B SC - Cyber Security
B SC - Cyber Security
B SC - Cyber Security
Submitted
To
(ODL) - MODE
Students who enroll in an B.Sc. (Cyber Security) program are typically individuals who already have an
undergraduate degree in computer science, information technology, or a related field. The program typically takes
one to two years to complete, and students are required to complete coursework, research projects, and a
dissertation.
The program is designed to equip graduates with the necessary skills to become IT professionals, and prepares
them for roles such as systems analyst, database administrator, network administrator, cyber security specialist,
and software developer. An B.Sc. (Cyber Security) degree is highly valued in the job market, and graduates can
expect to earn competitive salaries in their chosen field.
(i) (a) Programme's Mission: The mission of an B.Sc. (Cyber Security) program is to provide students with a
comprehensive understanding of information technology and its applications in various industries. The program
aims to equip students with the necessary skills to analyze, design, and develop IT systems that are efficient,
effective, and secure.
The program is designed to prepare students for careers in the rapidly evolving field of information technology,
where there is a constant demand for professionals who can adapt to new technologies and solve complex
problems. The program emphasizes practical, hands-on experience, and encourages students to engage in
research and development activities.
In addition, the program aims to develop students' communication and teamwork skills, as these are essential
for success in the field of IT. Graduates of the program are expected to be leaders in their field, with the ability
to innovate, manage and lead IT projects.
Overall, the mission of an B.Sc.(Cyber Security) program is to produce graduates who are well-rounded IT
professionals, capable of contributing to the growth and success of organizations in various industries.
(b) Objectives:
The objectives of an B.Sc.(Cyber Security) in IT (Information Technology) program vary depending on the
specific program and institution offering it. However, some common objectives of B.Sc.(Cyber Security)
programs include:
Developing advanced knowledge and skills: B.Sc.(Cyber Security) programs aim to provide students with
advanced knowledge and skills in areas such as computer networks, database management,
programming, artificial intelligence, cybersecurity, and more.
Preparing for leadership roles: B.Sc.(Cyber Security) programs often prepare students for leadership roles
in the IT industry by providing them with the knowledge, skills, and confidence to lead teams and make
strategic decisions.
Promoting innovation: B.Sc.(Cyber Security) programs encourage students to think creatively and
innovatively by exposing them to cutting-edge technologies and research.
Enhancing career prospects: B.Sc.(Cyber Security) programs are designed to enhance students' career
prospects by providing them with specialized knowledge and skills that are in high demand in the IT
industry.
Encouraging lifelong learning: B.Sc.(Cyber Security) programs promote a culture of lifelong learning by
providing students with the tools and resources they need to stay up-to-date with the latest advancements in
the IT industry.
(ii) Relevance of the Programme with HEI's Mission and Goals: The relevance of an B.Sc.(Cyber Security)
program with an HEI's (Higher Education Institution) mission and goals depends on the specific institution's
mission and goals. However, in general, B.Sc.(Cyber Security) programs are highly relevant to many HEI's
missions and goals for the following reasons:
Meeting the needs of the IT industry: Many HEIs aim to prepare their graduates to meet the needs of the
industries they will work in. B.Sc.(Cyber Security) programs do exactly that by equipping students with
advanced knowledge and skills in areas such as computer networks, cybersecurity, and artificial intelligence,
which are highly sought after by employers in the IT industry.
Supporting research and innovation: Many HEIs aim to support research and innovation by providing their
students with access to cutting-edge technologies and research facilities. B.Sc.(Cyber Security) programs often
involve research projects, internships, and other opportunities for students to explore and develop innovative
solutionsto real-world problems.
Enhancing the institution's reputation: Many HEIs aim to enhance their reputation by offering high-quality
academic programs that produce successful graduates. B.Sc.(Cyber Security) programs are highly regarded in
the IT industry, and graduates of these programs are often sought after by employers, which can enhance the
institution's reputation.
Encouraging lifelong learning: Many HEIs aim to promote a culture of lifelong learning by providing their
students with the tools and resources they need to continue learning throughout their careers. B.Sc.(Cyber
Security) programs often involve ongoing professional development opportunities and access to industry experts,
which can help students stay up-to-date with the latest advancements in the IT industry.
