Unit I
Fundamentals of Cybersecurity – Introduction to Cybersecurity: CIA triad – attacks – cybersecurity fundamentals such as Principle of Least Privilege, Security Principles and Models, Introduction to cryptographic algorithms, types.
Course Name | Foundations of Cyber Security |
Course Code | 23CSE313 |
Program | B. Tech. in Computer Science and Engineering (CSE) |
Semester | 6 |
Credits | 3 |
Campus | Amritapuri ,Coimbatore,Bengaluru, Amaravati, Chennai |
Fundamentals of Cybersecurity – Introduction to Cybersecurity: CIA triad – attacks – cybersecurity fundamentals such as Principle of Least Privilege, Security Principles and Models, Introduction to cryptographic algorithms, types.
Practical Security Concepts with stress on Technologies used in Cybersecurity – Software Development and Application Security: OWASP Top 10 and CWE – Input Validation, Authentication – Authorization – Browser Security Principles – Same origin policy (SOP) – Database security principles – File Security principles – Directory traversal.
Network Security: Network Threat Landscape, Types of Network Attacks and Sources. Security Standards; Regulatory Requirements; Security Assessment; Digital Forensics; Incident Response, Disaster Recovery and Business Continuity Management; Security Governance, Risk and Compliance; Identity and Access Management (IAM).
Course Objectives
Course Outcomes
CO1: Understand the key concepts and principles of cybersecurity, including the CIA triad, attacks, and security fundamentals such as principle of least privilege and security models.
CO2: Develop practical skills in software development and application security, including input validation, authentication and authorization, browser, database, and file security principles.
CO3: Identify network security threats and apply appropriate security measures, incident response, disaster recovery, and business continuity plan to mitigate the impact of security breaches and ensure continuity of operations.
CO4: Understand the principles of security governance, risk and compliance (GRC), and identity and access management (IAM) to protect against unauthorized access to information systems.
CO-PO Mapping
PO/PSO | PO1 | PO2 | PO3 | PO4 | PO5 | PO6 | PO7 | PO8 | PO9 | PO10 | PO11 | PO12 | PSO1 | PSO2 |
CO | ||||||||||||||
CO1 | 3 | 3 | 2 | 2 | 2 | 2 | ||||||||
CO2 | 3 | 3 | 3 | 3 | 2 | 3 | 3 | |||||||
CO3 | 3 | 3 | 3 | 2 | 2 | 3 | 3 | |||||||
CO4 | 3 | 3 | 2 | 2 | 3 | 3 |
Evaluation Pattern: 70:30
Assessment | Internal | End Semester |
Midterm | 20 | |
*Continuous Assessment Theory (CAT) | 10 | |
*Continuous Assessment Lab (CAL) | 40 | |
**End Semester | 30 (50 Marks; 2 hours exam) |
*CAT – Can be Quizzes, Assignment, and Reports
*CAL – Can be Lab Assessments, Projects, and Reports
**End Semester can be theory examination/ lab-based examination
Textbook(s)
William Stallings and Lawrie Brown. “Computer Security: Principles and Practice”. Fourth Edition, Pearson, 2019
William Stallings. “Network Security Essentials: Applications and Standards”. Pearson, 2017.
Bryan Sullivan and Vincent Liu. “Web Application Security: A Beginner’s Guide”. McGraw-Hill Education, 2011.
Reference(s)
John Sammons, “The Basics of Digital Forensics”, Elsevier Science, 2011.
Ross J. Anderson. “Security Engineering: A Guide to Building Dependable Distributed Systems”. Wiley, 2008.
Raef Meeuwisse. “Cybersecurity: The Beginner’s Guide”. John Wiley & Sons, Inc., 2017
P.W. Singer and Allan Friedman. “Cybersecurity and Cyberwar: What Everyone Needs to Know”. Oxford University Press, 2014.
DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.