414453: Information and Cyber Security
CREDITS - 03
Unit I SECURITY BASICS 7 Hrs
Information Security Concepts, Security Threats and Vulnerabilities, Security Architectures and Operational Models, Types of Security attacks, Goals of Security, Malicious code, Intrusion detection system (IDS): Need, Types, Limitations and Challenges, security and privacy.
Unit II SYMMETRIC AND ASYMMETRIC KEY CRYPTOGRAPHY 7Hrs
Introduction, Classical Encryption Techniques, Block Ciphers and Data Encryption standards, Advanced Encryption standard, Public Key Cryptography and RSA, Chinese Remainder Theorem, Diffie-Hellman, Elgamal Curve Arithmetic, Elliptic Curve Arithmetic, Elliptic Curve Cryptography.
Unit III DATA INTEGRITY ALGORITHMS AND SECURITY REQUIREMENTS 7 Hrs
Cryptographic Hash Functions, requirements and security, SHA-1, SHA-3, Digital Signatures, X.509 Certificate, Kerberos, IP Security: Architecture Protocols IPv4, IPv6, AH, EPS, ISAKMP, Web Security: SSL, HTTPS, Mail Security: PGP, S/MIME
Unit IV LEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION SECURITY, RISK MANAGEMENT 7 Hrs
Overview, Risk identification, Risk Assessment, Risk Control Strategies, Quantitative vs. Qualitative Risk Control Practices. Risk Management. Laws and Ethics in Information Security, Codes of Ethics, Protecting programs and data.
Unit V INTRODUCTION TO CYBER LAWS 7 Hrs
Introduction, Definition and origin, Cybercrime and Information security, Classification of Cybercrimes, The legal perspectives- Indian perspective, Global perspective, Categories of Cybercrime, Types of Attacks, a Social Engineering, Cyber stalking, Cloud Computing and Cybercrime.
Unit VI TOOLS AND METHODS USED IN CYBERCRIME 7 Hrs
Introduction, Proxy servers and Anonymizers, Phishing, Password Cracking, Key-loggers and Spywares, Types of Virus, Worms, Dos and DDoS, SQL injection, Cybercrime and Legal perspectives, Cyber laws- Indian context, The Indian IT Act-Challenges, Amendments, Challenges to Indian Law and cybercrime Scenario in India, Indian IT Act and Digital Signatures. study of any two network security scanners: Nmap, Metasploit, OpenVAS, Aircrack, Snort, Wireshark, Nikito,
Samurai, Safe 3 etc.
Text Books
1. William Stallings, Computer Security : Principles and Practices, Pearson 6th Ed, ISBN: 978-0-13-335469-0
2. Nina Godbole, Sunit Belapure , Cyber Security- Understanding Cyber Crimes, Computer Forensics and Legal Perspectives, Wiely India Pvt.Ltd, ISBN- 978-81-265-2179-1
3. Bernard Menezes, Network Security and Cryptography, Cengage Learning , ISBN-978-81-315-1349-1
4. Dr. V.K. Pachghare, Cryptography and Information security, PHI, Second edition, ISBN- 978- 81-203-5082-3
Reference Books
1. Bruice Schneier , Applied Cryptography- Protocols, Algorithms and Source code in C, Algorithms, Wiely India Pvt Ltd, 2nd Edition, ISBN 978-81-265-1368-0.
2. Nina Godbole , Information Systems Security , Wiley India Pvt. Ltd, ISBN -978-81-265-1692-6
3. CK Shyamala et el., Cryptography and Security, Wiley India Pvt. Ltd, ISBN-978-81-265-2285-9.
4. Berouz Forouzan, Cryptography and Network Security, TMH, 2 edition, ISBN -978-00-707-0208-0.
5. Mark Merkow, Information Security-Principles and Practices, Pearson Ed., ISBN- 978-81-317-1288-7.