PROGRAM B.Sc.(Hons.
) – Robotics and AI
UF1RAP01 Course Name: L T P C
Security of Computing System 3 0 0 3
Year and II Year/ III Semester Contact hours per week
Semester (3 Hrs)
Prerequisite Nil
course
Course Humanities Management Professional Professional Elective
category and Social courses Core
Sciences
√
Basic Science Engineering Open Elective Mandatory
Science
Course 1. To understand the basics of cryptography
Objective 2. Learn to find the vulnerabilities in programs
3. To overcome them, know the different kinds of security threats in
networks, databases and the different solutions available, and learn about
the models and standards for security
Course 1. To Illustrate the security models and standards
Outcome 2. To understand the basics of elementary cryptography
3. To discuss security and its authentication practices
4. To list down the various kinds of security in network systems
5. To study the security in databases
6. To summarize the details of security.
UNIT I ELEMENTARY CRYPTOGRAPHY 9 Hrs
Terminology and Background – Substitution Ciphers – Transpositions – Making Good
Encryption Algorithms- Data Encryption Standard- AES Encryption Algorithm – Public Key
Encryption – Cryptographic Hash Functions – Key Exchange – Digital Signatures –
Certificates
UNIT II PROGRAM SECURITY 9 Hrs
Secure programs – Non-malicious Program Errors – Viruses – Targeted Malicious code
– Controls Against Program Threat – Control of Access to General Objects – User
Authentication – Good Coding Practices – Open Web Application Security Project Top 10
Flaws – Common Weakness Enumeration Top 25 Most Dangerous Software Errors
UNIT III SECURITY IN NETWORKS 9 Hrs
Threats in networks – Encryption – Virtual Private Networks – PKI – SSH – SSL –
IPSec – Content Integrity – Access Controls – Wireless Security – Honeypots – Traffic Flow
Security – Firewalls – Intrusion Detection Systems – Secure e-mail. 79
UNIT IV SECURITY IN DATABASES 9 Hrs
Security requirements of database systems – Reliability and Integrity in databases – Two
Phase Update – Redundancy/Internal Consistency – Recovery – Concurrency/Consistency –
Monitors – Sensitive Data – Types of disclosures – Inference.
UNIT V SECURITY MODELS AND STANDARDS 9 Hrs
Secure SDLC – Secure Application Testing – Security architecture models – Trusted
Computing Base – Bell-LaPadula Confidentiality Model – Biba Integrity Model – Graham-
Denning Access Control Model – Harrison-Ruzzo-Ulman Model – Secure Frameworks –
COSO – CobiT – Compliances – PCI DSS – Security Standards - ISO 27000 family of
standards – NIST.
TOTAL: 45 HRS.
TEXT BOOKS:
1. Charles P. Pfleeger, Shari Lawrence Pfleeger, “Security in Computing”, Fourth
Edition, Pearson Education, 2007.
2. Matt Bishop, “Introduction to Computer Security”, Addison-Wesley, 2004.
3. Michael Whitman, Herbert J. Mattord, “Management of Information Security”, Third
Edition, Course Technology, 2010.
REFERENCES:
1. William Stallings, “Cryptography and Network Security : Principles and Practices”,
Fifth Edition, Prentice Hall, 2010.
2. Michael Howard, David LeBlanc, John Viega, “24 Deadly Sins of Software Security:
Programming Flaws and How to Fix Them”, First Edition, Mc Graw Hill Osborne
Media, 2009.
3. Matt Bishop, “Computer Security: Art and Science”, First Edition, Addison-Wesley,
2002.
4. https://www.owasp.org/index.php/Top_10_2010
5. https://www.pcisecuritystandards.org/security_standards/pci_dss.shtml
6. http://cwe.mitre.org/top25/index.html