Overall, an B.Sc.(Cyber Security) program can be highly relevant to an HEI's mission and goals, particularly if
the institution aims to prepare its graduates for successful careers in the IT industry, support research and
innovation, and promote lifelong learning.
The prospective target group of learners for an B.Sc.(Cyber Security) program can vary depending on the specific
program and institution offering it. However, in general, the target group of learners for an B.Sc.(Cyber Security)
program are individuals who:
Are interested in advancing their knowledge and skills in IT: B.Sc.(Cyber Security) programs are
designed for individuals who want to deepen their understanding of IT concepts, technologies, and
applications. Prospective students may be interested in pursuing careers in areas such as software
development, network administration, cybersecurity, or data analytics.
Are motivated and self-directed learners: B.Sc.(Cyber Security) programs require a high level of self-
direction and motivation, as students must complete complex coursework, research projects, and
other assignmentswith minimal supervision.
Have strong analytical and problem-solving skills: B.Sc.(Cyber Security) programs involve complex
problem-solving and require students to think critically and analytically. Prospective students should
have strong analytical and problem-solving skills to succeed in the program.
Are interested in pursuing leadership roles in the IT industry: B.Sc.(Cyber Security) programs often
prepare students for leadership roles in the IT industry by providing them with the knowledge, skills, and
confidence to lead teams and make strategic decisions. Prospective students who are interested in pursuing
leadership roles in the IT industry may find an B.Sc.(Cyber Security) program particularly appealing.
Overall, the target group of learners for an B.Sc.(Cyber Security) program is typically composed of motivated,
self-directed learners with a strong foundation in IT fundamentals who are interested in advancing their
knowledge and skills in IT and pursuing careers in the field.
(iv) Appropriateness of programme to be conducted in the Open and Distance Learning mode to acquire
specific skills and competence:
The B.Sc.(Cyber Security) program can be appropriately conducted in the Open and Distance Learning (ODL)
mode to acquire specific skills and competence. Here are some reasons why:
Flexibility: The ODL mode provides flexibility in terms of time, pace, and place of learning, which is
especially important for learners who are already working or have other commitments. This mode
allows learners to design their own study schedules and access course materials at their convenience,
which can help them to balance their work, family, and educational commitments.
Access to learning resources: ODL mode can provide access to a wide range of learning resources,
including digital textbooks, audio and video lectures, interactive simulations, and virtual laboratories.
This mode allows learners to access these resources from anywhere, which can help them to deepen
their understanding of key concepts and develop specific skills and competencies.
Personalized learning: ODL mode can provide personalized learning experiences to learners by using
adaptive learning technologies, providing individual feedback, and offering personalized tutoring. This
mode can help learners to focus on their specific needs and interests and acquire the skills and
competence they need to succeed in their chosen field.
Cost-effective: ODL mode can be a cost-effective option for learners who are unable to attend
traditional, on-campus programs. This mode can reduce the cost of tuition, accommodation, and
transportation, making it more accessible to learners from diverse socioeconomic backgrounds.
Practical components: Although some practical components of the B.Sc.(Cyber Security)program may
require access to laboratory equipment, there are still many theoretical components of the program that can
be delivered effectively through the ODL mode. Furthermore, some universities offer online laboratories
and simulations that can be used to supplement or replace the practical componentsof the program.
Overall, the B.Sc.(Cyber Security) program can be appropriately conducted in the ODL mode, providing
learners with the opportunity to acquire specific skills and competence in a flexible, accessible, personalized, and
cost-effective manner.
(v) Instructional Design: The B.Sc.(C.S.). programme is a three-year degree programme of 132 credits. The
course material for the programme has been developed in-house with contributions from seasoned academicians
as well. The instructional design comprises all learning activities i.e., reading and comprehending the SLM,
availing audio-visual aids to enhance knowledge, attending counselling sessions and preparing assignments.
The Programme is of 3 year duration with semester examinations. The maximum period allowed is 6 years(double the
duration). The Programme structure is as below.
(b)
(c) Duration of the Programme: The Duration of the Programme is Three years.
(d) Faculty and Support Staff Requirement: At present, there are three faculty members in the Department.
The Department have all support staff for its the smooth functioning.
The instructional delivery mechanisms of the program should be designed to cater to the diverse needs of the
learners, provide flexibility, and ensure effective learning outcomes. The program should also provide adequate
support services such as academic counselling, technical support, and mentorship to ensure that learners receive
the necessary guidance and assistance throughout the program.
