0% found this document useful (0 votes)
15 views32 pages

4-1 Final

The document outlines the course structure and syllabi for the IV B.Tech. I Semester in the Department of Computer Science and Engineering (Cyber Security) at RGM College of Engineering and Technology. It includes details on professional electives such as Malware Analysis, Cyber Security Governance, and Quantum Cryptography, along with their course objectives and outcomes. Each course aims to equip students with essential skills and knowledge in their respective areas of cybersecurity.

Uploaded by

victor12abhishek
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views32 pages

4-1 Final

The document outlines the course structure and syllabi for the IV B.Tech. I Semester in the Department of Computer Science and Engineering (Cyber Security) at RGM College of Engineering and Technology. It includes details on professional electives such as Malware Analysis, Cyber Security Governance, and Quantum Cryptography, along with their course objectives and outcomes. Each course aims to equip students with essential skills and knowledge in their respective areas of cybersecurity.

Uploaded by

victor12abhishek
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

RGM College of Engineering and Technology (Autonomous), Nandyal

IV B.Tech. I, II Semesters – Course Structure and Syllabi


Department of Computer Science and Engineering (Cyber Security) RGM-R-20

IV B-Tech – I Semester Course Structure and Syllabi


Hours/week Marks

edi
Cr

ts
Subject
Name of the Subject

Credits

External
Tutorial

Internal
Code

Theory

Total
Lab
PROFESSIONAL ELECTIVES-III
Malware Analysis
2 1 0 3 30 70 100
Cyber Security Governance
Quantum Cryptography
PROFESSIONAL ELECTIVES-IV
Social Network Security
2 1 0 3 30 70 100
Secure Software Engineering
Mobile and Wireless Network Security
PROFESSIONAL ELECTIVE-V/ MOOCS
Steganography and Digital Watermarking
2 1 0 3 30 70 100
Multimedia Security
Advanced Data Security and Privacy
OPEN ELECTIVE-III/ JOB ORIENTED COURSE
AR&VR
2 1 0 3 30 70 100
HPC
Intelligent Information-Retrieval-Systems
OPEN ELECTIVE-III/ JOB ORIENTED COURSE
Secure Coding Practices
2 1 0 3 30 70 100
Security of E- Systems
Big Data Security
SKILL DEVELOPMET COURSE
Security in AI 1 2 0 2 30 70 100
HUMANITIES AND SOCIAL SCIENCES
Management Science 2 0 0 2 30 70 100
MANDATORY LEARNING COURSES
Universal Human Values 2 0 0 0 0 0 0

Comprehensive Viva 0 0 0 1 0 50 50
Industrial/ Research Internship 0 0 0 3 0 100 100
Total 5 7 0 23 210 640 850

Page 1 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20

IV Year B.Tech. – I Semester - CSE (CS) L T P C


2 1 0 3

MALWARE ANALYSIS
(Professional Elective-III)
Course Objectives:
The learning objectives of this course are to:

 To provide a comprehensive understanding of various types of malware and


their operational techniques.
 To enable students to perform both static and dynamic analysis of malicious
software.
 To introduce reverse engineering tools and debugging techniques for malware
analysis.
 To familiarize students with malware detection methodologies, including
signature-based, heuristic, and machine learning approaches.
 To expose students to real-world malware case studies and advanced analysis
of Android malware and contemporary threats.

Course Outcomes: After successful completion of this course, the students should be able to:
Blooms
COs Statements
Level
Apply foundational knowledge of computing and security to identify
CO 1 L5
and analyse different forms of malware.

CO 2 Conduct both static and dynamic malware analysis using industry-standard L4


tools and methodologies.
Demonstrate proficiency in reverse engineering and debugging malware
CO 3 L5
binaries and source code
Utilize analytical and investigative techniques to detect, classify, and
CO 4 L3
mitigate malicious software

CO 5 Demonstrate an understanding of the ethical, legal, and societal issues related


L6
to malware research and reporting.
CO6 Communicate malware research findings and recommendations clearly L3 to
technical and non-technical audiences.

UNIT- 1: INTRODUCTION TO MALWARE AND SECURITY CONCEPTS:

Introduction to Malware, Malware Threats and Types: Viruses, Worms, Rootkits, Trojans,
Bots, Spyware, Adware, Logic Bombs; Malware Attack Life Cycle; Anti-malware Products
and Overview; Reverse Engineering Basics for Windows and Linux

UNIT -2: STATIC MALWARE ANALYSIS:

Page 2 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20

Static vs Dynamic Malware Analysis Overview; Fingerprinting Malware; PE File Structure &
Header Analysis; String Extraction Techniques, Tools – PEiD, TrID, MASTIFF; YARA Rule
Creation; C Code and Assembly Recognition; Anti-Static Analysis Techniques – Obfuscation,
Packing, Metamorphism, Polymorphism

UNIT -3: DYNAMIC MALWARE ANALYSIS

Concepts – Live vs Dead Malware Analysis; Behavior Monitoring with ProcMon, Autoruns;
Process Monitor and Wireshark, Code Injection Detection; Virtual Machine Structure;
Automated Analysis Tools – VirusTotal; Sandboxing Techniques

UNIT – 4: REVERSE ENGINEERING AND DEBUGGING TECHNIQUES:

x86 Architecture – Memory, Registers, Opcodes, Stack, Control Flow; Tools Overview – IDA
Pro, OllyDbg, x86dbg, Disassemblers, Debuggers, Decompilers; Malware Delivery and
Hidden Component Extraction; Control Flow Flattening; Dynamic Library Loading

UNIT -5: MALWARE FUNCTIONALITY AND DETECTION:

Downloaders, Backdoors, Credential Stealers; Persistence Mechanisms, Process Injection,


Replacement; Hook Injection, APC Injection, Detours; Signature-Based and Heuristic
Detection; Metamorphic & Polymorphic Signatures; Machine Learning & Invariant Inference
Methods

UNIT- 6: ANDROID MALWARE AND CONTEMPORARY TOPICS:

Android Malware Overview; Case Studies – Plankton, DroidKungFu, AnserverBot; Android


App Security Practices, Anti-Debugging, Anti-VM, Anti-Emulation Techniques; Script
Malware Analysis – HTML, PDF, MS Office Macros; Tools – SysInternals Suite, FLARE,
SWFTools, FLASM

Text Books:
1. Abhijit Mohanta, Anoop Saldanha, Malware Analysis and Detection Engineering a
Comprehensive Approach to Detect and Analyze Modern Malware, 2020, 1st edition,
Apress (ISBN 978-1-4842-6192-7), United States.
2. Reginald Wong, Mastering Reverse Engineering, 2018, 1st edition, Packt Publishing Ltd,
Birmingham, ISBN 978-1-78883-884-9, UK.

