G H RAISONI COLLEGE OF ENGINEERING, NAGPUR. (An

advertisement
G H RAISONI COLLEGE OF ENGINEERING, NAGPUR.
(An Autonomous institute under UGC Act 1956)
Department of Computer Science & Engineering
Teaching Plan
Subject: Computer System Security
VIII Semester BE Computer Science & Engineering (Section A)
2011-2012 Even Semester
Lecture No
1.
Unit
Topics
I
Introduction to the concepts of security : need, principles, Types of Attacks , Services
, Mechanisms
2.
Introduction to the concepts of security : need, principles, Types of Attacks , Services
, Mechanisms
3.
A model for network security , Encryption model Classical encryption techniques:
substitution techniques, Transposition techniques
4.
Block ciphers : simplified DES , Block cipher principles
5.
Block ciphers : simplified DES , Block cipher principles
6.
Data encryption standard , Strength of DES , Block cipher design principles
7.
Block cipher mode of operation, Characteristics of advanced symmetric block
ciphers.
Block cipher mode of operation, Characteristics of advanced symmetric block
ciphers.
Confidentiality using symmetric Encryption : Placement of encryption function
8.
9.
II
10.
Traffic confidentiality , Key distribution , Random number generation
11.
Traffic confidentiality , Key distribution , Random number generation
12.
Public key cryptography : Principles , RSA algorithm
13.
Public key cryptography : Principles , RSA algorithm
14.
Public key cryptography : Principles , RSA algorithm
15.
Key management , Diffie-Hellman key exchange
16.
Key management , Diffie-Hellman key exchange
17.
III
Message authentication & Hash functions : Authentication requirements , Functions ,
Codes , Hash functions
18.
Message authentication & Hash functions : Authentication requirements , Functions ,
Codes , Hash functions
19.
Message authentication & Hash functions : Authentication requirements , Functions ,
Codes , Hash functions
20.
Security of hash function & MAC's. Hash algorithms : MD5 message digest
algorithm
21.
Secure hash algorithm( SHA-I ) , Digital signatures and authentication protocols :
Digital signatures
22.
Authentication protocols , Digital signature standard.
23.
Authentication protocols , Digital signature standard.
24.
IV
Networks security practice : Authentication applications
25.
Networks security practice : Authentication applications
26.
Kerberos, X.509 directory authentication service
27.
Kerberos, X.509 directory authentication service
28.
Kerberos, X.509 directory authentication service
29.
Kerberos, X.509 directory authentication service
30.
E-mail security : Pretty good privacy , S/MIME
31.
V
IP security : Overview , Architecture
32.
Authentication header , Encapsulating security payload , Combining security
associations
33.
Authentication header , Encapsulating security payload , Combining security
associations
34.
Authentication header , Encapsulating security payload , Combining security
associations
35.
Key management. Web security
36.
Key management. Web security
37.
Secure Socket Layer and Transport Layer Security
38.
Secure Socket Layer and Transport Layer Security
39.
Secure Electronic Transaction, SHTTP
40.
Secure Electronic Transaction, SHTTP
41.
VI
Security systems : Intruders
42.
Intrusion detection
43.
Intrusion detection
44.
viruses and related threats
45.
viruses and related threats
46.
Firewalls design principles
47.
Firewalls design principles
48.
Trusted systems, Virtual private networks.
49.
REVISION OF SYLLABUS AND TOPICS
50.
REVISION OF SYLLABUS AND TOPICS
Kapil N Hande
Subject Teacher
G H RAISONI COLLEGE OF ENGINEERING, NAGPUR.
Department of Computer Science & Engineering
Teaching Plan
Subject Name: Computer System Security
Year/Sem: 8 th Sem
Sec: B
Faculty Name: Vrushali V. Kadu
Session: 2011-12
Lecture
Date
Unit No
Topic Description
No
Y/N
I
Lecture 2
Introduction to the concepts of security,
Principles and need for security
Types of Attacks , Services
Lecture 3
Mechanisms, A model for network
security
Lecture 1
Lecture 6
Encryption model Classical encryption
techniques
substitution techniques, Transposition
techniques,
Rotor Machines, Steganography.
