Syllabus B Tech Eighth Semester Cyber Security And IOT EC8004

Syllabus Eighth Semester

Syllabus Seventh Semester Cyber Security And IOT EC8004

The concepts developed in this course will aid in quantification of several concepts in chemistry that have been introduced at the 10+2 levels in schools. Technology is being increasingly based on the electronic, atomic and molecular level modifications, Syllabus Sixth Semester Cyber Security And IOT EC8004 is given here.

Quantum theory is more than 100 years old and to understand phenomena at nanometer levels, one has to base the description of all chemical processes at molecular levels. The course will enable the student to:

  • Analyse microscopic chemistry in terms of atomic and molecular orbitals and intermolecular forces.
  • Rationalise bulk properties and processes using thermodynamic considerations.
  • Distinguish the ranges of the electromagnetic spectrum used for exciting different molecular energy levels in various spectroscopic techniques
  • Rationalise periodic properties such as ionization potential, electronegativity, oxidation states and electronegativity.
  • List major chemical reactions that are used in the synthesis of molecules.

EC 8004 – Cyber Security And IOT

Unit 1
Introduction, Classifications of Cybercrimes: E-Mail Spoofing, Spamming, Cyber defamation, Industrial Spying/Industrial Espionage, Hacking, Software Piracy, Password Sniffing, Credit Card Frauds, Cyberstalking, Botnets, Phishing, Pharming, Man-in-theMiddle attack, Password Cracking, Keyloggers and Spywares, Virus and Worms, Trojan Horses and Backdoors, DoS and DDoS Attacks, SQL Injection, Buffer Overflow, Malware, Ransomware, Types of Identity Theft, Techniques of ID Theft, Cyber terrorism, Browser Attacks, Reverse Engineering, Cross site scripting
Unit 2
Introduction to Cyber Security, Cyber Security Goals, Cyber Security policy, Domain of Cyber Security Policy, Elements, Cyber Security Evolution, Implementing Hardware Based Security, Software Based Firewalls, Security Standards, Assessing Threat Levels, Forming an Incident Response Team, Reporting Cybercrime, Difference between cyber forensics and cyber security.
Unit 3
The Internet of Things: An Overview, The “Internet” of “Things”, The Technology of the Internet of Things, Importance of Internet of Things, Understanding Smart Devices, Design Principles for Connected Device, Network Connections, Traditional Network, Transferring Data Over a Network, Understanding IP Address, Wireless Technologies, Wi-Fi, Bluetooth, Cellular Networks, Mesh Networks
Unit 4

Internet Principles, Internet Communications, IP, TCP, The IP Protocol Suite (TCP/IP), UDP, IP addresses, DNS, Static IP address Assignment, Dynamic IP Address Assignment, IPv6, MAC Address, TCP and UDP Ports, HTTP Ports other Common Ports, Application Layer Protocols.

Unit 5

Prototyping: Sketching, Familiarity, Cost versus Ease of Prototyping, Prototypes and Production, Embedded Platform, Physical Prototypes and Mass Personalization, Introduction to Cloud, Climbing into the Cloud, Open Source, Closed Source, Mixing Open and Closed Source.

Books Recommended

1. Nina Godbole and Sunit Belpure , Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives, Wiley
2. Jennifer L. Bayuk, J. Healey, P. Rohmeyer, Marcus Sachs, Jeffrey Schmidt, Joseph Weiss Cyber Security Policy Guidebook, John Wiley & Sons 2012.
3. McEwen Adrian and Cassimally Hakim, “Designing the Internet of Things” Wiley India Pvt. Ltd., 2016.
4. Miller Michael, “The Internet of Things”, Pearson India Education Services Pvt. Ltd., 2015.