Page 3 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20

References Books:
1. M. Sikorski and A. Honig, Practical Malware Analysis: The Hands-on Guide to Dissecting
Malicious Software. 2012, 1st edition, No Starch Press San Francisco, CA. (ISBN No.:
9781593272906), United States.
2. Practical malware analysis The Hands-On Guide to Dissecting Malicious Software by
Michael Sikorski and Andrew Honig ISBN-10: 159327-290-1, ISBN-13: 978-1-59327-290-6,
2012 2
3. Computer viruses: from theory to applications by Filiol, Eric Springer Science & Business
Media, 2006
4. Android Malware by Xuxian Jiang and Yajin Zhou, Springer ISBN 978-1-4614-7393-0, 2005
5. Hacking exposed™ malware & rootkits: malware & rootkits security secrets & Solutions
by Michael Davis, Sean Bodmer, Aaron Lemasters, McGraw-Hill, ISBN: 978-0-07-159119-
5, 2010
6. Windows Malware Analysis Essentials by Victor Marak, Packt Publishing, 2015

Page 4 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20

IV Year B.Tech. – I Semester – CSE (CS) L T P C


2 1 0 3

CYBER SECURITY GOVERENCE


(Professional Elective-III)
Course Objectives:
The learning objectives of this course are to:
 Provide a foundational understanding of cybersecurity governance principles,
frameworks, and practices.
 Equip students with the ability to assess, design, and implement effective governance
structures within an organization.
 Develop an understanding of strategic integration and risk management approaches
in cybersecurity governance.
 Analyse governance maturity models and assess organizational preparedness for
cyber threats.
 Introduce students to measurement techniques and security analytics for evaluating
governance effectiveness.
 Familiarize learners with regulatory compliance, reporting practices, and leadership
roles in cyber governance across different industries and international contexts.

Course Outcomes: After successful completion of this course, the students should be able to:
Blooms
COs Statements
Level
Apply knowledge of computing, mathematics, and cybersecurity
CO 1 principles to analyse and solve real-world security governance L3
problems.
CO 2 Identify, formulate, and analyse security threats to derive governance L2
requirements and propose effective solutions..
Design and evaluate governance frameworks that incorporate legal,
CO 3 L2
ethical, and professional standards.
CO 4 Use modern security tools, governance models, and risk assessment L4
techniques effectively.
CO 5 Understand the impact of cybersecurity governance decisions in a L2
global, economic, environmental, and societal context.
Communicate effectively in both technical and non-technical contexts to
CO 6 diverse stakeholders, including management and compliance L5
authorities.

UNIT I – Introduction to Cyber Security Governance:


Introduction to Cyber Security Governance: governance, governance and maturity,
governance and organizational structure, Principles of Cyber Security Governance, Tools,
Methods, and Governance Processes.

UNIT II – Strategic Integration and Risk Approaches

Page 5 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20

Aspects of cyber security governance: strategic integration, allied disciplines, cyber risk
mitigation approach, adaptability and agility, senior engagement, cyber risk analytics,
Introduction to Cyber Risk Analytics.

UNIT III – Assessing an Organization’s Cyber Security Governance and Maturity Models
Assessing an Organization’s Cyber Security Governance: Cyber Prep Level 1, Cyber Prep
Level 2, Cyber Prep Level 3, Cyber Prep Level 4, Cyber Prep Level 5, maturity models: SSE-
CMM, BSI-MM, ISM3, SOMA, GRC MM, PRISMA.

UNIT IV – Governance Models and Frameworks


Risk governance framework, information security governance: information security
governance models and frameworks, information security governance and GRC, key
principles of information security governance, information security governance
organizational approaches.

UNIT V – Metrics, Measurement and Security Analytics


Metrics Concepts in Governance, Application Security Metrics, Network Security Metrics,
Vulnerability Metrics, Security Incident Metrics, Service Level Objectives / Agreements (SLO
/ SLA), NIST Metrics and Compliance, Basics of Security Analytics, Data-Driven Governance,
Impact of Cognitive Security on Governance.

UNIT VI – Governance Leadership, Compliance and Reporting


Threat Intelligence and Security Governance, Industry-Specific Compliance – BFSI,
Healthcare, Telecom, Cyber Security Governance in India and Other Countries, NIST
Mandates for Compliance, Security Reporting Basics – Formats and Best Practices, Chief
Information Security Officer (CISO) – Roles, Responsibilities, and Organization Structure.

Text Books:
1. Deb Bodeau, Steve Boyle, Jenn Fabius-Greene, Rich Graubart. Cyber Prep Paper,
MITRE, 2010. Link for pdf:
https://www.mitre.org/sites/default/files/pdf/10_3710.pdf
2. Jacobs, Jay, and Bob Rudis. Data-driven Security: Analysis, Visualization and
Dashboards. Wiley, 2014.
3. Collins, Michael. Network Security Through Data Analysis: From Data to Action.
O’Reilly Media, 2017.
4. Jaquith, Andrew. Security Metrics: Replacing Fear, Uncertainty, and Doubt. Pearson
Education, 2007.
5. Framework for Improving Critical Infrastructure Cybersecurity. NIST, 2014.

References Books:
1. Touhill, G. and Touhil, C., Cybersecurity for Executives: A Practical Guide. John
Wiley & Sons, 2014.
2. Iannarelli, J.G. and O’Shaughnessy, M.O., Information Governance and Security:
Protecting and Managing Your Company’s Proprietary Information. Elsevier, 2015.
3. Bosworth, S., Kabay, M.E., and Whyne, E., Computer Security Handbook. John Wiley
& Sons, 2014.

Page 6 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20

IV Year B.Tech. – I Semester - CSE (CS) L T P C


2 1 0 3

QUANTUM CRYPTOGRAPHY
(Professional Elective-III)

Course Objectives:
The learning objectives of this course are to:
 Understand the fundamentals of quantum information and cryptography. Learn key
concepts like qubits, density matrices, entropy, and secure quantum communication.
 Explore Quantum Key Distribution (QKD) protocols and error correction methods.
Study QKD techniques, resource constraints, and adaptive error correction strategies.
 Analyse attack strategies and the security of QKD systems. Evaluate attack types in
ideal and real-world environments and review QKD system implementations
 Examine real-life applications and network models in quantum cryptography.
Understand quantum networks, the Ring of Trust, and practical deployment
challenges.

Course Outcomes: After successful completion of this course, the students should be able to:
Blooms
COs Statements
Level
Explain the core principles of quantum information theory. Students will
CO 1 understand qubits, density matrices, entropy, and the foundations of L4
quantum cryptography.
Describe and evaluate various Quantum Key Distribution (QKD) protocols.
CO 2 Students will analyse QKD methods, gain, error correction, and resource L3
management techniques
Assess different attack strategies on QKD systems. Students will examine
CO 3 individual and realistic attacks and understand how they affect protocol L4
security.
Apply statistical methods to analyse QKD networks. Students will use
CO 4 statistical tools to evaluate the performance and reliability of QKD in L3
real-life networks.
Illustrate real-world implementations of quantum cryptographic systems.
CO 5 Students will study projects like SECOQC and identify the challenges in L6
deploying quantum-secure networks.
Discuss application models and trust frameworks in quantum security.
CO6 Studentswill explain the Ring of Trust model and its role in secure L5
communications, such as medical systems.

UNIT -I: FUNDAMENTELS OF QUANTUM INFORMATION & SECURITY:

Page 7 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20

Quantum Information Theory: fundamental definition in quantum cryptography, qubits and


qubit paris, density matrices and quantum systems, entropies and coding, particularity of
quantum information, quantum optics, Unconditional Secure Authentication, Entropy.
Quantum Key Distribution: Quantum Channel, Public Channel.