As the University functions in the Open and Distance Learning mode, the programmes that we offer are
designed to meet the varied requirements of the distant learner. Keeping this in view, the course material
developed by the Department is learner friendly. Each course is divided into four to five blocks, which are
further divided into units. Each Block consists of three to four units. This number has been determined taking
into consideration the learning capabilities of our learners. The structure of the unit is in line with the guidelines
laid down by the DEB-UGC, the apex regulatory body of Open and Distance Learning. The content is kept
simple and lucid and follows the self-instructional pattern. Each lesson includes a number of self-assessment
questions along with hint answers so that the students are able to track their progress as they proceed with the
lesson. At the end of each unit, a list of other relevant books is also provided. Besides providing quality study
material to our learners, the Department, following the ODL pattern, has defined its programmes in the terms of
credits. In the ODL system, one credit is equivalent to 30 study hours i.e. the study input required for
completion of the programme. Normally the B.Sc.(Cyber Security) programme is a 132-credit programme. This
comprises all learning activities ie., reading and comprehending the SLM, availing audio-visual aids to enhance
knowledge, attending counselling sessions and preparing assignments. Thus, in the B.Sc.(Cyber Security)
programme, a learner is expectedto put in 2160 study hours to complete the programme in two years' time.
Admission Process :
Notification issued by the University in Regional and National Newspapers and in the official website.
Admission process is online through the MPOnline Portal. Payment of fee through online (various options like
net banking etc.). Submission of the printout of the application by the candidate to concern study center along
with original documents for eligibility, date of birth etc., and along with fee paid receipt. After the Verification
of applications- for fulfillment of eligibility criteria (marks cards) documents, fee paid details. Approval of the
admission and issue of self-learning material (Study Materials) to the students.
Contact Programmes :
The personal contact programme in every course shall extend over a period of 13 working days in each
semester and is usually conducted at the beginning of the session. The students are expected to come prepared
in the class in order to discuss their problems meaningfully. 75% attendance in the personal contact programme
is mandatory.
Evaluation norms: A learner will be evaluated on the basis of Assignments and term-end examination.
Assignments carry 30% weightage whereas the term end examination carry 70% weightage.
Evaluation system:
● Students shall have a minimum of 50% of total marks of the University examinations in each
Course. The overall passing minimum is 50% both in aggregate of Continuous Internal
Assessment and External Examination in each Course.
● Every course shall have two components of assessment namely,
⮚ Continuous Internal Assessment “CIA”: This assessment will be carried out throughout the
semester as per the Academic Schedule.
⮚ End Semester Examination “ESE”: This assessment will be carried out at the end of the
Semester as per the Academic Schedule.
Continuous Internal Assessment “CIA”:
● Continuous Internal Assessment for each Course shall be by means of Written Tests/ Assignments,
and Class Tests for a total mark of 30.
● Continuous Internal Assessment for each Course shall be the responsibility of the concerned
CourseFaculty.
● The valued answer papers/assignments shall be given to the students after the valuation is completed
and they be asked to check and satisfy themselves about the marks they scored.
● All records in respect of Continuous Internal Assessments shall be in the safe custody of the PI for
at least one year after the assessment.
Practical/Project/ Lab 5%
3. --
4. End Semester Exam 70% 2 to 3 hours
Grading System
Based on the student‟s performance in each semester, grade is awarded with a final letter grade at the
end of the exam evaluation of each Course. The letter grades and the corresponding grade points are as
follows.
Table 3: Grading system
Range of Marks Letter Grade Grade Points Remarks
90 – 100 S 10 Outstanding
80-89 A 09 Excellent
70-79 B 08 Very Good
60-69 C 07 Good
50-59 D 06 Average
40-49 E 05 Pass
To Reappear for End-Semester
<40 U 00
Examination
GPA and CGPA
Grade Point Average (GPA) is the ratio of the sum of the product of the number of credits Ci of course
“i “and the grade points Pi earned for that course taken over all courses “i” registered and successfully
completed by the student to the sum of Ci for all “i”. That is,
Cumulative Grade Point Average (CGPA) will be calculated in a similar manner, in any semester,
considering all the courses enrolled from the first semester onwards. The Grade card will not include the
computation of GPA and CGPA for courses with letter grade “U” until those grades are converted to the
regular grades.
