{"id":5755,"date":"2020-02-08T07:46:14","date_gmt":"2020-02-08T07:46:14","guid":{"rendered":"https:\/\/www.inspirenignite.com\/up\/computer-system-security-ie-4th-sem-syllabus-for-aktu-b-tech-2019-20-scheme-select-subject-6\/"},"modified":"2020-02-08T07:46:14","modified_gmt":"2020-02-08T07:46:14","slug":"computer-system-security-ie-4th-sem-syllabus-for-aktu-b-tech-2019-20-scheme-select-subject-6","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/up\/computer-system-security-ie-4th-sem-syllabus-for-aktu-b-tech-2019-20-scheme-select-subject-6\/","title":{"rendered":"Computer System Security IE 4th Sem Syllabus for AKTU B.Tech 2019-20 Scheme (Select Subject-6)"},"content":{"rendered":"<p>Computer System Security detail syllabus for Instrumentation Engineering (IE), 2019-20 scheme is taken from <a href=\"https:\/\/aktu.ac.in\/syllabus.html\" rel=\"nofollow noopener\" target=\"_blank\">AKTU<\/a> official website and presented for AKTU students. The course code (KNC401), and for exam duration, Teaching Hr\/Week, Practical Hr\/Week, Total Marks, internal marks, theory marks, and credits do visit complete sem subjects post given below.<\/p>\n<p>For all the other ie 4th sem syllabus for b.tech 2019-20 scheme aktu you can visit <a href=\"..\/ie-4th-sem-syllabus-for-b-tech-2019-20-scheme-aktu\">IE 4th Sem syllabus for B.Tech 2019-20 Scheme AKTU Subjects<\/a>. For all the other Select Subject-6 subjects do refer to <a href=\"..\/select-subject-6-ie-4th-sem-syllabus-for-aktu-b-tech-2019-20-scheme\">Select Subject-6<\/a>. The detail syllabus for computer system security is as follows.<\/p>\n<p><h4>Unit I<\/h4>\n<p>Computer System Security Introduction: Introduction, What is computer security and what to l earn? , Sample Attacks, The Marketplace for vulnerabilities, Error 404 Hacking digital India part 1 chase. Hijacking &amp; Defense: Control Hijacking ,More Control Hijacking attacks integer overflow ,More Control Hijacking attacks format string vulnerabilities, Defense against Control Hijacking -Platform Defenses, Defense against Control Hijacking &#8211; Run-time Defenses, Advanced Control Hijacking attacks.\n<\/p>\n<p><h4>Unit II<\/h4>\n<p><b>For complete syllabus, results, class timetable and more kindly <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" rel=\"nofollow noopener\" target=\"_blank\">download iStudy<\/a>. It is a lightweight, easy to use, no images, no pdfs platform to make student&#8217;s life easier.<\/b><\/p>\n<p><h4>Unit III<\/h4>\n<p>Secure architecture principles isolation and leas: Access Control Concepts , Unix and windows access control summary ,Other issues in access control ,Introduction to browser isolation . Web security landscape : Web security definitions goals and threat models , HTTP content rendering .Browser isolation .Security interface , Cookies frames and frame busting, Major web server threats ,Cross site request forgery ,Cross site scripting ,Defenses and protections against XSS , Finding vulnerabilities ,Secure development.\n<\/p>\n<p><h4>Unit IV<\/h4>\n<p>Basic cryptography: Public key cryptography ,RSA public key crypto ,Digital signature Hash functions ,Public key distribution ,Real world protocols ,Basic terminologies ,Email security certificates ,Transport Layer security TLS ,IP security , DNS security.\n<\/p>\n<p><h4>Unit V<\/h4>\n<p><b>For complete syllabus, results, class timetable and more kindly <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" rel=\"nofollow noopener\" target=\"_blank\">download iStudy<\/a>. It is a lightweight, easy to use, no images, no pdfs platform to make student&#8217;s life easier.<\/b><\/p>\n<p><h4>Course Outcomes:<\/h4>\n<ul>\n<li>To discover software bugs that pose cyber security threats and to explain how to fix the bugs to mitigate such threatS.<\/li>\n<li>To discover cyber attack scenarios to web browsers and web servers and to explain how to mitigate such threatS.<\/li>\n<li>To discover and explain mobile software bugs posing cyber security threats, explain and recreate exploits, and to explain mitigation techniques.<\/li>\n<li>To articulate the urgent need for cyber security in critical computer systems, networks, and world wide web, and to explain various threat scenarios.<\/li>\n<li>To articulate the well known cyber attack incidents, explain the attack scenarios, and explain mitigation techniques.<\/li>\n<\/ul>\n<p><h4>Reference Books:<\/h4>\n<ol>\n<li>William Stallings, Network Security Essentials: Applications and Standards, Prentice Hall, 4th edition, 2010.<\/li>\n<li>Michael T. Goodrich and Roberto Tamassia, Introduction to Computer Security, Addison Wesley, 2011.<\/li>\n<li>William Stallings, Network Security Essentials: Applications and Standards, Prentice Hall, 4th edition, 2010.<\/li>\n<li>Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, Handbook of Applied Cryptography, CRC Press, 2001.<\/li>\n<p>Mapped With : https:\/\/ict.iitk.ac.in\/product\/computer-system-security\/\n<\/li>\n<\/ol>\n<p>For the detailed syllabus of all the other subjects of B.Tech Ie, 2019-20 regulation do visit <a href=\"..\/category\/ie+4th-sem\">Ie 4th Sem syllabus for 2019-20 Regulation<\/a>.<\/p>\n<p>Dont forget to <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" rel=\"nofollow noopener\" target=\"_blank\">download iStudy<\/a> for latest syllabus, results, class timetable and more.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Computer System Security detail syllabus for Instrumentation Engineering (IE), 2019-20 scheme is taken from AKTU official website and presented for AKTU students. The course code (KNC401), and for exam duration, [&hellip;]<\/p>\n","protected":false},"author":2300,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[58],"tags":[],"class_list":["post-5755","post","type-post","status-publish","format-standard","hentry","category-ie"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/up\/wp-json\/wp\/v2\/posts\/5755","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/up\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/up\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/up\/wp-json\/wp\/v2\/users\/2300"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/up\/wp-json\/wp\/v2\/comments?post=5755"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/up\/wp-json\/wp\/v2\/posts\/5755\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/up\/wp-json\/wp\/v2\/media?parent=5755"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/up\/wp-json\/wp\/v2\/categories?post=5755"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/up\/wp-json\/wp\/v2\/tags?post=5755"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}