UNIT- II: QUQNTUM KEY DISTRIBUTION PROTOCOL AND RESOURCES


Quantum Key Distribution (QKD), QKD Gain, Finite Resources, Adaptive Cascade
Introduction, Error Correction and the Cascade Protocol, Adaptive Initial Block-Size Selection,
Fixed Initial Block-Size, Dynamic Initial Block-Size, Examples

UNIT- III: ATTACK STRATEGIES AND QKD SYSTEMS:


Attack Strategies on QKD Protocols: Introduction, Attack Strategies in an Ideal Environment,
Individual Attacks in a Realistic Environment; QKD Systems: Introduction, QKD Systems
Overview

UNIT -IV: STATISTICAL AND NETWORK ANALYSIS OF QKD:


Statistical Methods, Statistical Analysis of QKD Networks in Real-Life Environments, QKD
Networks Based on Q3P: QKD Networks, PPP, Q3P, Routing, Transport

UNIT -V: QUANTUM CRYPTOGRAPHY IN REAL-LIFE NETWORKS:


The SECOQC Project, Bringing QKD into Real Life, Overview of Quantum-Cryptographic
Network Architecture, Implementation Challenges and Deployment Strategies

UNIT -VI: THE RING OF TRUST AND APPLICATION MODELS:


The Ring of Trust Model: Introduction, Model of the Point of Trust, Communication in the
Point of Trust Model, Exemplified Communications, A Medical Information System Based on
the Ring of Trust.

Text Books:
1. Kollmitzer C., Pivk M. (Eds.), Applied Quantum Cryptography, Lect. Notes Phys.
797(Springer, Berlin Heidelberg 2010).

References Books:
1. Gerald B. Gilbert, Michael Hamrick, and Yaakov S. Weinstein, Quantum
Cryptography, World Scientific Publishing.
2. Gilles Van Assche, Quantum Cryptography and Secret-Key Distillation, Cambridge
University Press.

Page 8 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20

IV Year B.Tech. – I Semester - CSE (CS) L T P C


2 1 0 3

SOCIAL NETWORK SECURITY


(Professional Elective-IV)

Course Objectives:
The learning objectives of this course are to:

 Introduce the foundations of social networking, semantic web, and social network
analysis with a focus on privacy and security concepts.
 Understand evolving security and privacy challenges in social networks, including
user behaviour and contextual privacy issues.
 Learn methods for extracting, analysing, and mining data from social networks and
evaluating web communities.
 Explore behavioural prediction, user trust, identity management, and privacy in social
networking environments.
 Gain knowledge of access control, identity federation, and device-level cyber security
policies and tools.

Course Outcomes: After successful completion of this course, the students should be able to:
Blooms
COs Statements
Level
The engineer and society: Apply reasoning informed by the contextual
CO 1 knowledge to assess societal, health, safety, legal and cultural issues L2
and the consequent responsibilities relevant to the professional
engineering practice.
Environment and sustainability: Understand the impact of the
CO 2 professional engineering solutions in societal and environmental L5
contexts, and demonstrate the knowledge of, and need for sustainable
development.
CO 3 Ethics: Apply ethical principles and commit to professional ethics and L4
responsibilities and norms of the engineering practice.

UNIT - I: FUNDAMENTALS OF SOCIAL NETWORKING


Introduction to Semantic Web, Limitations of current Web, Development of Semantic Web,
Emergence of the Social Web, Social Network analysis, Development of Social Network
Analysis,
Key concepts and measures in network analysis, Historical overview of privacy and security,
Major
paradigms, for understanding privacy and security

Page 9 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20

UNIT - II: SECURITY ISSUES IN SOCIAL NETWORKS


The evolution of privacy and security concerns with networked technologies, Contextual
influences
on privacy attitudes and behaviours, Anonymity in a networked world

UNIT - III: EXTRACTION AND MINING IN SOCIAL NETWORKING DATA


Extracting evolution of Web Community from a Series of Web Archive, Detecting
communities in social networks, Definition of community, Evaluating communities, Methods
for community detection and mining, Applications of community mining algorithms, Tools
for detecting communities social network infrastructures and communities, Big data and
Privacy

UNIT - IV: PREDICTING HUMAN BEHAVIOR AND PRIVACY ISSUES


Understanding and predicting human behaviour for social communities, User data
Management, Inference and Distribution, Enabling new human experiences, Reality mining,
Context, Awareness, Privacy in online social networks, Trust in online environment, What is
Neo4j,Nodes,Relationships,Properties

UNIT - V: ACCESS CONTROL, PRIVACY AND IDENTITY MANAGEMENT


Understand the access control requirements for Social Network, Enforcing Access Control
Strategies, Authentication and Authorization, Roles-based Access Control, Host, storage and
network access control options, Firewalls, Authentication, and Authorization in Social
Network, Identity & Access Management, Single Sign-on, Identity Federation, Identity
providers and service consumers, The role of Identity provisioning

UNIT - VI DIGITAL DEVICES SECURITY,TOOLS AND TECHNOLOGIES FOR CYBER


SECURITY:
End Point device and Mobile phone security, Password policy, Security patch management,
Data backup, Downloading and management of third party software, Device security policy,
Cyber Security best practices, Significance of host firewall and Ant-virus, Management of host
firewall and Anti-virus, Wi-Fi security, Configuration of basic security policy and
permissions.

Text Books:
1. Peter Mika, “Social Networks and the Semantic Web, First Edition, Springer 2007.
2. BorkoFurht, “Handbook of Social Network Technologies and Application, First
Edition, Springer, 2010.
3. James Graham, Richard Howard, and Ryan Otson "Cyber Security Essentials", First
Edition, Auerbach Publications,2010.
4. Nina Godbole and Sunit Belpure “Cyber Security: Understanding Cyber Crimes,
Computer Forensics and legal perspectives”

References Books:
1. Easley D. Kleinberg J., “Networks, Crowds, and Markets – Reasoning about a Highly
Connected World”, Cambridge University Press, 2010.
2. Jackson, Matthew O., “Social and Economic Networks”, Princeton University Press,
2008.

Page 10 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20

IV Year B.Tech. – I Semester - CSE (CS) L T P C


2 1 0 3

SECURE SOFTWARE ENGINEERING


(Professional Elective-IV)

Course Objectives:
The learning objectives of this course are to:

 To introduce the fundamentals of secure software engineering and highlight common


security issues in the software development lifecycle (SDLC).
 To understand and apply techniques for eliciting, analyzing, and prioritizing security
requirements using structured methods like SQUARE.
 To develop the ability to design secure software architectures by applying security
principles, guidelines, and threat modelling techniques.
 To implement secure coding practices and perform effective security testing
throughout the software development process.
 To explore governance models, security maintenance strategies, and approaches to
managing secure software in evolving threat environments.

Course Outcomes: After successful completion of this course, the students should be able to:
Blooms
COs Statements
Level
Engineering knowledge: Apply the knowledge of mathematics,
CO 1 science, engineering fundamentals, and an engineering specialization L2
to the solution of complex engineering problems
Problem analysis: Identify, formulate, review research literature, and
CO 2 analyze complex engineering problems reaching substantiated L5
conclusions using first principles of mathematics, natural sciences, and
engineering sciences.
Design/development of solutions: Design solutions for complex
engineering problems and design system components or processes
CO 3 that meet the specified needs with appropriate consideration for the L4,L3
public health and safety, and the cultural, societal, and environmental
considerations.
Conduct investigations of complex problems: Use research-based
knowledge and research methods including design of experiments,
CO 4 L3
analysis and interpretation of data, and synthesis of the information to
provide valid conclusions.