Lecture 7
Block ciphers : simplified DES , Block
cipher principles
Lecture 4
Lecture 5
Lecture 8
Lecture 9
Lecture 10
II
Lecture 11
Lecture 12
Lecture 13
Lecture 14
Topics covered
Data encryption standard , Strength of
DES
Block cipher design principles , Block
cipher mode of operation,
Characteristics of advanced symmetric
block ciphers
Confidentiality
using
symmetric
Encryption : Placement of encryption
function
Traffic confidentiality
Key distribution , Random number
generation
Key distribution , Random number
generation
Lecture 15
Public key cryptography : Principles ,
RSA algorithm
Lecture 16
Public key cryptography : Principles ,
RSA algorithm
Lecture 17
Key management ,
Lecture 18
Diffie-Hellman key exchange
Lecture 19
Diffie-Hellman key exchange
Lecture 20
Diffie-Hellman key exchange
III
Lecture 22
Message
authentication
&
Hash
functions
Authentication requirements , Functions
, Codes
Lecture 23
Hash functions , Security of hash
function & MAC's.
Lecture 21
Hash algorithms : MD5 message digest
algorithm ,
Secure hash algorithm( SHA-I )
Lecture 24
Lecture 25
Lecture 29
Digital
signatures,
Authentication
protocols, Digital signature standard.
Networks
security
practice
:
Authentication applications – Kerberos,
Networks
security
practice
:
Authentication applications – Kerberos,
X.509 directory authentication service
Lecture 30
X.509 directory authentication service
Lecture 31
E-mail Security : Pretty good privacy ,
S/MIME
E-mail Security: Pretty good privacy ,
S/MIME
IP security : Overview , Architecture
Lecture 26
Lecture 27
IV
Lecture 28
Lecture 32
Lecture 33
V
Lecture 34
Authentication header
Lecture 35
Encapsulating security payload
Lecture 36
Combining security associations
Lecture 37
Key management.
Lecture 38
Web
security
considerations,
:
Web
security
Secure Socket Layer and Transport
Layer Security
Secure Electronic Transaction, SHTTP.
Lecture 39
Lecture 40
Lecture 41
VI
Security systems : Intruders ,
Lecture 42
Intrusion detection
Lecture 43
viruses and related threats ,
Lecture 44
viruses and related threats
Lecture 45
Lecture 46
Firewalls design principles , Trusted
systems
Virtual private networks.
Lecture 47
Virtual private networks.
Lecture 48
Virtual private networks.
Lecture 49
Question Bank
Lecture 50
Revision
Ms. Vrushali V. Kadu
Dr. L.G.Malik
[Subject Teacher]
H.O.D. [CSE]
Teaching Plan
Subject Name: Embedded Systems
Year/Sem:
8 th Sem B
Faculty Name: Shubhangi J. Moon
Lecture No
Unit No
Topic/Topic Description
Lecture 1
An introduction to embedded systems, Applications
Lecture 2
An Embedded system processor in the system., other hardware
units,.
Lecture 3
Software embedded into a system
Lecture 4
Exemplary embedded systems
Lecture 5
Embedded system - on- chip (SOC) and in VLSI circuit.
Lecture 6
Processor and memory organization
Lecture 8
Structural Units in a Processor. Processor selection for an
embedded system,
memory devices. memory selection for an embedded systems,
Lecture 9
allocation of memory to program cache and memory management
links segments
Lecture 10
blocks and memory map of a system, DMA
Lecture 11
Interfacing processors memories
Lecture 12
Input Output Devices
Lecture 13
Devices and buses for device networks
Lecture 14
1/0 devices timer and colmting devices
Lecture 15
Serial communication using the "12 C' CAN.
Lecture 16
Profibus foundation field bus
Lecture 17
Advanced I/O buses between the network multiple devices
Lecture 18
Host systems
Lecture 7
Lecture 19
I
II
Computer parallel communication between the networked
Lecture 20
1/0 multiple devices using the ISA.
