PUIT6PC07 INFORMATION SECURITY L T P C
Course reference :
COURSE OBJECTIVES:
Current
1 To understand the basic categories of threats to computers and networks.
2 To understand various cryptographic algorithms.
3 To apply authentication functions for providing effective security.
4 To analyze the application protocols to provide web security.
5 To understand the importance and implementation of Web security and Firewalls
Modified
1
2
.
1. Students will be able to evaluate various
security attacks and will gain understanding
on services and mechanisms.
2. Students will understand the applications
and working of various symmetric and
asymmetric algorithms
3. Students will be able to identify information
Current Course outcomes system requirements for both of them such Cognitive level
as client and server.
4. Students will be able to understand the
importance of IP security and key
management.
5. Students will understand other types of
threats and also the importance of web
security
Inadequate mapping identified
with PO/PSO and scope for
improvement in Blooms level
Modified Course outcomes
UNIT – I COMPUTER SECURITY AND CRYPTOGRAPHY 9
Modified title :
Existing content
Attacks on Computers and Computer Security: Introduction, The need for security, Security
approaches, Principles of security, Types of Security attacks, Security services, Security
Mechanisms, A model for Network Security
Cryptography: Concepts and Techniques: Introduction, plain text and cipher text, substitution
techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key
cryptography, steganography, key range and key size, possible types of attacks.
Proposed modification
Modified content
Justification
UNIT – II SYMMETRIC KEY CIPHERS 9
Block Cipher principles & Algorithms(DES, AES), Block cipher modes of operation, Stream ciphers, RC4,Location and
placement of encryption function, Key distribution Asymmetric key Ciphers: Principles of public key cryptosystems,
Algorithms(RSA, Diffie-Hellman), Key Distribution.
Proposed modification
Modified content
Justification
AUTHENTICATION ALGORITHMS AND
UNIT – III 9
APPLICATIONS
Message Authentication Algorithms and Hash Functions: Authentication requirements, Functions, Message
authentication codes, Hash Functions, Secure hash algorithm, Whirlpool, HMAC, Digital signatures,
Authentication Applications: Kerberos, X.509 Authentication Service, Public Key Infrastructure, Biometric
Authentication
Proposed modification
Modified content
Justification
UNIT – IV EMAIL & IP SECURITY 9
E-Mail Security: Pretty Good Privacy, S/MIME. IP Security: IP Security overview, IP Security architecture,
Authentication Header, encapsulating security payload, combining security associations, key management
Proposed modification
Modified content
Justification
UNIT – V PUMPS 9
Web Security: Web security considerations, Secure Socket Layer and Transport Layer Security, Secure electronic
transaction. Intruders, Virus and Firewalls: Intruders, Intrusion Detection, password management, Virus and related
threats, Counter measures, Firewall design principles, Types of firewalls .Case Studies on Cryptography and security:
Secure Inter Branch Payment Transactions, Cross site Scripting Vulnerability, Virtual Elections
Proposed modification
Modified content
Justification
TOTAL: 45 PERIODS
Text BOOKS: ( 1 or 2 )
1 Cryptography and Network Security : William Stallings, Pearson Education,4" Edition
2 Cryptography and Network Security : Atul Kahate, Mc Graw Hill, 2" Edition
Reference Books ( Min. 3 to Max. 5 )
1 Information Security, Principles and Practice: Mark Stamp, Wiley India.
Introduction to Network Security: Neal Krawetz, CENGAGE Learning
2
WEBSITE REFERENCE / NPTEL/ SWAYAM/ MOOC REFERENCE: ( Don’t use symbols/web link ) ( 2 to 5 )
1. https://archive.nptel.ac.in/courses/106/106/106106157/#
2. https://archive.nptel.ac.in/courses/106/106/106106199/
.
CO-PO MAPPING
CO/ PO
PO1 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
PO 2
CO1
CO2
CO3
CO4
CO5