Page 11 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20

Modern tool usage: Create, select, and apply appropriate techniques,


CO 5 resources, and modern engineering and IT tools including prediction L5
and modelling to complex engineering activities with an
understanding of the limitations.
The engineer and society: Apply reasoning informed by the contextual
CO 6 knowledge to assess societal, health, safety, legal and cultural issues L2
and the consequent responsibilities relevant to the professional
engineering practice.

UNIT – I: Security Issues in Software Development


Introduction to Software Engineering – SDLC, Software Assurance and Software Security,
Threats to Software Security, Sources of Software Insecurity, The Benefits of Detecting
Software Security Defects Early, Managing Secure Software Development, Defining
Properties of Secure Software, Security Properties of Software Assertion and Specification of
Desired Security Properties

UNIT – II: Requirements Engineering for Secure Software:


Introduction to Requirements Engineering, Quality Requirements, Misuse and Abuse Cases,
The SQUARE ProcessModel, SQUARE Sample Outputs, Requirements Elicitation,
Requirements Prioritization

UNIT – III: Secure Software Architecture and Design:


Introduction, Software Security Practices for Architecture and Design: Architectural Risk
Analysis, Software Security Knowledge for Architecture and Design: Security Principles,
Security Guidelines, and Attack Patterns

UNIT- IV Secure Coding and Testing:


Introduction, Code Analysis, Coding Practices, Software Security Testing, Security
Testing Considerations Throughout the SDLC

UNIT- V: Governance, and Managing for More Secure Software:


Introduction, Governance and Security, Adopting an Enterprise Software Security
Framework, How Much Security Is Enough, Security and Project Management, Maturity of
Practice.

UNIT- VI: Security Maintenance and Software Evolution


Importance of maintaining security throughout software life cycle, emergence of new threats
with software updates and changes, Challenges and approaches to securing outdated
systems, Procedures for security patches and updates, Importance of security audits and
proactive Monitoring,

Textbooks:
1. Julia H Allen, Sean J Barnum, Robert J Ellison, Gary McGraw, Nancy R Mead, Software
Security Engineering: A Guide for Project Managers, Addison Wesley, 2008.

Page 12 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20

References Books:
2. Developing Secure Software: Jason Grembi, Cengage Learning.
3. Software Securtiy: Richard Sinn, Cengage Learning

IV Year B.Tech. – I Semester - CSE (CS) L T P C


2 1 0 3

MOBILE AND WIRELESS NETWORK SECURITY


(Professional Elective-IV)

Course Objectives:
The learning objectives of this course are to:
 Discover the wireless/mobile market and the future needs and challenges.
 Describe the key concepts of wireless networks, standards, technologies and their
basic
 Operations.
 Evaluate the mac and different network protocols using network simulation software
tools.

Course Outcomes: After successful completion of this course, the students should be able to:
Blooms
COs Statements
Level
Understand Advanced Knowledge Of Networking And Wireless
CO 1 L2
Networking
CO 2 Describe Various Types Of Wireless Networks, Standards, Operations L5
And Use Cases.
CO 3 Compare Wlan, Wpan, Wwan, Cellular Based Upon Underlying L4,
Propagation And Performance Analysis.
Demonstrate Knowledge Of Protocols Used In Wireless Networks
CO 4 L6
And Learn Simulating Wireless Networks.
CO 5 Summarize Wireless Networks Exploring Trade-Offs Between Wire L2
Line And Wireless Links.
CO 6 Develop Mobile Applications To Solve Some Of The Real World L3
Problems.

UNIT - I: Introduction:
Security Issues in Mobile Communication: Mobile Communication History, Security – Wired Vs
Wireless, Security Issues in Wireless and Mobile Communications, Security Requirements in Wireless
and Mobile Communications, Security for Mobile Applications, Advantages and Disadvantages of
Application – level Security.

UNIT - II: Network devices

Page 13 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20

Security at Device, Network, and Server Levels: Mobile Devices Security Requirements, Mobile
Wireless network level Security, Server Level Security. Application Level Security in Wireless
Networks: Application of WLANs, Wireless Threats, Some Vulnerabilities and Attach Methods over
WLANs, Security for 1G Wi-Fi Applications, Security for 2G Wi-Fi Applications, Recent Security
Schemes for Wi-Fi Applications

UNIT - III: Applications Level Security


Application Level Security in Cellular Networks: Generations of Cellular Networks, Security Issues
and attacks in cellular networks, GSM Security for applications, GPRS Security for applications, UMTS
security for applications, 3G security for applications, Some of Security and authentication Solutions.

UNIT - IV: Application Level Security in MANETs


Application Level Security in MANETs: MANETs, Some applications of MANETs, MANET Features,
Security Challenges in MANETs, Security Attacks on MANETs, External Threats for MANET
applications, Internal threats for MANET Applications, Some of the Security Solutions.
Ubiquitous Computing, Need for Novel Security Schemes for UC, Security Challenges for UC, and
Security Attacks on UC networks, some of the security solutions for UC.

UNIT - V: Application Level Security


Application Level Security in Heterogeneous Wireless Networks, Introduction, Some of the
Heterogeneous Wireless Network Architectures, Heterogeneous Network Application in Disaster
Management, Security Problems and Attacks in Heterogeneous Wireless Networks, Some Security
Solutions for Heterogeneous Wireless Networks.

UNIT - VI Security for Mobile Commerce Application


M-commerce Applications, M-commerce Initiatives, Security Challenges in Mobile E-commerce,
Types of Attacks on Mobile E-commerce, A Secure M-commerce Model Based on Wireless Local Area
Network, Some of M-Commerce Security Solutions

Textbooks:
1. Pallapa Venkataram, Satish Babu: “Wireless and Mobile Network Security”, 1st Edition, Tata
McGraw Hill,2010.
2. Frank Adelstein, K.S.Gupta : “Fundamentals of Mobile and Pervasive Computing”, 1st Edition,
Tata McGraw Hill 2005.
3. Randall K. Nichols and Panos C. Lekkas :"Wireless Security: Models, Threats, and
Solutions",1st Edition, Tata McGraw Hill,2002
4. Tyler Wrightson :"Wireless Network Security: A Beginner's Guide”, 1st Edition, Tata McGraw
Hill,2012

References Books:
1. Bruce Potter and Bob Fleck : “802.11 Security” , 1st Edition, SPD O’REILLY 2005.
2. James Kempf: “Guide to Wireless Network Security, Springer. Wireless Internet Security –
Architecture and Protocols”, 1st Edition, Cambridge University Press, 2008

Page 14 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20

IV Year B.Tech. – I Semester - CSE (CS) L T P C


2 1 0 3

STEGANOGRAPHY AND DIGITAL WATERMARKING


(Professional Elective-V/MOOCS)

Course Objectives:
The learning objectives of this course are to:

 Understand the fundamentals of information hiding and its applications in security


and digital communication.
 Explore the principles of steganography and the frameworks used for secret
communication.
 Analyse different steganographic techniques, including substitution systems, bit-
plane tools, and transform domain methods.
 Examine steganalysis methods for detecting and extracting hidden information in
digital media.
 Evaluate modern watermarking techniques and their role in copyright protection and
authentication.
 Investigate the impact of digital copyright laws on information security,
watermarking, and internet-based copyright conflicts.

