Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Subject Name: Computer System Security (KNC301)

Electronics and Communication


Department Name
Engineering
Subject Name Computer System Security (KNC301)
Subject Code/NBA Code KNC301
Session 2020-21
Semester 3RD
Year 2ND
Faculty Name Dr.Abhimanyu Kumar Yadav

Course Objective
1 Student will able to understand about the computer security and about control Hijacking or its
types.
2 Student will able to discuss about the confidentiality policies of the information and How to
prevent the information from intrusions.
3 Student will able to discuss about the web securities methods to transfer the data or
information from one end to another end.
4 Student will able to understand discuss cryptography and its methods for transferring the data
in a secure manner.
5 Student will able to explanation of infrastructure of internet with the help of TCP/IP ,
Firewall etc.

Course Outcomes

Bloom’s
CO’s Statement Knowledge
Level (KL)
To discover software bugs that pose cyber security threats and to explain
KNC301.1 K2
how to fix the bugs to mitigate such threats.
To discover cyber-attack scenarios to web browsers and web servers and
KNC301.2 K2
to explain how to mitigate such threats.
To discover and explain mobile software bugs posing cyber security
KNC301.3 threats, explain and recreate exploits, and to explain mitigation K2
techniques.
To articulate the urgent need for cyber security in critical computer
KNC301.4 systems, networks, and world wide web, and to explain various threat K2
scenarios.
To articulate the well-known cyber-attack incidents, explain the attack
KNC301.5 K2
scenarios, and explain mitigation techniques.
CO Mapping with PO & PSO

Course PO PO PO PO
PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
Outcomes 1 2 3 4

KNC301.1 1 - - - - 2 - 1 1 2 - 2 1 -

KNC301.2 1 - 1 - - 1 - 1 1 1 - 2 1 -

KNC301.3 1 - 1 - - 1 - 1 1 1 - 2 1 -

KNC301.4 2 - 1 - - 2 - 1 1 1 - 2 1 -

KNC301.5 2 - 1 - - 2 - 1 1 1 - 2 1 -
Average 1.4 - 0.8 - - 1.6 - 1 1 1.2 - 2 1 -

 3: Highly Correlated
 2: Moderately Correlated
 1: Weakly Correlated
 Blank : No Correlation

JUSTIFICATION FOR CO-PO-PSO CORRELATION

Mapping LOW/ JUSTIFICATION


MEDIUM/HIGH
KNC301.1-PO1 Able to understand about the systemsecurity and discussion about
L
control hijacking.
KNC301.1-PO6 Able to know about several methods to keep secure information and data
M
from several threats.
KNC301.1-PO8 Able to become responsible to prevent information from hijacking and
L
threats.
KNC301.1-PO9 Able to become responsible to prevent information from different
L
vulnerabilities.
KNC301.1-PO10 Able to communicate system security policies control hijacking and
M
security threats.
KNC301.1-PO12 M Able to prevent information from unauthorized users.

KNC301.1-PSO1 L Able to identify the problems related to the security.

KNC301.2-PO1 Able to understand about the Confidentiality Policies to keep secure


L
information and Intrusion Detection Systems.
KNC301.2-PO3 Able to define process Intrusion Detection Systems to keep secure
L
information and system.
KNC301.2-PO6 Able to know about several methods to keep secure information and data
L
from intrusions.
KNC301.2-PO8 L Able to become responsible to keep information with the help of rootkit.
KNC301.2-PO9 Able to become responsible to prevent information with the
L
unauthorized users.
KNC301.2-PO10 Able to communicate about Confinement principle and Software fault
L
isolation.
KNC301.2-PO12 M Able to learn methods to keep secure systems from intrusions.

KNC301.2-PSO1 L Become ability to isolate the system to prevent from unauthorized users.

Able to understand about the method of secure transition of message


KNC301.3-PO1 L from one end to another end with the help of Secure architecture
principles.
KNC301.3-PO3 L Able to define processWeb security with Security interface.

KNC301.3-PO6 Able to know about several methods to keep secure information and data
L
from Defenses and protections against XSS.
KNC301.3-PO8 Able to become responsible to secure information from Cross site
L
request forgery.
KNC301.3-PO9 L Able to become responsible to prevent information in web.

KNC301.3-PO10 L Able to communicate about Access Control and Web security goals.

KNC301.3-PO12 M Able to learn methodsto develop Secure web architecture.

KNC301.3-PSO1 L Able to understand access control of software system.

Able to understand about the methods of cryptography for secure


KNC301.4-PO1 M
communication.
KNC301.4-PO3 Able to define process of Real world protocolsfor secure
L
communication.
KNC301.4-PO6 Able to know about Basic terminologies of cryptography and IP
M
security.
KNC301.4-PO8 L Able to become responsiblewith DNS security for data transferring.

KNC301.4-PO9 L Able to become responsible to prevent information with IP security

KNC301.4-PO10 L Able to communicate about message cryptography and Digital signature

KNC301.4-PO12 M Able to learn the importance ofTransport Layer security.

KNC301.4-PSO1 Able to learn the process of Public key cryptography and Public key
L
distribution.
Able to understand about the Internet Infrastructure and weaknesses of
KNC301.5-PO1 M
internet security.
KNC301.5-PO3 L Able to define processPacket filtering firewall.

KNC301.5-PO6 M Able to know about Internet Infrastructure

KNC301.5-PO8 L Able to become responsible

KNC301.5-PO9 Able to become responsible to prevent information with internet


L
security.
KNC301.5-PO10 L Able to explain about Link layer connectivity and TCP IP connectivity

KNC301.5-PO12 M Able to express Intrusion detection method.

KNC301.5-PSO1 L Able to understand the Routing security and DNS revisited.

You might also like