Sie sind auf Seite 1von 5

Chhattisgarh Swami Vivekanand Technical University, Bhilai (C.G.

)
Scheme of Teaching and Examination
M.Tech. Computer Science & Engineering
Specialization in Cyber Forensic & Information Security
.Semester – III

Scheme Of
Periods per
Examination
week Total Credit
Subject
S.No Board of studies Subject Mar L+(T+
Code Theory/Practical
ks P)/2
ES
L T P CT TA
E
Computer Sc. & Cyber Laws &
1. 587311(22) 3 1 - 100 20 20 140 4
Engg. Legislation
2. Refer Table – III Elective – III 3 1 - 100 20 20 140 4
Preliminary
Computer Sc. &
3. 587321(22) work on - - 28 100 - 100 200 14
Engg.
Dissertation
Computer Sc. & Technical
4. 587322(22) - - 3 - - 20 20 2
Engg Seminar
Total 6 2 31 300 40 160 500 24

L – Lecture, T – Tutorial, P – Practical, ESE – End Semester Examination, CT – Class Test, TA –


Teacher Assessment.

Table – III
Elective – III

S. No. Board of Study Subject


Preserving & Recovering Digital
1. Computer Science & Engg. 587331(22)
Evidence
2. Computer Science & Engg. 587332(22) Cloud Computing
3. Computer Science & Engg. 587333(22) Information Security in Industry
Semester : III Branch: Cyber Forensic & Information Security
Subject: Cyber Laws & Legislation Code : 587311(22)
Total Theory Periods: 40 Total Tutorial Periods: 12
Total Marks in ESE: 100 Minimum number of Class tests to be conducted: 02

Unit-I
Introduction-Cyber Security and its problem-Intervention Strategies: Redundancy, Diversity and
Autarchy

Unit-II
Private ordering solutions, Regulation and Jurisdiction for global Cyber security, Copy Right-source of
risks, Pirates, Internet Infringement, Fair Use, postings, criminal liability, First Amendments, Data Losing

Unit-III
Copy Right-Source of risks,Pirates,Internet Infringement,Fair Use,postings,Criminal Liability,First
Amendments,Losing Data, Trademarks, Defamation, Privacy-Common Law Privacy, Constitutional law,
Federal Statutes, Anonymity, Technology expanding privacy rights.

Unit-IV
Duty of Care, Criminal Liability, Procedural issues, Electronic Contracts & Digital Signatures,
Misappropriation of information, Civil Rights, Tax, Evidence

Unit-V
Ethics, Legal Developments, Late 1990 to 2000,Cyber security in Society, Security in cyber laws case
studies, General law and Cyber Law-a Swift Analysis.

Text Book:

1. Cyber Law: The law of the Internet-Jonathan Rosenoer

Reference Book:

2. The Law and Economics of Cyber Security- Mark F Grady, Fransesco Parisi
Semester : III Branch: Cyber Forensic & Information Security
Subject: Preserving & Recovering Digital Evidence (Elective – III)
Code : 587331(22)
Total Theory Periods: 40 Total Tutorial Periods: 12
Total Marks in ESE: 100 Minimum number of Class tests to be conducted: 02

Unit – 1
Digital Investigation
Digital evidence and computer crime – history and terminals of computer crime investigation –
technology and law - the investigate process – investigate reconstruction – modus operandi, motive and
technology –digital evidence in the court room

Unit – 2
Computers
Computer basics for digital investigators – applying forensic science to computers – forensic examination
of windows systems – forensic examination of unix systems - forensic examination of macintosh systems
-forensic examination of handheld devices

Unit – 3
Networks
Networks basics for digital investigators – applying forensic science to networks – digital evidence on
physical and datalink layers - digital evidence on network and transport layers - digital evidence on the
internet

Unit – 4
Investigating Computer Crime
Investigating computer intrusions – investigating cyberstalking – digital evidence as alibi

Unit – 5
Guidelines
Handling the digital crime scene – digital evidence examination guidelines

TextBook:
1.’Digital Evidence and Computer Crime Forensic science, Computers and Internet’ - Eoghan Casey –
Elsevier Academic Press –Second Edition
2. A Electronic Discovery and Digital Evidence in a Nut Shell-Shira A scheindlin, Daniel J Capra, The
Sedona Conerence-Academic Press-Third Edition

Reerence Book:
1. Digital Forensic for Network, Internet, and Cloud Computing A forensic evidence guide for moving
Targets and Data’ – Terrence V.Lillard, Glint P.Garrison, Craig A..Schiller, James Steele – Syngress
2. The Best Damn Cybercrime and Digital Forensics Book Period’ [Paperback] Jack Wiles , Anthony
Reyes, Jesse Varsalone - Syngress –Edition in the year 2007
Semester : III Branches: Cyber Forensic & Information Security
Subject: Cloud Computing (ELECTIVE – III) Code : 587332(22)
Total Theory Periods: 40 Total Tutorial Periods: 12
Total Marks in End Semester Exam: 100 Minimum number of Class tests to be conducted: 02

Unit - I
What is the Cloud? The Emergence of Cloud Computing, Cloud-Based Service Offerings, Benefits of
using a Cloud Model, What Are the Key Characteristics of Cloud Computing?, The Evolution of Cloud
Computing – Hardware & Internet Software Evolution.