Course Outcomes: After successful completion of this course, the students should be able to:
Blooms
COs Statements
Level
Demonstrate a comprehensive understanding of information hiding
CO 1 L2
techniques and their real-world applications.
CO 2 Apply various steganographic techniques to embed and retrieve L5
hidden data securely.
CO 3 Conduct steganalysis to detect and counter unauthorized data hiding L4,
in digital media.
CO 4 Develop and optimize watermarking algorithms for image, video, and L6
multimedia security.
CO 5 Critically assess the effectiveness of copyright protection mechanisms L2
and their implementation in digital systems.
Discuss the legal, ethical, and security implications of digital copyright
CO 6 L3
and watermarking in global internet usage.

Page 15 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20

UNIT- I: Introduction to Information hiding - Brief history and applications of information


hiding - Principles of Steganography Frameworks for secret communication - Security of
Steganography systems -Information hiding in noisy data Adaptive versus non adaptive
algorithms - Laplace filtering - Using cover models - Active and malicious attackers -
Information hiding in written text - Examples of invisible communications..

UNIT- II: Survey of steganographic techniques - Substitution system and bitplane tools -
Transform domain techniques - Spread spectrum and information hiding- Statistical
Steganography - Distortion and code generation techniques - Automated generation of
English text.

UNIT - III: Steganalysis - Detecting hidden information - Extracting hidden information. -


Disabling hidden information Watermarking techniques - History - Basic Principles -
applications - Requirements of algorithmic design issues - Evaluation and benchmarking of
watermarking system.

UNIT - IV: Survey of current watermarking techniques - Cryptographic and psycho visual
aspects - Choice of a workspace Formatting the watermark bets - Merging the watermark and
the cover - Optimization of the watermark receiver - Extension from still images to video -
Robustness of copyright making systems

UNIT - V: Fingerprints - Examples - Classification - Research history - Schemes - Digital


copyright and watermarking - Conflict of copyright laws on the internet
.

UNIT - VI: Copyright on the Internet and Watermarking – Digital copyright and
Watermarking, conflict of copyright laws on the internet, Watermarking detector Failure,
Counterfeiting Marks, Detection of the Watermark.

Textbooks:
1. Stefan Katzenbelsser and Fabien A. P. Petitcolas, Information hiding techniques for
Steganography and Digital Watermarking, ARTECH House Publishers, January 2004.

Reference Books
1. Multimedia Security: Steganography and Digital water marking techniques for
protection of Intellectual property, Chun shienlk, Idea group publishing, 2005.
2. Techniques and Applications of Digital Watermarking and content protection, Michel
Arnold, Martin, Shemuckev, Stephen, D. Wolfhusen artech house, 2003.

Page 16 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20

IV Year B.Tech. – I Semester - CSE (CS) L T P C


2 1 0 3

MULTIMEDIA SECURITY
(Professional Elective-V/MOOCS)

Course Objectives:
The learning objectives of this course are to:
 Understand the need for multimedia content protection in distribution networks.
 Explore various encryption techniques and their applications in multimedia.
 Gain knowledge of digital watermarking and steganography techniques.
 Analyze the vulnerabilities and attacks on multimedia protection systems.
 Study modern multimedia security approaches like fingerprinting and authentication.
 Evaluate the effectiveness of encryption, watermarking, and data hiding in real-world
multimedia applications.

Course Outcomes: After successful completion of this course, the students should be able to:
Blooms
COs Statements
Level
CO 1 Explain general issues and vulnerabilities in multimedia protection schemes. L2
CO 2 Apply encryption techniques including chaos-based and streaming media L5
encryption.
CO 3 Differentiate between watermarking and steganography with use cases. L4,
CO 4 Identify and classify multimedia watermarking methods and applications. L6
CO 5 Demonstrate knowledge of multimedia-specific encryption techniques for L2
audio

UNIT - I:
General Issues -Protection of Multimedia Content in Distribution Networks - Vulnerabilities
of Multimedia Protection Schemes- Fundamentals of Multimedia Encryption Techniques

UNIT - II:

Page 17 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20

Multimedia Encryption- Fundamentals of Multimedia Encryption Techniques - Chaos-Based


Encryption for Digital Images and Videos, Key Management and Protection for IP Multimedia
- Streaming Media Encryption-

UNIT - III:
Digital Watermarking–Digital Steganography, Difference between Watermarking and
Steganography, A brief history, Classification Based on Characteristics, Classification Based
on Applications, Watermarking attacks and tools, Image-Processing Attacks, Geometric
Attacks, Cryptographic Attacks, Watermarking Tools.

UNIT - IV:
Multimedia Watermarking - Survey of Watermarking Techniques and Applications - New
Trends and Challenges in Digital Watermarking Technologies. Applications for Printed
Materials-Lossless Data Hiding: Fundamentals, Algorithms, and Applications- Attacking
Multimedia Protecting Systems via Blind Pattern matching

UNIT - V:
Fundamental of Multimedia Encryption Techniques- Introduction, Overview of Modern
Cryptography, Introduction to Multimedia Security, Video Encryption Techniques, Image
Encryption Techniques, Audio and Speech Encryption Techniques.
.

UNIT - VI:
Multimedia Data Hiding, Fingerprinting-And Authentication - Attacking Multimedia
Protection Systems via Blind Pattern Matching - Digital Media Fingerprinting: Techniques
and Trends Scalable Image and Video Authentication- Signature Based Media Authentication.

References Books:
1. B.Furht and D.Kirovski, Multimedia Security Handbook. CRC Press, Boca Ranton,
Florida, 2004
2. Frank Shih, Digital Watermarking and Steganography: Fundamentals and
Techniques, CRC Press, 2014.
3. Furht B, Socek D, Eskicioglu AM. Fundamentals of multimedia encryption techniques.
Multimedia Security Handbook.2004

Page 18 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20

IV Year B.Tech. – I Semester - CSE (CS) L T P C


2 1 0 3

ADVANCED DATA SECURITY AND PRIVACY


(Professional Elective-V/MOOCS)

Course Objectives:
The learning objectives of this course are to:
 Understand the fundamentals of database systems and identify key data security
requirements such as integrity, confidentiality, and reliability.
 Analyze and design distributed databases including architectural models,
fragmentation, and allocation techniques.
 Apply database integration techniques using schema matching, mapping, and
data cleaning methods.
 Demonstrate control mechanisms for data access, view management, and semantic
integrity within secure transactions.
 Explore privacy principles and policies, and understand privacy-enhancing
technologies across various domains.
 Evaluate the impact of privacy on emerging technologies such as IoT, cloud, e-
voting, RFID, and cyber warfare.

Course Outcomes: After successful completion of this course, the students should be able to:
Blooms
COs Statements
Level
CO 1 Design and manage distributed database systems addressing security, L4
fragmentation, and allocation concerns.
CO 2 Integrate heterogeneous databases through schema integration and resolve L2
inconsistencies via data cleaning.
CO 3 Implement access control models and manage transaction properties to ensure L3
secure data operations.

Page 19 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20

CO 4 Analyze privacy challenges and apply privacy-preserving methods in web, L4


email, and data mining environments.
CO 5 Assess the privacy implications of modern technologies and suggest solutions L2
for mitigating potential privacy risks.

