Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
9 views6 pages

Information Security Syllabus

The document outlines the course objectives, units, and outcomes for an Information Security course, focusing on principles, cryptography, authentication, and security mechanisms. It includes detailed topics such as symmetric and public key cryptography, hash functions, web security, and various types of attacks. Additionally, it provides a list of recommended books and practical experiments for students to apply their knowledge.

Uploaded by

Kratika Jain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views6 pages

Information Security Syllabus

The document outlines the course objectives, units, and outcomes for an Information Security course, focusing on principles, cryptography, authentication, and security mechanisms. It includes detailed topics such as symmetric and public key cryptography, hash functions, web security, and various types of attacks. Additionally, it provides a list of recommended books and practical experiments for students to apply their knowledge.

Uploaded by

Kratika Jain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Informa on Security

3150513

COURSE OBJECTIVES
 To provide conceptual understanding of Informa on security principles, issues, challenges and
mechanisms.
 To understand how to apply encryp on techniques to secure data in transit across data
networks.

Unit-I

Security: Principles and A acks, Basic Number Theory, Fundamentals of Cryptography,


Steganography, Cryptanalysis, Code Breaking, Block Ciphers and Steam Ciphers, Subs tu on
Ciphers, Transposi on Ciphers, Caesar Cipher, Play-Fair Cipher, Hill Cipher.

Unit-II

Cryptography: Symmetric Key Cryptography, Public Key Cryptography, Principles of Public Key
Cryptosystem, Classical Cryptographic Algorithms: RC4, RSA, Distribu on of Public Keys and Key
Management, Diffie-Hellman Key Exchange.

Unit-III

Hash Func ons: Hash Func ons, One Way Hash Func on, SHA (Secure Hash Algorithm).
Authen ca on: Requirements, Func ons, Kerberos, Message Authen ca on Codes, Digital
Signatures, Digital Cer ficates.

Unit -IV

IP & Web Security Overview: SSL (Secure Socket Layer), TLS (Transport Layer Security), SET
(Secure Electronic Transac on). IDS (Intrusion detec on system), Firewalls: Types,
Func onality and Polices.

Unit -V

Phishing: A acks and its Types, Buffer Overflow A ack, Session Hijacking, Hacker: Hacking and
Types of Hackers, Foot Prin ng, Scanning: Types: Port, Network, Vulnerability), Sniffing in
Shared and Switched Networks, Sniffing Detec on & Preven on, Spoofing, Zero Trust
Architecture: Core Principles of Zero Trust, Key Components of Zero trust, Zero trust
implementa on Frameworks.
RECOMMENDED BOOKS

 Cryptography and Network Security, William Stallings, Pearson Education.


 Cryptography and Network Security, Atul Kahate, McGraw Hill Education.
 Incident Response and Computer Forensics, Kevin Mandia, Chris Prosise, Tata
McGraw Hill.

COURSE OUTCOMES

A er comple on of the course students would be able to:

CO1. Explain Principles & a acks, basic number theory and fundamental of cryptography.
CO2. Illustrate public key algorithms to real-world security problems.
CO3. Analyze the security requirements of hash func ons & Kerberos.
CO4. Describe the SET protocol’s role in securing e-commerce transac ons (dual signatures,
merchant/payment gateway trust).

CO5. Classify Phishing a acks and hacker types (black hat, white hat, gray hat, script kiddies) and
their mo ves.

Course Ar cula on Matrix

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 3 2 2 2 2 1 2 3 3
CO2 3 3 3 3 2 2 1 1 1 1 1 3 3
CO3 3 3 3 3 1 1 1 1 1 1 1 3 3
CO4 3 2 3 1 1 2 1 2 1 1 2 2
CO5 2 2 2 2 2 3 2 3 2 2 3 3 3 2

1 - Slightly; 2 - Moderately; 3 – Substantially


Informa on Security
3150513

List of Experiments

1. Perform encryp on, decryp on using the following subs tu on techniques


I. Ceaser cipher II. Hill Cipher

2. Perform encryp on and decryp on using following transposi on techniques:


Rail fence and Row & Column Transforma on

3. Implement Playfair Cipher with key entered by user.


4. Implement polyalphabe c Cipher
5. Implement AutoKey Cipher
6. Implement Hill Cipher.
7. Implement Rail fence technique
8. Implement Transposi on technique
9. Implement subs tu on technique
10. Demonstrate intrusion detec on system (ids) using any tool (snort or any other s/w)

COURSE OUTCOMES

A er comple on of the course students would be able to:

CO1: Illustrate Encrypt/decrypt messages using substitution ciphers


CO2: Design and implement the Playfair Cipher with user-defined keys, handling digraph substitutions.
CO3: Configure and test a basic IDS using Snort to detect port scans (nmap activity)
----------------------------------------------------------------------------------------------------
Course Ar cula on Matrix

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 2 1 1 2 2 2
CO2 3 2 3 2 2 1 1 2 2
CO3 3 3 2 2 3 1 1 2 2 2 3 1 1
1 - Slightly; 2 - Moderately; 3 – Substantially
Informa on Security
3150513

List of skill-based mini project

1. Develop an email monitoring system.


2. Develop a web applica on firewall
3. Develop a Log Analyzer
4. Develop a Malware Analysis Sandbox
5. Develop an Encryp on So ware
6. Develop a Caesar code Decoder
7. Develop a user authen ca on system
8. Develop an Image Steganography system
9. Develop an Anomaly detec on system

Please Note: Each project has to be submi ed by a group of 1 or 2 students, and each group will be
assigned only one project.
***********
Information Security
2150513 (OLD)

COURSE OBJECTIVES

To provide conceptual understanding of Information security principles, issues, challenges and


mechanisms.
To understand how to apply encryption techniques to secure data in transit across data
networks.

Unit-I

Security: Principles and Attacks, Basic Number Theory, Fundamentals of Cryptography,


Steganography, Cryptanalysis, Code Breaking, Block Ciphers and Steam Ciphers,
Substitution Ciphers, Transposition Ciphers, Caesar Cipher, Play- Fair Cipher, Hill Cipher.

Unit-II
Cryptography: Symmetric Key Cryptography, Public Key Cryptography, Principles of
Public Key Cryptosystem, Classical Cryptographic Algorithms: RC4, RSA, Distribution
of Public Keys and Key Management, Diffie-Hellman Key Exchange.

Unit-III
Hash Functions: Hash Functions, One Way Hash Function, SHA (Secure Hash
Algorithm). Authentication: Requirements, Functions, Kerberos, Message Authentication
Codes, Digital Signatures, Digital Certificates.

Unit -IV
IP & Web Security Overview: SSL (Secure Socket Layer), TLS (Transport Layer
Security), SET (Secure Electronic Transaction). IDS (Intrusion detection system),
Firewalls: Types, Functionality and Polices.

Unit -V
Phishing: Attacks and its Types, Buffer Overflow Attack, Session Hijacking, Hacker:
Hacking and Types of Hackers, Foot Printing, Scanning: Types: Port,
Department of Computer Science and Engineering

Network, Vulnerability), Sniffing in Shared and Switched Networks, Sniffing Detection &
Prevention, Spoofing.

RECOMMENDED BOOKS

 Cryptography and Network Security, William Stallings, Pearson Education.

 Cryptography and Network Security, Atul Kahate, McGraw Hill Education.


 Incident Response and Computer Forensics, Kevin Mandia, Chris Prosise, Tata

McGraw Hill.

COURSE OUTCOMES
A er comple on of the course students would be able to:
CO1. Explain attacks, hash algorithms and authentication mechanisms.
CO2. Illustrate fundamentals of number theory and security principles.
CO3. Apply various algorithms to achieve principles of network security.
CO4. Analyze the cause for various existing network attacks and describe the working of
available security controls.
CO5. Examine the vulnerabilities in IT infrastructure.

Course Ar cula on Matrix

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 3 2 3 2 2 1 1 1 1 1 3 3
CO2 3 3 3 3 2 1 2 1 1 1 1 1 3 3
CO3 3 3 3 3 2 1 1 1 1 1 1 1 3 3
CO4 3 3 3 3 2 1 1 1 1 1 1 1 2 3
CO5 3 3 3 2 3 1 1 1 1 1 1 1 3 3

1 - Slightly; 2 - Moderately; 3 Substantially

You might also like