Lecture 21
PCL PCI-X
Lecture 22
Advanced buses
Lecture 23
Device drivers
Lecture 24
Interrupts servicing mechanism
Lecture 25
Device drivers, parallel port
Lecture 26
III
Serial port device drivers in a system
Lecture 27
Device drivers for internal programmable timing devices
Lecture 28
Interrupt servicing mechanism
Lecture 29
Programming Concepts And Embedded Programming
Lecture 30
Embedded Programming In C
Lecture 31
Embedded Programming In C++
Lecture 32
Embedded Programming In VC++
Lecture 33
IV
Embedded Programming In Java
Lecture 34
Interprocess communication & Synchronization of processes
Lecture 35
Task and threads.
Lecture 36
Multiple processes in an application.
Lecture 37
problem of sharing data by multiple tasks and routines
Lecture 38
Interprocess communication.
Lecture 39
Hardware co-design in an embedded system
Lecture 40
Software co-design in an embedded system
Lecture 41
Embedded system project management
Lecture 42
Embedded system design
Lecture 43
Co-design issues in system development process
Lecture 44
Design cycle in the development phase for an embedded system,
Lecture 45
Use of target systems
Lecture 46
Lecture 47
V
Use of software tools for development of an embedded system,
Use of scopes and logic analysis for system
Lecture 48
Hardware tests
Lecture 49
Issues in embedded system design.
Lecture 50
Revision
Ms. S.J.Moon
[Subject Teacher]
Dr.L.G.Malik
[H.O.D CSE]
Teaching Plan
Subject Name: Embedded Systems
Year/Sem:
8 th Sem A
Faculty Name: Priya S.Kamble
Lecture No
Unit No
Topic/Topic Description
Lecture 1
An introduction to embedded systems, Applications
Lecture 2
An Embedded system processor in the system., other hardware
units,.
Lecture 3
Software embedded into a system
Lecture 4
Exemplary embedded systems
Lecture 5
Embedded system - on- chip (SOC) and in VLSI circuit.
Lecture 6
Processor and memory organization
Lecture 8
Structural Units in a Processor. Processor selection for an
embedded system,
memory devices. memory selection for an embedded systems,
Lecture 9
allocation of memory to program cache and memory management
links segments
Lecture 10
blocks and memory map of a system, DMA
Lecture 11
Interfacing processors memories
Lecture 12
Input Output Devices
Lecture 13
Devices and buses for device networks
Lecture 14
1/0 devices timer and colmting devices
Lecture 15
Serial communication using the "12 C' CAN.
Lecture 16
Profibus foundation field bus
Lecture 17
Advanced I/O buses between the network multiple devices
Lecture 18
Host systems
Lecture 7
Lecture 19
I
II
Computer parallel communication between the networked
Lecture 20
1/0 multiple devices using the ISA.
Lecture 21
PCL PCI-X
Lecture 22
Advanced buses
Lecture 23
Device drivers
Lecture 24
Interrupts servicing mechanism
Lecture 25
Device drivers, parallel port
Lecture 26
III
Serial port device drivers in a system
Lecture 27
Device drivers for internal programmable timing devices
Lecture 28
Interrupt servicing mechanism
Lecture 29
Programming Concepts And Embedded Programming
Lecture 30
Embedded Programming In C
Lecture 31
Embedded Programming In C++
Lecture 32
Embedded Programming In VC++
Lecture 33
IV
Embedded Programming In Java
Lecture 34
Interprocess communication & Synchronization of processes
Lecture 35
Task and threads.
Lecture 36
Multiple processes in an application.
Lecture 37
problem of sharing data by multiple tasks and routines
Lecture 38
Interprocess communication.
Lecture 39
Hardware co-design in an embedded system
Lecture 40
Software co-design in an embedded system
Lecture 41
Embedded system project management
Lecture 42
Embedded system design
Lecture 43
Co-design issues in system development process
Lecture 44
Design cycle in the development phase for an embedded system,
Lecture 45
Use of target systems
Lecture 46
Lecture 47
V
Use of software tools for development of an embedded system,
Use of scopes and logic analysis for system
Lecture 48
Hardware tests
Lecture 49
Issues in embedded system design.
Lecture 50
Revision
Ms. P.S.Kamble
[Subject Teacher]
Dr.L.G.Malik
[H.O.D CSE]
TEACHING PLAN
Name of Teacher : Ms. N. A. CHAVHAN.