UNIT – I: DATA SECURITY:


INTRODUCTION TO DATABASE: Concept of a Database, Security Requirements of
Database, Reliability and Integrity, Database Disclosure, Data Mining and Big Data, Overview
of Relational Database Management Systems, Review of Computer Networks

UNIT – II: DISTRIBUTED DATABASE: Distributed Database system- Distributed Database


Management System Architecture: Architectural models for Distributed Database
Management System Distributed database design - distributed design issues - fragmentation
- Allocation

UNIT – III: DATABASE INTREGATION:


Bottom- Up Design Methodology, Schema Matching, Schema Integration, Schema Mapping,
Data Cleaning

UNIT – IV: DATA AND ACCESS CONTROL


Data and Access Control: View Management, Data Security Access control, Semantic
integrity Control.
Introduction to Transaction Management: Definition of a transaction, Properties of
Transactions, Types of Transactions

UNIT – V: PRIVACY
Privacy Concepts, Privacy Principles and Policies, Authentication and Privacy, Privacy in
Data Mining, Privacy on the web, E-mail Security.

UNIT – VI: PRIVACY IMPACT ON EMERGING TECHNOLOGIES


Radio Frequency identification, Electronic Voting, VoIP and Skype, Privacy in the cloud,
The Internet of Things, Economics, Cyber Warfare

Reference Books:
1. Security in Computing. Charles P. Ploeger and Shari Lawrence Pfleeger, Thind
Edition, Pearson Education, 2003.
2. Principles of Distributed Database Systems, M.Tamer OZSU and Patrick Valdureiz,
Second Edition Pearson Education, 2001

Page 20 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20

IV Year B.Tech. – I Semester - CSE (CS) L T P C


2 1 0 3

AUGMENTED REALITY (AR) & VIRTUAL REALITY (VR)


(Open Elective-III)

Course Objectives:
The learning objectives of this course are to:
 Understand core concepts and components of AR/VR systems. Learn the definitions,
history, and scope of AR/VR technologies. Explore key system elements like displays
and sensory interfaces.
 Apply interface technologies for AR/VR interaction. Examine input/output devices
including trackers and gesture tools. Understand how these interfaces enhance virtual
experiences.
 Evaluate human factors and safety in AR/VR use. Study user performance,
ergonomics, and health concerns. Assess how human interaction impacts AR/VR
system design.
 Explore tools, programming, and applications of AR/VR. Work with VR toolkits and
programming frameworks. Investigate real-world applications across multiple
industries.

Course Outcomes: After successful completion of this course, the students should be able to:
Blooms
COs Statements
Level
Explain the fundamental concepts and evolution of Augmented and
Virtual Reality.
CO 1 L4
Students will describe the definitions, scope, history, and essential
components of AR/VR systems.
Identify and compare various AR/VR input and output devices.
CO 2 Students will differentiate between interaction devices such as L2
trackers, gesture interfaces, and display types.

Page 21 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20

Analyse the role of human factors in AR/VR environments. Students


CO 3 will evaluate performance, usability, and health issues in immersive L3
experiences.
Demonstrate the use of AR/VR development tools and programming
frameworks.
CO 4 L4
Students will utilize toolkits like Java 3D and World Tool Kit for basic
VR scene creation and interaction.
Assess the applications of AR/VR in diverse domains. Students will
CO 5 explore how AR/VR is applied in medicine, education, military, L2
robotics, and entertainment.
Discuss emerging trends and future directions in Augmented Reality.
CO 6 Students will understand advanced AR concepts, hardware/software, L3
and forecast future developments.

UNIT – I: Introduction to Augmented and Virtual Reality: Definition and Scope of Augmented
Reality, A Brief History of AR & VR, Examples and Applications of AR, Related Fields of AR,
Displays, Multimodal Displays, Audio Displays, Haptic, Tactile, and Tangible Displays, Olfactory and
Gustatory Displays, the five classic components of a VR system, Components of VR Systems, Three
I’s of Virtual Reality.

UNIT–II: Interfaces and Interaction Devices in VR and AR: Input devices: trackers, navigation,
gesture interfaces, three dimensional position trackers, navigation and manipulation interfaces and
gesture interfaces. Output devices: graphics displays, sound displays, haptic feedback. virtual reality
vs 3D Computer Graphics, Benefits of Virtual Reality.

UNIT–III: Human Factors and Virtual Space in AR/VR: Methodology and terminology, user
performance studies, VR health and safety issues, medical applications, military applications, robotics
applications, head-up displays, helmet-mounted sights and displays, smart glasses and augmenting
displays, visual space, object space.

UNIT–IV: VR Programming & Human Factors in VR: Toolkits and Scene Graphs, WorldTool
Kit, Java 3D, General Haptics Open Software Toolkit, Methodology and Terminology , User
Performance Studies, VR Health and Safety Issues, VR and Society.

UNIT–V: Emerging & Traditional VR Applications: Medical Applications of VR, Education, Arts,
and Entertainment, Military VR Applications, VR Applications in Manufacturing , Applications of VR
in Robotics, Information Visualization.

UNIT–VI: Advanced Concepts in Augmented Reality:


What is augmented reality, augmented reality concepts, augmented reality hardware, augmented reality
software, the future of augmented reality, applications.

Textbooks:
1. Dieter Schmaltzier and Tobias Hollerer,”Augmented Reality: Principles and Practice”,
Addison-Wesley, 2006.
2. Burdea, G. C. and P. Coffet. ,”Virtual Reality Technology”, Second Edition. Wiley-IEEE Press,
2003/2006.

Page 22 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20

References Books:
1. Sherman, William R. and Alan B. Craig, “Understanding Virtual Reality – Interface,
Application, and Design”,Morgan Kaufmann, 2002.
2. Fei GAO, “Design and Development of Virtual Reality Application System”, Tsinghua Press,
March 2012.
3. Alan Craig, William Sherman and Jeffrey Will, Developing Virtual Reality Applications, Fou
ndations of Effective Design, Morgan Kaufmann, 2009.
4. Guangran LIU, “Virtual Reality Technology”, Tsinghua Press, Jan. 2011.
5. International Journal of Virtual and Augmented Reality (IJVAR)
6. Springer, Virtual Reality.
7. George Mather, Foundations of Sensation and Perception:Psychology Press; 2 edition, 2009.
8. The VR Book: Human‐Centered Design for Virtual Reality, by Jason Jerald
9. Learning Virtual Reality by Tony Parisi, O’ Reilly

IV Year B.Tech. – I Semester - CSE (CS) L T P C


2 1 0 3

HIGH PERFORMANCE COMPUTING


(Open Elective-III)
Course Objectives:
The learning objectives of this course are to:
 To understand the architecture and design principles of modern high-performance
computing systems, including processors, memory hierarchies, and performance
metrics.
 To learn and apply performance optimization techniques for both serial and parallel
programs using tools, compilers, and programming models.
 To develop efficient parallel applications using MPI and OpenMP for shared and
distributed memory systems, focusing on scalability and communication efficiency.

Course Outcomes: After successful completion of this course, the students should be able to:
Blooms
COs Statements
Level
Explain key architectural features of modern processors and evaluate
CO 1 L3
their impact on computational performance.
Apply profiling and optimization techniques to improve the
CO 2 L4
performance of serial and parallel applications.
Design and implement parallel programs using MPI and OpenMP,
CO 3 and optimize them for scalability, communication overhead, and L5
computational efficiency.