Grade Sheet
Based on the performance, each student is awarded a final letter grade at the end of the semester in each
course. The letter grades and corresponding grade points are given in Table 3. A student is considered to
have completed a course successfully and earned credits if he/she secures a letter grade other than U in
that course. After results are declared, grade sheet will be issued to each student which will contain the
following details:
● Program and discipline for which the student has enrolled.
● Semester of registration.
● The course code, name of the course, category of course and the credits for each course
registered in that semester
● The letter grade obtained in each course
● Semester Grade Point Average (GPA)
● The total number of credits earned by the student up to the end of that semester in each
of the course categories.
● The Cumulative Grade Point Average (CGPA) of all the courses taken from the first semester.
● Credits earned under Non – CGPA courses.
● Additional credits earned for the respective UG degree or respective Degree with
Minor specialization
Class/Division
Classification is based on as follows: CGPA ≥ 8.0: First
Class with Distinction
6.5 ≤ CGPA <8.0: First Class
5.0 ≤ CGPA <6.5: Second Class
(i) Further, the award of „First class with distinction‟ is subject to the candidate becoming eligible
for the award of the degree, having passed the examination in all the courses in his/her first
appearance with effect from II semester and within the minimum duration of the programme.
(ii) The award of „First Class‟ is further subject to the candidate becoming eligible for the award
of the degree, having passed the examination in all thecourses within 5 years.
(iii) The period of authorized break in study will not be counted for the purpose of the above
classification.
⮚ Successfully acquired the credits in the different categories as specified in the curriculum
corresponding to the discipline of his/her study within the stipulated time:
⮚ Has no dues to all sections of the institute including hostels and has no
disciplinaryaction pending against him/her.
⮚ The award of the degree must be recommended by the Academic Council and approved
bythe Board of Management of the university.
Re-View Of Answer Scripts / Single Valuation
If any student feels aggrieved on the final outcome of the assessment in any course, the student shall
apply to the Controller of Examinations, along with the prescribed fee, for the review of Tern End
examination answer script, within the stipulated time after the announcement of the results of the
examinations. The Controller of Examinations shall facilitate the review of the answer script jointly to
be carried out by the student and the faculty detailed for this purpose. If any discrepancy is noticed
during review the same shall be rectified and the originally awarded grade accordingly amended.
Computer Lab: The University has most modern high-tech Computer Lab with 24 hrs. Internet facility
for studying and R&D activities. The state-of-the-art facility features hardware & software that is
geared to specific academic programmes.
Research Lab: University equipped with round the clock available Hi-tech research Lab. which
includes latest configured systems with Hi-speed internet facility loaded with latest software for
research purpose.
Library: The University library is the hub of knowledge with more than 105832 books, Online
Journals/Magazines, Back Volumes:, Thesis & Dissertations:, News Papers: 12, Book Bank: 25850
are conveniently accessible for the students and staff of MPBOU. Library includes Main reading area,
separate reading area and reference section.
The MPBOU system consists of a Central Library and Departmental Libraries which collectively
support the teaching, research and extension programmes of the Institute. All students, faculty members
and employees of the Institute are entitled to use the Library facilities enrolling membership.
Internet Facilities: One Gbps – Lease Line Link are available at the university. University is fully
networked with a campus wide network interconnecting all departments. Campus is fully Wi-Fi with high
Speed internet connection available round-d-clock.
MS TEAMS Platform: The University has acquired the Zoom platform license and has gone 100%
virtual in terms of delivering the regular classes during the COVID lockdown. This has given enough
experience for the faculty and expertise to handle the platform for online learning. More than 150 guest
lecturers have been organised in the brief period of three weeks inviting industry experts. The MPBOU
team is now digitally empowered to conduct OL classes on this virtual platform on a regular basis
which shall make the learning process very effective.
LMS: The Institute is using MOODLE and Microsoft Teams for Online teaching andto conduct test
and Assignments
Quality assurance mechanisms are important in ensuring that B.Sc.(Cyber Security) programs meet the desired
standards and deliver the expected outcomes. The following are some of the quality assurance mechanisms that
can be put in place for an B.Sc.(Cyber Security) program:
Curriculum design and review: The curriculum of an B.Sc.(Cyber Security) program should be designed
to meet the needs of the industry and reflect the latest developments and trends in the field. Regular
reviews shouldbe conducted to ensure that the curriculum remains relevant and up-to-date.