Unit - II
Communication-as-a-Service (CAAS), Infrastructure-as-a-Service (IAAS), Monitoring-as-a-Service
(MAAS), Platform- as-a-Service (PAAS), Software-as-a-Service (SAAS).

Unit - III
The Evolution from the MSP Model to Cloud Computing and Software-as-a-Service, The Cloud Data
Center, Basic Approach to a Data Center-Based SOA, Where Open Source Software is Used?, Service-
Oriented Architectures as a Step Toward Cloud Computing.

Unit - IV
Cloud Security Challenges, Software-as-a-Service, Security Management People, Security Governance,
Security Portfolio Management, Security Architecture Design, Virtual Machine Security, Identity Access
Management (IAM), Data Security.

Unit - V
What is a Smartphone?, Mobile Operating Systems for Smartphone’s (iPhone, Windows Mobile),
Google(Android) Blackberry, Ubuntu Mobile Internet, Mobile Platform Virtualization (KVM, VMWare).

Text Books :
1. Toby Velte, Anthony Vote and Robert Elsenpeter, “Cloud Computing: A Practical Approach”,
McGraw
Hill, 2002.
2. Cloud Computing: SaaS, PaaS, IaaS, Virtualization, Business Models, Mobile, Security and
More by Kris Jamsa

Reference Books :

1. George Reese, “Cloud Application Architectures: Building Applications and Infrastructures in the
Cloud”, O’Reilly Media, 2003.
2. Tim Matherm, Subra Kumaraswamy and Shahed Latif, “Cloud Security and Privacy: An
Enterprise Perspective on Risks and Compliance”, O’Reilly Media, 2005.
Semester : III Branch: Cyber Forensic & Information Security
Subject: Information Security in Industries (ELECTIVE – III) Code : 587333(22)
Total Theory Periods: 40 Total Tutorial Periods: 12
Total Marks in End Semester Exam: 100 Minimum number of Class tests to be conducted: 02

Unit-I INFORMATION SECURITY POLICIES


About Policies, Why Policies are Important ?, When policies should be developed?, How Policy should
be developed?, Policy needs, Identify what and from whom it is being protected, Data security
consideration, Backups, Archival storage and disposal of data, Intellectual Property Rights and Policies,
Incidence Response and Forensics, Management Responsibilities, Role of Information Security
Department, Security Management and Law Enforcement, Security awareness training and support.

Unit-II INFORMATION SECURITY OBJECTIVES


Policy Definitions, Standards, Guidelines, Procedures with examples, Policy Key elements, Policy format
and Basic Policy Components, Policy content considerations, Program Policy Examples, Business Goals
Vs Security Goals, Computer Security Objectives, Mission statement Format, Examples, Key roles in
Organization, Business Objectives, Standards, International Standards.

Unit-III WRITING SECURE POLICIES


Writing the Security Policies, Computer location and Facility construction, Contingency Planning,
Periodic System and Network Configuration Audits, Authentication and Network Security, Addressing
and Architecture, Access Control, Login Security, Passwords, User Interface, Telecommuting and
Remote Access, Internet Security Policies, Administrative and User Responsibilities, WWW Policies,
Application Responsibilities, E-mail Security Policies.

Unit-IV ESTABLISHING POLICIES


Establishing Type of Viruses Protection, Rules for Handling Third Party Software, User Involvement
with Viruses, Legal Issues, Managing Encryption and Encrypted data, Key Generation considerations and
Management, Software Development policies, Processes, Testing and Documentation, Revision control
and Configuration management, Third Party Development, Intellectual Property Issues.

Unit-V MAINTAINING POLICIES


Maintaining the Policies, Writing the AUP, User Login Responsibilities, Organization’s responsibilities
and Disclosures, Compliance and Enforcement, Testing and Effectiveness of Policies, Publishing and
Notification, Requirements of the Policies, Monitoring, Controls and Remedies, Administrator
Responsibility, Login Considerations, Reporting of security Problems, Policy Review Process, The
Review Committee, Sample Corporate Policies, Sample Security Policies.

Text Books:

1. Information Security Management Handbook, Sixth Edition, Volume 6 ,Harold F. Tipton, Micki
Krause Nozaki

Reference Books :

1. Scott Barman, “Writing Information Security Policies”, SAMS Publishing, 2002.


2. Thomas R. Peltier, “Information Policies, Procedures and Standards”, CRC Press, 2004.

Das könnte Ihnen auch gefallen