew S. Tanenbaum Maarten Van Steen. Vrije Universiteit Amsterdam, 7'he Netherlands PEARSON.

DISTRIBUTED SYSTEMS. Second Edition. Andrew S. Tanenbaum Maarten Van Steen. Vrije Universiteit Amsterdam, 7'he Netherlands PEARSON. DISTRIBUTED SYSTEMS 121r itac itple TAYAdiets Second Edition Andrew S. Tanenbaum Maarten Van Steen Vrije Universiteit Amsterdam, 7'he Netherlands PEARSON Prentice Hall Upper Saddle River, NJ 07458 CONTENTS

More information

Course Intended Learning Outcomes (CILOs): Upon successful completion of this course, students should be able to:

Course Intended Learning Outcomes (CILOs): Upon successful completion of this course, students should be able to: Title (Units): COMP 7330 Information Systems Security & Auditing (3,3,0) Course Aims: Prerequisite: To introduce the fundamental concepts and techniques in computer and network security, giving students

More information

CCNA Security 1.1 Instructional Resource

CCNA Security 1.1 Instructional Resource CCNA Security 1.1 Instructional Resource Chapter 7 Cryptographic Systems 2012 Cisco and/or its affiliates. All rights reserved. 1 Explain how cryptology consists of cryptography (encoding messages) and

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

CHOICE BASED CREDIT SYSTEM STRUCTURE. M.Sc COMPUTER SCIENCE

CHOICE BASED CREDIT SYSTEM STRUCTURE. M.Sc COMPUTER SCIENCE CHOICE BASED CREDIT SYSTEM STRUCTURE FOR THOSE WHO HAVE JOINED FROM THE ACADEMIC YEAR 2014 15 ONWARDS M.Sc COMPUTER SCIENCE Sem Part Subject Hrs. Cr. Adl. Cr. Exam (Hrs) Marks Allotted Int. Ext. 01 Part

More information

Cryptography and Network Security Chapter 16. Fourth Edition by William Stallings

Cryptography and Network Security Chapter 16. Fourth Edition by William Stallings Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Chapter 16 IP Security If a secret piece of news is divulged by a spy before the time is ripe, he must be put to death,

More information

ryptograi "ГС for Tom St Denis, Elliptic Semiconductor Inc. Simon Johnson and Author of the LibTom Project

ryptograi ГС for Tom St Denis, Elliptic Semiconductor Inc. Simon Johnson and Author of the LibTom Project for ryptograi "ГС V6 е Tom St Denis, Elliptic Semiconductor Inc. and Author of the LibTom Project Simon Johnson Contents Preface Chapter 1 Introduction 1 Introduction 2 Threat Models 3 What Is Cryptography?

More information

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001) CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001) Gregg, Michael ISBN-13: 9781118083192 Table of Contents Foreword xxi Introduction xxvii Assessment Test xliv Chapter 1 Cryptographic

More information

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review ACS-3921-001/4921-001 Computer Security And Privacy Fall 2018 Mid-Term Review ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been adopted and/or modified

More information