Faculty qualifications and training: Faculty members should have the necessary qualifications and
experience to teach the courses in the program. They should also receive regular training to enhance
their teaching skills and keep up with the latest developments in the field.
Student assessment: A variety of assessment methods should be used to evaluate student learning and
mastery of the course material. These assessments should be aligned with the program's learning
outcomes.
Student support: Adequate support should be provided to students, including academic advising,
mentoring, and counseling services. The program should also provide access to resources such as a
library, online databases, and study materials.
Continuous improvement: The program should have a process in place for continuous improvement,
which involves gathering feedback from students, alumni, and employers to identify areas of strength
and weakness and make necessary adjustments.
The expected program outcomes of an B.Sc.(Cyber Security) program may include the following:
Advanced knowledge and skills in IT: Graduates of an B.Sc.(Cyber Security) program should have
advanced knowledge and skills in areas such as software development, network administration, cyber
security, and data analytics.
Critical thinking and problem-solving skills: Graduates should be able to apply critical thinking and
problem-solving skills to analyze complex IT problems and develop effective solutions.
Effective communication skills: Graduates should be able to communicate effectively with both
technical and non-technical stakeholders, including colleagues, clients, and managers.
Leadership and teamwork skills: Graduates should be able to work effectively in teams and demonstrate
leadership skills in managing projects and teams.
Ethical and professional conduct: Graduates should be aware of ethical and professional standards in the
IT industry and demonstrate ethical and professional conduct in their work.
Overall, an B.Sc.(Cyber Security) program should aim to produce graduates who are well-prepared for careers in
the IT industry and can make significant contributions to the field. Quality assurance mechanisms can help ensure
that the program meets these goals and delivers the expected outcomes.
DETAILLED SYLLABUS
B.Sc. IN CYBER SECURITY SEMESTER-I SYLLABUS
Unit- I
Register transfer language, Bus and memory transfer, Arithmetic, micro operation, Logic
micro operation, Shift micro operation, Arithmetic logic shift unit
Unit- II
Instruction codes, Computer registers, Computer instructions, Timing and control, Instruction
cycle, Memory reference instruction, I/O and interrupt, Design of basic computer and
Accumulator logic.
Unit- III
Unit- IV
Unit- V
Peripheral devices, I/O interfaces, Asynchronous Data transfer DMA, Priority Interrupt, I/O
processor, Multiprocessor system organization and Data communication processor. Auxiliary
memory, Microcomputer, memory, Memory hierarchy, Associative memory, Virtual
memory, Cache memory, Memory management hardware.
References:
Unit 4: Throughput
Learning Objectives,Throughput, Propagation Speed, Waveforms, Bandwidth, Let us sum up, Check your Progress:
Possible Answers, Further Reading, Assignments, Activities
BSCS0104: Paper Name - Principles of Cyber Security
Unit 1:
Learning Objectives, Introduction, Cyber Attack, Types of Cyber Attack and Threats, Motivation, Let us sum up,
Check your Progress: Possible Answers, Assignments, Activities
Unit 2:
Learning Objectives, Introduction to Asset, Vulnerability and Threats, Risk Management, Let us sum up,
Assignments
UNIT-1
Introduction, Toolboxes: Python, fundamental libraries for data Scientists,Integrated
development environment (IDE). Data operations, Reading, selecting, filtering,
manipulating, sorting, grouping, rearranging, ranking, and plotting.
UNIT-2
Descriptive statistics, data preparation. Exploratory Data Analysis data summarization,data
distribution, measuring asymmetry. Sample and estimated mean, variance and standard
score. Statistical Inference frequency approach, variability of estimates,hypothesis testing
using confidence intervals, using p-values
UNIT-3
Supervised Learning: First step, learning curves, training-validation and test.
Learning models generalities, support vector machines, random forest.
Examples
UNIT-4
Regression analysis, Regression: linear regression simple linear regression,multiple &
Polynomial regression, Sparse model. Unsupervised learning,clustering, similarity and
distances, quality measures of clustering, case study.
UNIT-5
Network Analysis, Graphs, Social Networks, centrality, drawing centrality of Graphs,
PageRank, Ego-Networks, community Detection.
