INFORMATION SECURITY SYLLABUS (2)
INFORMATION SECURITY SYLLABUS (2)
INFORMATION SECURITY
150513
COURSE OBJECTIVES
To provide conceptual understanding of Information security principles, issues,
challenges
(A Govt.and mechanisms.
Aided UGC Autonomous & NAAC Accredited Institute Affiliated to RGPV, Bhopal)
To understand how to apply encryption techniques to secure data in transit across
data networks.
Unit-I
Security: Principles and Attacks, Basic Number Theory, Fundamentals of Cryptography,
Steganography, Cryptanalysis, Code Breaking, Block Ciphers and Steam Ciphers,
Substitution Ciphers, Transposition Ciphers, Caesar Cipher, Play-Fair Cipher, Hill Cipher
Unit-II
Cryptography: Symmetric Key Cryptography, Public Key Cryptography, Principles of
Public Key Cryptosystem, Classical Cryptographic Algorithms: RC4, RSA, Distribution of
Public Keys and Key Management, Diffie-Hellman Key Exchange.
Unit-III
Hash Functions: Hash Functions, One Way Hash Function, SHA (Secure Hash Algorithm).
Authentication: Requirements, Functions, Kerberos, Message Authentication Codes, Digital
Signatures, Digital Certificates.
Unit -IV
IP & Web Security Overview: SSL (Secure Socket Layer), TLS (Transport Layer Security),
SET (Secure Electronic Transaction). IDS (Intrusion detection system), Firewalls: Types,
Functionality and Polices.
Unit -V
Phishing: Attacks and its Types, Buffer Overflow Attack, Session Hijacking, Hacker:
Hacking and Types of Hackers, Foot Printing, Scanning: Types: Port, Network,
Vulnerability), Sniffing in Shared and Switched Networks, Sniffing Detection & Prevention,
Spoofing.
RECOMMENDED BOOKS
Cryptography and Network Security, William Stallings, Pearson Education.
Cryptography and Network Security, Atul Kahate, McGraw Hill Education.
Incident Response and Computer Forensics, Kevin Mandia, Chris Prosise, Tata
McGraw Hill.
--------------------------------------------------------------------------------------------------------------
--
COURSE OUTCOMES
After completion of the course students would be able to:
CO1. explain attacks, hash algorithms and authentication mechanisms.
CO2. illustrate fundamentals of number theory and security principles.
CO3. Apply various algorithms to achieve principles of network security.
CO4. analyse the cause for various existing network attacks and describe the working of
available security controls.
CO5. examine the vulnerabilities in IT infrastructure.
CO6. predict the attacks and controls associated with IP, transport-level, web and e-mail
security.