{"id":50836,"date":"2023-03-22T07:16:29","date_gmt":"2023-03-22T07:16:29","guid":{"rendered":"https:\/\/www.inspirenignite.com\/anna-university\/cb3402-operating-systems-and-security-syllabus-for-cyber-security-2021-regulation\/"},"modified":"2023-03-22T07:16:29","modified_gmt":"2023-03-22T07:16:29","slug":"cb3402-operating-systems-and-security-syllabus-for-cyber-security-2021-regulation","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/anna-university\/cb3402-operating-systems-and-security-syllabus-for-cyber-security-2021-regulation\/","title":{"rendered":"CB3402: Operating Systems and Security syllabus for Cyber Security 2021 regulation"},"content":{"rendered":"<p align=\"justify\">Operating Systems and Security detailed syllabus for Cyber Security (Cyber Security) for 2021 regulation curriculum has been taken from the <a class=\"rank-math-link\" href=\"https:\/\/cac.annauniv.edu\/\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Anna University<\/a> official website and presented for the Cyber Security students. For course code, course name, number of credits for a course and other scheme related information,  do visit full semester subjects post given below. <\/p>\n<p align=\"justify\">For Cyber Security 4th Sem scheme and its subjects, do visit <a class=\"rank-math-link\" href=\"..\/cyber-security-4th-sem-syllabus-2021-regulation\">Cyber Security 4th Sem 2021 regulation scheme<\/a>. The detailed syllabus of operating systems and security is as follows. <\/p>\n<p>  <title>Operating Systems and Security<\/title><\/p>\n<h4>Course Objectives:<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<h4>Unit I<\/h4>\n<p>  <strong>OPERATING SYSTEM OVERVIEW 9<\/strong> Computer-System Organization &#8211; Architecture &#8211; Operating-System Operations &#8211; Resource Management &#8211; Security and Protection &#8211; Distributed Systems &#8211; Kernel Data Structures &#8211; OperatingSystem Services &#8211; System Calls &#8211; System Services &#8211; Why Applications Are Operating-System Specific &#8211; Operating-System Design and Implementation &#8211; Operating-System Structure &#8211; Building and Booting an Operating System .<\/p>\n<h4>Unit II<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<h4>Unit III<\/h4>\n<p>  <strong>MEMORY MANAGEMENT AND FILE SYSTEMS 9<\/strong> Main Memory &#8211; Background, Swapping, Contiguous Memory Allocation, Paging, Segmentation -Virtual Memory &#8211; Demand Paging, Page Replacement, Allocation, Thrashing; Allocating Kernel Memory. Mass Storage system &#8211; HDD Scheduling &#8211; File concept, Access methods, Directory Structure, Sharing and Protection; File System Structure, Directory implementation, Allocation Methods, Free Space Management<\/p>\n<h4>Unit IV<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<h4>Unit V<\/h4>\n<p>  <strong>SECURITY IN OPERATING SYSTEMS 9<\/strong> UNIX Security &#8211; UNIX Protection System &#8211; UNIX Authorization &#8211; UNIX Security Analysis &#8211; UNIX Vulnerabilities &#8211; Windows Security &#8211; Windows Protection System &#8211; Windows Authorization -Windows Security Analysis &#8211; Windows Vulnerabilities &#8211; Address Space Layout Randomizations -Retrofitting Security into a Commercial Operating System &#8211; Introduction to Security Kernels<\/p>\n<h4>Practical Exercises:<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<h4>Course Outcomes:<\/h4>\n<p>  At the end of this course, the students will be able:<\/p>\n<ol>\n<li>To gain understanding on the concepts of Operating Systems.<\/li>\n<li>To acquire knowledge on process management concepts including scheduling, synchronization, threads and deadlock.<\/li>\n<li>To have understanding on memory, file and I\/O management activities of OS.<\/li>\n<li>To understand security issues in operating systems and appreciate the need for security models<\/li>\n<li>To gain exposure to the operating systems security models of WINDOWS and UNIX OS.<\/li>\n<li>Abraham Silberschatz, Peter Baer Galvin and Greg Gagne, Operating System Concepts, John Wiley &amp; Sons, Inc., 10th Edition, 2021.<\/li>\n<li>Trent Jaeger, Operating System Security, Morgan &amp; Claypool Publishers series, 2008.<\/li>\n<\/ol>\n<h4>Reference Books:<\/h4>\n<ol>\n<li>Morrie Gasser, Building A Secure Computer System, Van Nostrand Reinhold, New York, 1988.<\/li>\n<li>Charles Pfleeger, Shari Pfleeger, Jonathan Margulies, &#8220;Security in Computing&#8221;, Fifth Edition, Prentice Hall, New Delhi, 2015.<\/li>\n<li>William Stallings, Operating Systems &#8211; Internals and Design Principles, 9th Edition, Pearson, 2017.<\/li>\n<li>Michael Palmer, Guide to Operating Systems Security, Course Technology &#8211; Cengage Learning, New Delhi, 2008.<\/li>\n<li>Introduction to Hardware, Security and Trust, book by Mohammad Tehranipoor, Cliff Wang, Springer, 2012.<\/li>\n<li>Gary McGraw, Software Security: Building Security In, Addison Wesley software security series, 2005.<\/li>\n<li>Gerardus Blokdyk, Security Focused Operating System A Complete Guide &#8211; 2020 Edition, 5STARCooks, ISBN: 9781867373353, 2020.<\/li>\n<\/ol>\n<p align=\"justify\">For detailed syllabus of all other subjects of Cyber Security, 2021 regulation curriculum do visit <a class=\"rank-math-link\" href=\"..\/category\/cyber-security+4th-sem\">Cyber Security 4th Sem subject syllabuses for 2021 regulation<\/a>. <\/p>\n<p align=\"justify\">For all Cyber Security results, visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/anna-university\/anna-university-results\/\">Anna University Cyber Security all semester results<\/a> direct link. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Operating Systems and Security detailed syllabus for Cyber Security (Cyber Security) for 2021 regulation curriculum has been taken from the Anna University official website and presented for the Cyber Security [&hellip;]<\/p>\n","protected":false},"author":2297,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[47,158],"tags":[],"class_list":["post-50836","post","type-post","status-publish","format-standard","hentry","category-4th-sem","category-cyber-security"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/50836","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/users\/2297"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/comments?post=50836"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/50836\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/media?parent=50836"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/categories?post=50836"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/tags?post=50836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}