Block-1
Computational Complexity, GCD Computation, Finite Groups, Modular Arithmetic
Block-2
Key Exchange, Public Key Cryptosystem, Factorization
Block-3
Primality Testing, Elliptic Curve Cryptosystem, Hash Function Digital Signatures, Stream Ciphers
Block-4:
Crypto-graphical Algorithms, Public Key Infrastructure, Classical cryptography
B.Sc. IN CYBER SECURITY SEMESTER-III SYLLABUS
BSCS0302:Operating Systems
Unit-I
Introduction: Definition, Design Goals, Evolution; Concept of User, job and
Resources; Batch processing, Multi-programming, Time sharing; Structure and
Functions of Operating System. Process Management: Process states, State
Transitions, Process Control block, Context Switching, Process Scheduling,
Scheduling algorithm, Threads.
Unit-II
Unit-III
Unit- IV
File : File Attributes, File Types, File Access Methods, Directory Structure, File
System Organization and Mounting, Allocation Methods, Free Space management;
Secondary.
Unit-V
Storage Management: Disk Structure, Logical and Physical View, Disk Head
Scheduling, Formatting, Swap Management. Protection & Security. System Software:
Definition, their types, Loader, linker, editor, Assembler, Compiler, Interpreter.
References:
Unit-I
Introduction: Goal and application Network Hardware and Software , Protocol hierarchies,
Design Issue of the layers, Interfaces and services, Connection oriented and connection less
services, Service Primitives, Reference Models – The OSI Reference model, The TCP/IP
Reference Model ,Types of computer Network :LAN,MAN,WAN, Topologies, Transmission
mode .Physical Layer: Transmission Media ,Concept of data transmission ,Switching
Techniques ,Communication Satellites – Geosynchronous Satellite – VSAT, Low Orbit
Satellites, ISDN and ATM. Digital Modulation and Demodulation Techniques
Unit-II
Data Link Layer: Data Link Layer design issues, Framing, Flow control, Error Detection and
Correction DLL Protocol: Stop and Wait Protocol, Sliding window protocol, A Simplex
protocol for noisy channel, Medium access sublayer: Channel allocation –static and dynamic
,Multiple access protocol FDDI, Data Link Layer in the Internet – SLIP,PPP.
Unit-III
Network Layer: The Network Layer Design Issue, comparison of virtual circuits and
datagram subnets, connectionless internetworking, Tunnelling, Internetwork routing, Routing
algorithm , Fragmentation, The Network Layer in the Internet – The IP Protocol, IP Address,
subnets, Internet control protocols, internet multicasting.
Unit-IV
Transport Layer: The Transport layer services, The concept of client and server in terms of
socket addressing Quality, of service, Transport service primitives and buffering,
Multiplexing, Crash Recovery. The Internet Transport Protocols (TCP/IP) – The TCP Service
Model, The TCP protocol, The TCP segment header, TCP connection management, TCP
transmission policy, TCP congestion control, TCP timer management, UDP.
Unit-V
References:
UNIT-I:
Introduction, Security Concepts, Threats and Risks, Attacks – Passive andActive, Security
Services, Confidentiality, Authentication, Non-Repudiation,Integrity, Access Control,
Availability.
UNIT-II:
Access Control Models, Bell-LaPadula, Non- Interference and Role Base Model.
Cryptography, Secret Key and Public Key Cryptosystems, Symmetric Ciphers, Block Ciphers
and Stream Ciphers, DES,Triple DES, RSA.
UNIT-III:
Secure Hash and Key management, Digital Signature and Non-repudiation, cryptanalysis.
Network Security, Objectives and Architectures, Internet Security Protocols, IP encapsulating
Security Protocol, Network and Transport Layer Security
UNIT-IV:
UNIT-V:
E-mail Security, PGPs / MIME, IP Security, Access and System Security ,Intruders, Intrusion
Detection and Prevention , Firewall a) Hardware Firewall b) Software Firewall c) Application
Firewall d) Packet Filtering. e). Packet Analysis , Proxy Servers, Firewall setting in Proxy,
ACL in Proxy
References :
1. Network Security Essentials ,William Stallings, Prentice-Hall.
2. Fundamentals of Computer Security Technology, Edward Amoroso, Prentice-Hall.
3. Cryptography and Data Security ,Dorothy E. Denning, Addison-Wesley.
4. Computers under Attack ,Peter J. Denning, Addison-Wesley.
5. Cryptography: Theory and Practice ,Douglas R. Stinson, CRC Press.
B.Sc. IN CYBER SECURITY SEMESTER-IV SYLLABUS
Unit-I
Unit-II
Searching for solutions, uniformed search strategies – Breadth first search, depth first search,
Depth limited search, Iterative-deepening depth first search bi-direction search - comparison.