UNIT – I: Modern Processors : Stored Program Computer Architecture- General purpose


cache- based microprocessor-Performance based metrics and benchmarks- Moore's Law-

Page 23 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20

Pipelining- Super Scalarity- SIMD- Memory Hierarchies Cache- mapping- prefetch- Multicore
processors- Muti threaded processors- Vector Processors- Design principles.

UNIT – II: Basic optimization techniques for serial code: scalar profiling- function and line
based runtime profiling- hardware performance counters- common sense optimizations-
simple measures, large impact- elimination of common sub expressions- avoiding branches-
using simd instruction sets- the role of compilers - general optimization options- inlining -
aliasing- computational accuracy- register optimizations- using compiler logs- c++
optimizations - temporaries- dynamic memory management- loop kernels and iterators data
access optimization: balance analysis and light speed estimates- storage order- case study:
jacobi algorithm and densematrix transpose.

UNIT – III: Parallel Computers: Taxonomy of parallel computing paradigms- Shared


memory computers- Cache coherance- UMA - ccNUMA- Distributed-memory computers-
Hierarchical systems- Networks- Basic performance characteristics- Buses- Switched and fat-
tree networks- Mesh networks- Hybrids - Basics of parallelization - Why parallelize - Data
Parallelism - Function Parallelism- Parallel Scalability- Factors that limit parallel execution-
Scalability metrics- Simple scalability laws- parallel efficiency - serial performance Vs Strong
scalability- Refined performance models- Choosing the right scaling baseline
UNIT – IV: Distributed memory parallel programming with MPI: message passing -
introduction to MPI – example - messages and point-to- point communication - collective
communication – non blocking point-to-point communication- virtual topologies -
MPI parallelization of Jacobi solver- MPI implementation - performance properties

UNIT – V: Shared memory parallel programming with OpenMp: introduction to OpenMp


- parallel execution - data scoping- OpenMp work sharing for loops- synchronization -
reductions - loop scheduling - tasking - case study: OpenMp- parallel jacobi algorithm-
advanced OpenMpwavefront parallelization- Efficient OpenMP programming: Profiling
OpenMP programs - Performance pitfalls-

UNIT – VI: Efficient MPI programming: MPI performance tools- communication


parameters- Synchronization, serialization, contention- Reducing communication overhead-
optimal domain decomposition- Aggregating messages – Non blocking Vs Asynchronous
communication- Collective communication-Understanding intra-node point-to-point
communication.

Textbooks:
1. Georg Hager, Gerhard Wellein, ” Introduction to High Performance Computing for
Scientists and Engineers”, Chapman & Hall / CRC Computational Science series, 2011.

2. Peter Pacheco "Parallel Programming with MPI" Morgan Kaufmann Publishers In


3. Barbara Chapman, Gabriele Jost, and Ruud van der Pas "Using OpenMP: Portable
Shared Memory Parallel Programming", MIT Press 2008.

References Books:
1. Charles Severance, Kevin Dowd, High Performance Computing, O'Reilly Media, 2nd
Edition, 1998.

Page 24 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20

2. Kai Hwang, Faye Alaye Briggs, Computer Architecture and Parallel Processing,
McGraw Hill, 1984.

IV Year B.Tech. – I Semester - CSE (CS) L T P C


2 1 0 3

INTELLIGENT INFORMATION – RETREIVAL SYSTEMS


(Open Elective-III)

Course Objectives:
The learning objectives of this course are to:

 Understand the fundamentals of information retrieval systems, including their


architecture and role in managing large-scale textual and multimedia data.
 Introduce various indexing techniques and demonstrate their importance in
improving the efficiency of information retrieval.
 Explain automatic indexing and information extraction techniques used to convert
raw documents into searchable formats.
 Familiarize students with data structures and algorithms (like inverted files, signature
files, and n-grams) used for storing and retrieving information.
 Expose learners to advanced retrieval methods, including clustering, ranking,
feedback mechanisms, and multimedia information retrieval systems.

Course Outcomes: After successful completion of this course, the students should be able to:
Blooms
COs Statements
Level
Engineering knowledge: Apply the knowledge of mathematics, science,
CO 1 engineering fundamentals, and an engineering specialization to the solution of L3
complex engineering problems.
Problem analysis: Identify, formulate, review research literature, and analyze
CO 2 complex engineering problems reaching substantiated conclusions using first L4
principles of mathematics, natural sciences, and engineering sciences.

Page 25 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20

Design/development of solutions: Design solutions for complex engineering


CO 3 problems and design system components or processes that meet the specified L5
needs with appropriate consideration for the public health and safety, and the
cultural, societal, and environmental considerations.
Conduct investigations of complex problems: Use research-based knowledge
CO 4 and research methods including design of experiments, analysis and L6
interpretation of data, and synthesis of the information to provide valid
conclusions.
Modern tool usage: Create, select, and apply appropriate techniques,
CO 5 resources, and modern engineering and IT tools including prediction and L4
modelling to complex engineering activities with an understanding of the
limitations.

UNIT- I:
Introduction to Information Retrieval Systems: Definition of Information Retrieval System,
Objectives of Information Retrieval Systems, Functional Overview, Relationship to Database
Management Systems, Digital Libraries and Data Warehouses

UNIT -II:
Information Retrieval System Capabilities: Search Capabilities, Browse Capabilities,
Miscellaneous Capabilities
Cataloguing and Indexing: History and Objectives of Indexing, Indexing Process, Automatic
Indexing, Information Extraction

UNIT -III:
Data Structure: Introduction to Data Structure, Stemming Algorithms, Inverted File Structure,
N-Gram Data Structures, PAT Data Structure, Signature File Structure, Hypertext and XML
Data Structures, Hidden Markov Models

UNIT -IV:
Automatic Indexing: Classes of Automatic Indexing, Statistical Indexing, Natural Language,
Concept Indexing, Hypertext Linkages
Document and Term Clustering: Introduction to Clustering, Thesaurus Generation, Item
Clustering, Hierarchy of Clusters

UNIT -V:
User Search Techniques: Search Statements and Binding, Similarity Measures and Ranking,
Relevance Feedback, Selective Dissemination of Information Search, Weighted Searches of
Boolean Systems, Searching the INTERNET and Hypertext
Information Visualization: Introduction to Information Visualization, Cognition and
Perception, Information Visualization Technologies

UNIT -VI:

Page 26 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20

Text Search Algorithms: Introduction to Text Search Techniques, Software Text Search
Algorithms, Hardware Text Search Systems
Multimedia Information Retrieval: Spoken Language Audio Retrieval, Non-Speech Audio
Retrieval, Graph Retrieval, Imagery Retrieval, Video Retrieval

Textbooks:
1. Information Storage and Retrieval Systems – Theory and Implementation, Second
Edition, Gerald J. Kowalski, Mark T. Maybury, Springer

References Books:
1. Frakes, W.B., Ricardo Baeza-Yates: Information Retrieval Data Structures and
Algorithms, Prentice Hall, 1992.
2. Information Storage & Retrieval By Robert Korfhage – John Wiley & Sons.

