{"id":53389,"date":"2023-04-08T06:01:10","date_gmt":"2023-04-08T06:01:10","guid":{"rendered":"https:\/\/www.inspirenignite.com\/anna-university\/ccs362-security-and-privacy-in-cloud-syllabus-for-cse-2021-regulation-professional-elective-iv\/"},"modified":"2023-04-08T06:01:10","modified_gmt":"2023-04-08T06:01:10","slug":"ccs362-security-and-privacy-in-cloud-syllabus-for-cse-2021-regulation-professional-elective-iv","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/anna-university\/ccs362-security-and-privacy-in-cloud-syllabus-for-cse-2021-regulation-professional-elective-iv\/","title":{"rendered":"CCS362: Security and Privacy in Cloud syllabus for CSE 2021 regulation (Professional Elective-IV)"},"content":{"rendered":"<p align=\"justify\">Security and Privacy in Cloud detailed syllabus for Computer Science &amp; Engineering (CSE) for 2021 regulation curriculum has been taken from the <a class=\"rank-math-link\" href=\"https:\/\/cac.annauniv.edu\/\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Anna Universities<\/a> official website and presented for the CSE students. For course code, course name, number of credits for a course and other scheme related information,  do visit full semester subjects post given below. <\/p>\n<p align=\"justify\">For Computer Science &amp; Engineering 6th Sem scheme and its subjects, do visit <a class=\"rank-math-link\" href=\"..\/cse-6th-sem-syllabus-2021-regulation\">CSE 6th Sem 2021 regulation scheme<\/a>. For Professional Elective-IV scheme and its subjects refer to <a class=\"rank-math-link\" href=\"..\/professional-elective-iv-syllabus-for-cse-2021-regulation\">CSE Professional Elective-IV syllabus scheme<\/a>. The detailed syllabus of security and privacy in cloud is as follows. <\/p>\n<p>  <title>Security and Privacy in Cloud<\/title><\/p>\n<h4>Course Objectives:<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<h4>Unit I<\/h4>\n<p>  <strong>FUNDAMENTALS OF CLOUD SECURITY CONCEPTS 7<\/strong> Overview of cloud security- Security Services &#8211; Confidentiality, Integrity, Authentication, Nonrepudiation, Access Control &#8211; Basic of cryptography &#8211; Conventional and public-key cryptography, hash functions, authentication, and digital signatures.<\/p>\n<h4>Unit II<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<h4>Unit III<\/h4>\n<p>  <strong>ACCESS CONTROL AND IDENTITY MANAGEMENT 6<\/strong> Access control requirements for Cloud infrastructure &#8211; User Identification &#8211; Authentication and Authorization &#8211; Roles-based Access Control &#8211; Multi-factor authentication &#8211; Single Sign-on, Identity Federation &#8211; Identity providers and service consumers &#8211; Storage and network access control options &#8211; OS Hardening and minimization &#8211; Verified and measured boot &#8211; Intruder Detection and prevention<\/p>\n<h4>Unit IV<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<h4>Unit V<\/h4>\n<p>  <strong>MONITORING, AUDITING AND MANAGEMENT 5<\/strong> Proactive activity monitoring &#8211; Incident Response, Monitoring for unauthorized access, malicious traffic, abuse of system privileges &#8211; Events and alerts &#8211; Auditing &#8211; Record generation, Reporting and Management, Tamper-proofing audit logs, Quality of Services, Secure Management, User management, Identity management, Security Information and Event Management<\/p>\n<h4>Practical Exercises:<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<h4>Course Outcomes:<\/h4>\n<ol>\n<li>Understand the cloud concepts and fundamentals.<\/li>\n<li>Explain the security challenges in the cloud.<\/li>\n<li>Define cloud policy and Identity and Access Management.<\/li>\n<li>Understand various risks and audit and monitoring mechanisms in the cloud.<\/li>\n<li>Define the various architectural and design considerations for security in the cloud.<\/li>\n<\/ol>\n<h4>Text Books:<\/h4>\n<ol>\n<li>Raj Kumar Buyya , James Broberg, andrzejGoscinski, Cloud Computing:!!, Wiley 2013<\/li>\n<li>Dave shackleford, Virtualization Security!, SYBEX a wiley Brand 2013.<\/li>\n<li>Mather, Kumaraswamy and Latif, Cloud Security and Privacy!, OREILLY 2011<\/li>\n<\/ol>\n<h4>Reference Books:<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<p align=\"justify\">For detailed syllabus of all the other subjects of Computer Science &amp; Engineering 6th Sem, visit <a class=\"rank-math-link\" href=\"..\/category\/cse+6th-sem\">CSE 6th Sem subject syllabuses for 2021 regulation<\/a>. <\/p>\n<p align=\"justify\">For all Computer Science &amp; Engineering results, visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/anna-university\/anna-university-results\/\">Anna University CSE all semester results<\/a> direct link. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security and Privacy in Cloud detailed syllabus for Computer Science &amp; Engineering (CSE) for 2021 regulation curriculum has been taken from the Anna Universities official website and presented for the [&hellip;]<\/p>\n","protected":false},"author":2297,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[69],"tags":[],"class_list":["post-53389","post","type-post","status-publish","format-standard","hentry","category-cse"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/53389","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/users\/2297"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/comments?post=53389"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/53389\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/media?parent=53389"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/categories?post=53389"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/tags?post=53389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}