Other university all, Computer Engineering Semester 8, Information and Cyber Security Syllabus

Information and Cyber Security Lecture notes | Videos | Free pdf Download | Previous years solved question papers | MCQs | Question Banks| Syllabus
Get access to 100s of MCQs, Question banks, notes and videos as per your syllabus.
Try Now for free

410251: Information and Cyber Security

Credit 03

Unit I Security Basics 08 Hours
Introduction, Elements of Information Security, Security Policy, Techniques, Steps, Categories, Operational Model of Network Security, Basic Terminologies in Network Security. Threats and Vulnerability, Difference between Security and Privacy.

Unit II Data Encryption Techniques And Standards 08 Hours
Introduction, Encryption Methods: Symmetric, Asymmetric, Cryptography, Substitution Ciphers. Transposition Ciphers, Stenography applications and limitations, Block Ciphers and methods of operations, Feistal Cipher, Data Encryption Standard (DES), Triple DES, DES Design Criteria, Weak Keys in DES Algorithms, Advance Encryption Standard (AES).

Unit III Public Key And Management 08 Hours
Public Key Cryptography, RSA Algorithm: Working, Key length, Security, Key Distribution, Deffie-Hellman Key Exchange, Elliptic Curve: Arithmetic, Cryptography, Security, Authentication methods, Message Digest, Kerberos, X.509 Authentication service. Digital Signatures: Implementation, Algorithms, Standards (DSS), Authentication Protocol.

Unit IV Security Requirements 08 Hours

IP Security: Introduction, Architecture, IPV6, IPv4, IPSec protocols, and Operations, AH Protocol, ESP Protocol, ISAKMP Protocol, Oakkey determination Protocol, VPN. WEB Security: Introduction, Secure Socket Layer (SSL), SSL Session and Connection, SSL Record Protocol, Change Cipher Spec Protocol, Alert Protocol, Handshake Protocol. Electronic Mail Security: Introduction, Pretty Good Privacy, MIME, S/MIME, Comparison. Secure Electronic Transaction (SET).

Unit V Firewall And Intrusion 08 Hours
Introduction, Computer Intrusions. Firewall Introduction, Characteristics and types, Benefits and limitations. Firewall architecture, Trusted Systems, Access Control. Intrusion detection, IDS: Need, Methods, Types of IDS, Password Management, Limitations and Challenges.

Unit VI Confidentiality And Cyber Forensic 08 Hours
Introduction to Personally Identifiable Information (PII), Cyber Stalking, PII impact levels with examples Cyber Stalking, Cybercrime, PII Confidentiality Safeguards, Information Protection Law: Indian Perspective.

Books:
Text:

1. Bernard Menezes, “Network Security and Cryptography”, Cengage Learning India, 2014, ISBN No.: 8131513491
2. Nina Godbole, Sunit Belapure, “Cyber Security”, Wiley India, 2014, ISBN No.: 978-81- 345-2179-1

References:
1. Eoghan Casey, “Digital Evidence and Computer Crime Forensic Science, Computers and the Internet”, ELSEVIER, 2011, ISBN 978-0-12-374268-1
2. Atul Kahate, “Cryptography and Network Security”, Mc Graw Hill Publication, 2nd Edition, 2008, ISBN : 978-0-07-064823-4
3. William Stallings, “Cryptography and network security principles and practices”, Pearson, 6th Edition, ISBN : 978-93-325-1877-3
4. Forouzan, “Cryptography and Network Security (SIE)”, Mc Graw Hill, ISBN, 007070208X, 9780070702080
5. Dr. Nilakshi Jain-Digital Forensic: The Fascinating World of Digital Evidences-Wiley India-ISBN: 9788126565740

Share  
Link Copied
More than 1 Million students use Goseeko! Join them to feel the power of smart learning.
Spot anything incorrect? Contact us