Beruflich Dokumente
Kultur Dokumente
)
Scheme of Teaching and Examination
M.Tech. Computer Science & Engineering
Specialization in Cyber Forensic & Information Security
.Semester – III
Scheme Of
Periods per
Examination
week Total Credit
Subject
S.No Board of studies Subject Mar L+(T+
Code Theory/Practical
ks P)/2
ES
L T P CT TA
E
Computer Sc. & Cyber Laws &
1. 587311(22) 3 1 - 100 20 20 140 4
Engg. Legislation
2. Refer Table – III Elective – III 3 1 - 100 20 20 140 4
Preliminary
Computer Sc. &
3. 587321(22) work on - - 28 100 - 100 200 14
Engg.
Dissertation
Computer Sc. & Technical
4. 587322(22) - - 3 - - 20 20 2
Engg Seminar
Total 6 2 31 300 40 160 500 24
Table – III
Elective – III
Unit-I
Introduction-Cyber Security and its problem-Intervention Strategies: Redundancy, Diversity and
Autarchy
Unit-II
Private ordering solutions, Regulation and Jurisdiction for global Cyber security, Copy Right-source of
risks, Pirates, Internet Infringement, Fair Use, postings, criminal liability, First Amendments, Data Losing
Unit-III
Copy Right-Source of risks,Pirates,Internet Infringement,Fair Use,postings,Criminal Liability,First
Amendments,Losing Data, Trademarks, Defamation, Privacy-Common Law Privacy, Constitutional law,
Federal Statutes, Anonymity, Technology expanding privacy rights.
Unit-IV
Duty of Care, Criminal Liability, Procedural issues, Electronic Contracts & Digital Signatures,
Misappropriation of information, Civil Rights, Tax, Evidence
Unit-V
Ethics, Legal Developments, Late 1990 to 2000,Cyber security in Society, Security in cyber laws case
studies, General law and Cyber Law-a Swift Analysis.
Text Book:
Reference Book:
2. The Law and Economics of Cyber Security- Mark F Grady, Fransesco Parisi
Semester : III Branch: Cyber Forensic & Information Security
Subject: Preserving & Recovering Digital Evidence (Elective – III)
Code : 587331(22)
Total Theory Periods: 40 Total Tutorial Periods: 12
Total Marks in ESE: 100 Minimum number of Class tests to be conducted: 02
Unit – 1
Digital Investigation
Digital evidence and computer crime – history and terminals of computer crime investigation –
technology and law - the investigate process – investigate reconstruction – modus operandi, motive and
technology –digital evidence in the court room
Unit – 2
Computers
Computer basics for digital investigators – applying forensic science to computers – forensic examination
of windows systems – forensic examination of unix systems - forensic examination of macintosh systems
-forensic examination of handheld devices
Unit – 3
Networks
Networks basics for digital investigators – applying forensic science to networks – digital evidence on
physical and datalink layers - digital evidence on network and transport layers - digital evidence on the
internet
Unit – 4
Investigating Computer Crime
Investigating computer intrusions – investigating cyberstalking – digital evidence as alibi
Unit – 5
Guidelines
Handling the digital crime scene – digital evidence examination guidelines
TextBook:
1.’Digital Evidence and Computer Crime Forensic science, Computers and Internet’ - Eoghan Casey –
Elsevier Academic Press –Second Edition
2. A Electronic Discovery and Digital Evidence in a Nut Shell-Shira A scheindlin, Daniel J Capra, The
Sedona Conerence-Academic Press-Third Edition
Reerence Book:
1. Digital Forensic for Network, Internet, and Cloud Computing A forensic evidence guide for moving
Targets and Data’ – Terrence V.Lillard, Glint P.Garrison, Craig A..Schiller, James Steele – Syngress
2. The Best Damn Cybercrime and Digital Forensics Book Period’ [Paperback] Jack Wiles , Anthony
Reyes, Jesse Varsalone - Syngress –Edition in the year 2007
Semester : III Branches: Cyber Forensic & Information Security
Subject: Cloud Computing (ELECTIVE – III) Code : 587332(22)
Total Theory Periods: 40 Total Tutorial Periods: 12
Total Marks in End Semester Exam: 100 Minimum number of Class tests to be conducted: 02
Unit - I
What is the Cloud? The Emergence of Cloud Computing, Cloud-Based Service Offerings, Benefits of
using a Cloud Model, What Are the Key Characteristics of Cloud Computing?, The Evolution of Cloud
Computing – Hardware & Internet Software Evolution.
Unit - II
Communication-as-a-Service (CAAS), Infrastructure-as-a-Service (IAAS), Monitoring-as-a-Service
(MAAS), Platform- as-a-Service (PAAS), Software-as-a-Service (SAAS).
Unit - III
The Evolution from the MSP Model to Cloud Computing and Software-as-a-Service, The Cloud Data
Center, Basic Approach to a Data Center-Based SOA, Where Open Source Software is Used?, Service-
Oriented Architectures as a Step Toward Cloud Computing.
Unit - IV
Cloud Security Challenges, Software-as-a-Service, Security Management People, Security Governance,
Security Portfolio Management, Security Architecture Design, Virtual Machine Security, Identity Access
Management (IAM), Data Security.
Unit - V
What is a Smartphone?, Mobile Operating Systems for Smartphone’s (iPhone, Windows Mobile),
Google(Android) Blackberry, Ubuntu Mobile Internet, Mobile Platform Virtualization (KVM, VMWare).
Text Books :
1. Toby Velte, Anthony Vote and Robert Elsenpeter, “Cloud Computing: A Practical Approach”,
McGraw
Hill, 2002.
2. Cloud Computing: SaaS, PaaS, IaaS, Virtualization, Business Models, Mobile, Security and
More by Kris Jamsa
Reference Books :
1. George Reese, “Cloud Application Architectures: Building Applications and Infrastructures in the
Cloud”, O’Reilly Media, 2003.
2. Tim Matherm, Subra Kumaraswamy and Shahed Latif, “Cloud Security and Privacy: An
Enterprise Perspective on Risks and Compliance”, O’Reilly Media, 2005.
Semester : III Branch: Cyber Forensic & Information Security
Subject: Information Security in Industries (ELECTIVE – III) Code : 587333(22)
Total Theory Periods: 40 Total Tutorial Periods: 12
Total Marks in End Semester Exam: 100 Minimum number of Class tests to be conducted: 02
Text Books:
1. Information Security Management Handbook, Sixth Edition, Volume 6 ,Harold F. Tipton, Micki
Krause Nozaki
Reference Books :