cyber and information security syll

Upload: mm8871

Post on 04-Jun-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/13/2019 cyber and Information Security syll

    1/4

    Name of Department:- Department of Computer Science and Engineering

    1. Subject Code: Course Title:

    2. Contact Hours: L: T: P:

    3. Examination Duration (Hrs): Theory Practical

    4. Relative Weight: CWS PRS MTE ETE PRE

    5. Credits:

    6. Semester:

    7. Subject Area:

    8. Pre-requisite: Computer Networks and Data communication

    9. Objective: To provide a comprehensive understanding of Issues of symmetric and asymmetric cryptographic Schemes and key management

    issues. Applications of algorithms for secured transmission. Network security principles and measures to prevent vulnerabilities and security

    attacks in the networks.

    10. Details of the Course:-

    Sl. No. Contents Contact HoursUnit I Overview: Services, Mechanisms and attacks, OSI security

    architecture, Model for network security. Classical EncryptionTechniques: Symmetric cipher model, Substitution techniques,Transposition techniques, Steganography, Cyber Security.

    9

    Unit II Block Ciphers and Data Encryption Standards: Simplified DES,Block cipher principles, DES, Strength of DES.Block cipher design principles, Block cipher modes of operation.Double and triple DES, symmetric key distribution, Cyber threats.

    8

    Unit III Public Key Cryptography and RSA: Principles of public keycryptosystems, RSA algorithm, Problems.Other Public Key Crypto Systems and Key management,approaches for distribution of public keys, Diffie-Hellman keyexchange.

    8

    Unit IV Message Authentication and Hash Functions: Authenticationrequirements, Authentication functions, Message authenticationcodes, Hash functions, Security of hash functions and MACs .Digital Signature: Concept of Digital signature, Approaches to digitalsignature, Digital signature standard.

    Authentication Applications: Kerberos, X.509 authentication service,Kerberos encryption technique

    9

    Unit V Data and Network Security: E-Mail security: Threats to E-mail,achieving authentication, confidentiality, compression, e-mailcompatibility, using Pretty Good Privacy, Concept of Key-ringVirtual Private Networks: VPN and its types Tunneling Protocols

    8

    Cyber and Information Security

    -13

    MCN-203

    -

    NIL10030NIL20

    3

    4

    2 nd Semester

    Core course

  • 8/13/2019 cyber and Information Security syll

    2/4

    Tunnel and Transport Mode Authentication Header-EncapsulationSecurity Payload (ESP)- IPSec Protocol SuiteFirewalls: Firewall design principles; Trusted systems, ProblemsIntrusion detection Techniques, Honey Pots and Honey Nets

    Total 42

    Text Books:

    1. William Stallings, Cryptography and Network Security, 3rd edition, Pearson Education(Asia) Pvt. Ltd./ Prentice Hall of India, 2003.

    2. C. Kaufman, R. Perlman, and M. Speciner, Network Security: Private Communication ina Public World, 2nd edition, Pearson Education (Asia) Pvt. Ltd., 2002.

    3. Atul Kahate, Cryptography and Network Security, Tata McGraw -Hill, 2003.4. Eric Maiwald, Fundamentals of Network Security, McGraw -Hill, 2003.

  • 8/13/2019 cyber and Information Security syll

    3/4

    Name of Department:- Department of Computer Science and Engineering

    1. Subject Code: Course Title:

    2. Contact Hours: L: T: P:

    3. Examination Duration (Hrs): Theory Practical

    4. Relative Weight: CWS PRS MTE ETE PRE

    5. Credits:

    6. Semester:

    7. Subject Area:

    8. Pre-requisite: Computer Networks and Data communication

    9. Objective: To provide a comprehensive understanding of Issues of symmetric and asymmetric cryptographic Schemes and key management

    issues. Applications of algorithms for secured transmission. Network security principles and measures to prevent vulnerabilities and security

    attacks in the networks.

    10. Details of the Course:-

    Sl. No. Contents Contact HoursUnit I Overview: Services, Mechanisms and attacks, OSI security

    architecture, Model for network security. Classical EncryptionTechniques: Symmetric cipher model, Substitution techniques,Transposition techniques, Steganography, Problems

    9

    Unit II Block Ciphers and Data Encryption Standards: Simplified DES,Block cipher principles, DES, Strength of DES.Block cipher design principles, Block cipher modes of operation,Problems.Double and triple DES, symmetric key distribution

    8

    Unit III Public Key Cryptography and RSA: Principles of public keycryptosystems, RSA algorithm, Problems.Other Public Key Crypto Systems and Key management,approaches for distribution of public keys, Diffie-Hellman keyexchange, Problems

    8

    Unit IV Message Authentication and Hash Functions: Authenticationrequirements, Authentication functions, Message authenticationcodes, Hash functions, Sec urity of hash functions and MACs .Digital Signature: Concept of Digital signature, Approaches to digitalsignature, Digital signature standard.

    Authentication Applications: Kerberos, X.509 authentication service,Kerberos encryption technique

    9

    Unit V Data and Network Security: E-Mail security: Threats to E-mail,achieving authentication, confidentiality, compression, e-mailcompatibility, using Pretty Good Privacy, Concept of Key-ring

    8

    Information Security

    -13

    MCS-203

    -

    NIL10030NIL20

    3

    4

    2 nd Semester

    Core course

  • 8/13/2019 cyber and Information Security syll

    4/4

    Virtual Private Networks: VPN and its types Tunneling Protocols Tunnel and Transport Mode Authentication Header-EncapsulationSecurity Payload (ESP)- IPSec Protocol SuiteFirewalls: Firewall design principles; Trusted systems, ProblemsIntrusion detection Techniques, Honey Pots and Honey Nets

    Total 42

    Text Books:

    1. William Stallings, Cryptography and Network Security, 3rd edition, Pearson Education(Asia) Pvt. Ltd./ Prentice Hall of India, 2003.

    2. C. Kaufman, R. Perlman, and M. Speciner, Network Security: Private Communication ina Public World, 2nd edition, Pearson Education (Asia) Pvt. Ltd., 2002.

    3. Atul Kahate, Cryptography and Network Security, Tata McGraw -Hill, 2003.4. Eric Maiwald, Fundamentals of Network Security, McGraw -Hill, 2003.