Search with partial information (Heuristic search) Greedy best first search, A* search,
Memory bounded heuristic search, Heuristic functions. Local search Algorithms: Hill
climbing, simulated, annealing search, local beam search, genetical algorithms. Constrain
satisfaction problems: Backtracking search for CSPs local search for constraint satisfaction
problems.
Unit-III
Unit-IV
Unit-V
Learning :Forms of learning, Induction learning, Learning Decision Tree, Statistical learning
methods, learning with complex data, learning with Hidden variables – The EM Algorithm,
Instance Based learning, Neural Networks.
Refrences :
1. Introduction to Artificial Intelligence – Rajendra Akerkar, PHI.
2. Artificial Intelligence – A Modern Approach. Second Edition, Stuart Russel, Peter
Norvig, PHI/Pearson Education.
3. Artificial Intelligence, 3rd Edition, Patrick Henry Winston., Pearson Edition,
4. Artificial Intelligence and Expert Systems – Patterson PHI
5. Expert Systems: Principles and Programming- Fourth Edn, Giarrantana/ Riley,
Thomson
B.Sc. IN CYBER SECURITY SEMESTER-V SYLLABUS
Unit-II
Software Quality Assurance(SQA): Quality and factors, Quality Assurance, Software Quality
Metrics, Process and Product Quality, Capability Maturity Model (CMM). Software Quality
Assurance(SQA), Need for SQA, SQA Activities, Building blocks of SQA, SQA Planning &
Standards, Software Reliability, Reliability Measures. Introduction to Software Testing: Need
of software(s/w) testing, Error, fault and failure. s/w Testing fundamentals, Testing
objectives, test information flows, Testing lifecycle, Test Cases.
Unit-IV
Levels of Testing: Unit Testing, Integration Testing, System Testing, Acceptance Testing,
Alpha testing & Beta testing, Static vs. Dynamic testing, Manual vs. Automatic testing,
Different types of Testing: Installation Testing, Usability testing, Regression testing,
Performance testing, Load testing, stress testing, Security testing, Static & Dynamic testing,
Static testing techniques, Review types : Informal Review, Technical or peer review,
Walkthrough, Inspection, static analysis, Review meeting and reporting , Review guidelines
& Review checklist, Data flow analysis, Control flow analysis, Cyclometric Analysis,
Dynamic testing – need & Advantages
Unit-V
Black Box & White Box Testing (Test Case Design Techniques):Functional Testing (Black
Box), Equivalence partitioning, BVA, Decision table based testing, Cause-Effect graphing,
Syntax testing (Concept & Test case generation only), Structural Testing (White Box),
Coverage testing, Statement coverage, Branch & decision coverage, Path coverage,
Validation testing Activities, Low level testing, High level testing, Black box Vs. White Box
References:
BSCS0504:Cloud Computing
UNIT –II
Curves and Surfaces:Line Drawing Algorithm, DDA Algorithm, Bresenham‟s Line Drawing
Algorithm, Bresenham‟s Circle Drawing Algorithm, Ellipse Drawing Algorithm, Pixel
Addressing and object geometry: Screen Grid coordinates, Maintaning Goemetry properties
of Displayed objects.
UNIT –III
UNIT-IV
Curves and Visible Surface Detection Methods: Bezier Curves, 4 point and 5 point Bezier
curves using Bernstein Polynomials, B-Spline Curves, Computing control points given end
slopes for a specified curve segment. Back Face Detection, Depth Buffer (Z-Buffer, A-
Buffer) Method, Scan Line Method, Depth Sorting Method, Area Subdivision Method.
UNIT –V
Illumination Model and Surface Rendering: Basic Illumination models, shading models for
curve surfaces, Half tone Pattern and Dithering Techniques, Rendering, Color Models: XYZ
Color Model, RGB, YIQ, CMY, HSV, HLS.
References: