MTech Cloud Security syllabus for 3 Sem 2020 scheme 20SCE331

Module-1 Cloud Computing Architectural Framework 0 hours

Cloud Computing Architectural Framework:

Cloud Benefits, Business scenarios, Cloud Computing Evolution, cloud vocabulary, Essential Characteristics of Cloud Computing, Cloud deployment models, Cloud Service Models, Multi- Tenancy, Approaches to create a barrier between the Tenants, cloud computing vendors, Cloud Computing threats, Cloud Reference Model, The Cloud Cube Model, Security for Cloud Computing, How Security Gets Integrated.

Module-2 Compliance and Audit 0 hours

Compliance and Audit:

Cloud customer responsibilities, Compliance and Audit Security Recommendations. Portability and Interoperability: Changing providers reasons, Changing providers expectations, Recommendations all cloud solutions, IaaS Cloud Solutions, PaaS Cloud Solutions, SaaS Cloud Solutions.

A d v e r t i s e m e n t
Module-3 Traditional Security 0 hours

Traditional Security, Business Continuity, Disaster Recovery, Risk of insider abuse, Security baseline, Customers actions, Contract, Documentation, Recovery Time Objectives (RTOs), Customers responsibility, Vendor Security Process (VSP).

Module-4 Data Centre Operations 0 hours

Data Centre Operations:

Data Centre Operations, Security challenge, Implement Five Principal Characteristics of Cloud Computing, Data centre Security Recommendations. Encryption and Key Management: Encryption for Confidentiality and Integrity, Encrypting data at rest, Key Management Lifecycle, Cloud Encryption Standards, Recommendations.

Module-5 Identity and Access Management 0 hours

Identity and Access Management:

Identity and Access Management in the cloud, Identity and Access Management functions, Identity and Access Management (IAM) Model, Identity Federation, Identity Provisioning Recommendations, Authentication for SaaS and Paas customers, Authentication for IaaS customers, Introducing Identity Services, Enterprise Architecture with IDaaS , IDaaS Security Recommendations. Virtualization: Hardware Virtualization, Software Virtualization, Memory Virtualization, Storage Virtualization, Data Virtualization, Network Virtualization, Virtualization Security Recommendations.

 

Course outcomes:

At the end of the course the student will be able to:

  • Demonstrate the growth of Cloud computing, architecture and different modules of implementation.
  • Evaluate the different types of cloud solutions among IaaS, PaaS, SaaS.
  • Access the security implementation flow, actions and responsibilities of stake holders.
  • Generalize the Data Centre operations, encryption methods and deployment details.
  • Provide recommendations for using and managing the customer's identity and choose the type of virtualization to be used.

 

Question paper pattern:

The SEE question paper will be set for 100 marks and the marks scored will be proportionately reduced to 60.

  • The question paper will have ten full questions carrying equal marks.
  • Each full question is for 20 marks.
  • There will be two full questions (with a maximum of four sub questions) from each module.
  • Each full question will have sub question covering all the topics under a module.
  • The students will have to answer five full questions, selecting one full question from each module.

 

Textbook/ Textbooks

1 Cloud Security and Privacy, An Enterprise Perspective on Risks and Compliance Tim Mather, SubraKumaraswamy , ShahedLatif Oreilly Media 2009

 

Reference Books

1 Securing the Cloud, Cloud Computer Security Techniques and Tactics Vic (J.R.) Winkler Syngress 2011