IV Year B.Tech. – I Semester - CSE (CS) L T P C


2 1 0 3

SECURE CODING PRACTICES


(Open Elective-IV)

Course Objectives:
The learning objectives of this course are to:

 To understand the core principles of computer security, including threats,


vulnerabilities, and security strategies.
 To study cryptographic techniques used for ensuring data confidentiality, integrity, and
authentication.
 To identify and mitigate common software vulnerabilities through secure programming
practices.
 To analyse and address security challenges in web applications, user environments, and
operating systems.
 To explore network security mechanisms and apply secure coding techniques in
building trusted software systems.

Course Outcomes: After successful completion of this course, the students should be able to:
Blooms
COs Statements
Level
Engineering knowledge: Apply the knowledge of mathematics, science,
CO 1 engineering fundamentals, and an engineering specialization to the solution of L3
complex engineering problems.

Page 27 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20

Problem analysis: Identify, formulate, review research literature, and analyze


CO 2 complex engineering problems reaching substantiated conclusions using first L4
principles of mathematics, natural sciences, and engineering sciences.
Design/development of solutions: Design solutions for complex engineering
CO 3 problems and design system components or processes that meet the specified L5
needs with appropriate consideration for the public health and safety, and the
cultural, societal, and environmental considerations.
Conduct investigations of complex problems: Use research-based knowledge
and research methods including design of experiments, analysis and
CO 4 L6
interpretation of data, and synthesis of the information to provide valid
conclusions.
Modern tool usage: Create, select, and apply appropriate techniques,
CO 5 resources, and modern engineering and IT tools including prediction and L4
modelling to complex engineering activities with an understanding of the
limitations.

UNIT -I: Introduction:


Computer security concepts, Threads, Attacks and Assets, Security Functional Requirements,
Fundamental Security Design Principles, Attack surface and Attack trees, Computer Security
Strategy.

UNIT -II: Computer Security Technology and Principles


Confidentiality with Symmetric Encryption, Message Authentication and hash Functions,
Public Key Encryption, Digital Signature and Key management, Random and Pseudorandom
Numbers.

UNIT -III: Programs and Programming.


Unintentional Programming, Buffer Overflow, Incomplete Mediation, Time-of-Check to Time
of Use, Undocumented Access Point, Off -by- One Error, Integer Overflow, Unterminated
Null-Terminated String, Parameter Length, Type, and Number, Unsafe Utility program, Race
Condition, Malicious Code- Malware, Countermeasures

UNIT -IV: The Web – User Side


Broser attack, Web attack targeting Users, Obtaining Users and Websites Data, Email Attacks,
Introduction to Operating Systems – System Security Planning, Operating Systems hardening,
Application Security, Security Maintenances, Linux/Unix Security, Window Security.

UNIT -V: Network Concept:


Network Concept, War on Networks: Network Security attacks, Threads on Network
Communications, Wireless Network Security, Daniel of Servies, Cryptography in Network
Security, Firewalls, Intrusion Detection and Prevention Systems, Network Management.

UNIT VI Software Security and Trusted Systems.

Page 28 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20

Software Security Issues, Handling Program Input, Writing Safe Program Code, Interacting
with the Operating Systems and Other Programs, Handling Program Output.

Text Books / References Books:

1. William Stallings, Lawrie Brown, Computer Security: Principles and Practice, 3rd
edition,
2. Charles P. Pfleeger, Security in Computing, 4th Edition, Pearson, 2009.

IV Year B.Tech. – I Semester - CSE (CS) L T P C


2 1 0 3

SECURITY OF E-SYSTEMS
(Open Elective-IV)

Course Objectives:
The learning objectives of this course are to:
 To introduce students to the fundamentals of E-Security, including security
frameworks, risk management, and cyber threat mitigation.
 To explore multilevel security models, such as Bell-LaPadula and Chinese
Wall, for effective access control and data protection.
 To analyse banking and payment system security, focusing on fraud
prevention, secure transactions, and smartcard-based banking.
 To understand authentication and monitoring techniques, including tamper-
resistant technologies and treaty verification methods.
 To examine biometric authentication and security printing, covering
fingerprint recognition, iris scans, and anti-counterfeiting methods.
 To develop knowledge in secure system engineering, risk management
methodologies, and assurance techniques for digital security.

Page 29 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20

Course Outcomes: After successful completion of this course, the students should be able to:
Blooms
COs Statements
Level
CO 1 Demonstrate a comprehensive understanding of E-security principles, L3
cybercrime surveys, and security policies.
CO 2 Apply multilevel and multilateral security models for secure access control in L4
various applications.
CO 3 Implement secure banking, bookkeeping, and payment system architectures, L5
preventing financial cyber threats.
CO 4 Utilize monitoring tools and authentication technologies to enhance L6
cybersecurity across digital platforms.
CO 5 Assess and deploy biometric security measures, such as fingerprint L4
recognition, iris scans, and face recognition.

UNIT –I: Introduction to Security Frameworks and Principles:


Introduction to e-security, security costs, the CSI/FBI computer crime and security survery,
security services and security attacks, security management, security policies, A framework-
usability and psychology: attacks based on psychology, insights from psychology reserch-
passwords, system issues, CAPTCHAs, Economics: classical economics, information
economics, game theory, The economics of security and dependability

UNIT -II: Multilevel and Multilateral Security:


Security policy model, the Bell, Lapadula security policy multilateral ,MLS systems, future of
mls-what goes wrong-broader implications of mls. Mutural security: compartmentation, the
chinese wall and the BMA model, inference control

UNIT -III: Banking, Bookkeeping, Payment Systems and e-security applications:


The residual problem bandking and bookkeeping: the origins of bookkeeping, wholesale
payment systems, credit card, smartcard, based banking, home banking and money
laundering, e-security applications, e-security basic concepts and roles, examples of e-
services, basic technologies of e-services: the UDDU/SOAP/WSDL initiative, eb XML
intiative, technical challenges and security,

UNIT -IV: Monitoring, Metering, and Secure Authentication:


Monitoring e-government security: security monitoring life cycle, monitoring tools,
Prepayment meters-taxi meters, tachographs and trucj speed limiters-postage meters, nuclear
command and control: The evolution of command and control, unconditionolity secure
authentication-shared control schemes-tamper resistance and PALs-Treaty verification

UNIT -V: Security Printing, Seals and Biometrics :


Secrecy or openness , security printing and seals: security printing, packaging and seals-
systemic vulnerabilities, evaluation methodology. Biometrics: handwritten signatures-face
recognition , bertilonage, fingerprints, iris codes, voice recognition, E-governmet

UNIT -VI: Development and Management of Secure Systems:


Electronic and information warfare, communications systems, surveillance and target
acquisition IFF systems, Development of secure systems: managing a security project-

Page 30 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20

methodology, security requirements engineering , risk management , managing the team


system evalution and assurance: assurance, evalution-ways forward.

References Books:
1. Anderson, Ross J. Security engineering: a guide to building dependable distributed systems.
John Wiley & Sons, 2010
2. Obaidat, Mohammad, and Noureddine Boudriga. Security of E-systems and Computer
Networks. Cambridge University Press, 2007

Page 31 of 32
RGM College of Engineering and Technology (Autonomous), Nandyal
IV B.Tech. I, II Semesters – Course Structure and Syllabi
Department of Computer Science and Engineering (Cyber Security) RGM-R-20

Page 32 of 32

You might also like