Name of subject : Mobile Computing NCSL419 (8th Sem CSE)
Year/Sem/Section : IV/8th /A
Lectures
Day
Date
Portion of syllabus to be covered
to
Sessional
planned
1
UNIT-I : Introduction
communication
wireless
2
Wireless transmission
3
Frequencies for radio transmission
4
Signal prorogation
5
Multiplexing Types
6
Modulation Techniques
7
Spread spectrum Techniques
8
Introduction to cellular system
9
Revision Of Unit 1
10
UNIT-II: Medium access control
11
Motivation for a specialized MAC
12
SDMA
13
FDMA
14
TDMA
15
CDMA
16
GSM : System architecture
17
GSM : protocols
18
GSM : localization
19
GSM : calling
20
GSM : handover
21
Revision Of Unit 2
22
UNIT-III: Satellite systems
23
Types : LEO, MEO and GEO
24
Wireless LAN
25
IEEE 802.11 Introduction
26
IEEE 802.11 Terminology
27
Revision Of Unit 3
28
UNIT-IV Wireless LAN Introduction
29
Wireless LAN Terminology
30
HIPERLAN Introduction
31
HIPERLAN Terminology
32
Bluetooth Technology
33
Revision Of Unit 4
34
UNIT-V: Mobile Network Layer
35
Mobile IP
36
dynamic host,
37
configuration protocol,
38
Adhoc networks
39
Mobile transport layer
40
Traditional TCP, Indirect TCP ,
41
Snoopy TCP,mobile TCP,
42
Transaction oriented TCP.
43
Revision Of Unit 5
44
UNIT-VI: Security Issues in Mobile
Computing
Introduction to Security Issues in Mobile
Computing
45
46
Terminologies in Security of Mobile
Computing
47
Securing Devices And USb Ports
48
Improving Mobile Security
49
Firewalls And Encryption techniques
50
Revision Of Unit 6
Total Classes Planned : 50
Subject Teacher
H.O.D.
G.H.RAISONI COLLEGE OF ENGINEERING
DAY WISE TEACHING PLAN
B.E. (CSE) Sem: VIII
Sub:Topics in Distributed System(E –III)
Faculty Name: Ms. Urmila Shrawankar
Lect.
No.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
Topics
Introduction, Motivations, System Architecture Types
Design Issues like global knowledge, naming, scalability, compatibility
Limitation of distributed systems, absence of global clock, shard memory
Lamport’s Logical clock,
Limitation of Lamport’s logical clocks, example
Vector clocks, IR’s, casually related events
Local State, Global state
Termination Detection , Huang’s Termination Detection Algorithm
Mutual exclusion algorithm
Non –Token Based Algorithm’s LAMPORT’S Algorithm with correctness and example
The Ricart-Agrawala algorithm with correctness and ex
Token Based algorithm’s, Suzuki-Kasami’s Broadcast algorithm
Singhal’s Heuristic Algorithm, comparative performance analysis
Issues in Deadlock Detection and Resolution, Centralized, Distributed and Hierarchical control
The completely centralized algorithm, The Ho-Ramamoorthy Algorithms
A Path Pushing Algorithm, An Edge- Chasing algorithm
A Diffusion Computation Based Algorithm and A Global State Detection Based Algorithm
Agreement protocols
Classification, The Byzantine Agreement Problem, The consensus problem
Byzantine Agreement
Distributed File System
Distributed File System Design Issues
Case Studies: The Sun Network File System
Distributed Shared Memory, Architecture,
Memory coherence, Coherence Protocols
Case Studies: IVY, Mirage and Cloud as Distributed Shared Memory
Distributed Scheduling, Issues like Load, Load balancing and Load Sharing, components
Load Distributing Algorithms
The Load Sharing Policies
Recovery: Introduction, Basic Concept, Forward and Backward error recovery
Synchronous Check pointing and Recovery
Asynchronous Check pointing and Recovery
Fault Tolerance: Atomic actions and Committing
The Two-Phase Commit Protocol
Voting Protocol, The Voting Algorithm
Cryptography: Data Encryption Standard (DES)
Cipher Block Chaining
Public Key Cryptography, The RSA method
Authentication Services, Authentication servers, Establishing Interactive Connections
Case Study: The Kerberos system, Phase I, Phase II and Phase III
Ms. Urmila Shrawankar
Subject Teacher
Download