Subject Details
Dept     : IT
Sem      : 6
Regul    : 2019
Faculty : Prof. A. Kowshika
phone  : NIL
E-mail  : shika2906@gmail.com
660
Page views
0
Files
0
Videos
1
R.Links

Icon
Syllabus

UNIT
1
INTRODUCTION TO NETWORK AND CYBER SECURITY

Security trends - Legal, Ethical and Professional Aspects of Security, Need for Security at Multiple levels, Security Policies - Model of network security – Security attacks, services and mechanisms – OSI security architecture Introduction to Cyber Threats-Cyber Warfare, Cyber Crime, Cyber terrorism, Cyber Espionage. Comprehensive Cyber Security Policy

UNIT
2
SYMMETRIC KEY CRYPTOGRAPHY

Classical encryption techniques: substitution techniques, transposition techniques, steganography. Euclid’s algorithm and Extended Euclid’s algorithm- Congruence SYMMETRIC KEY CIPHERS: Data Encryption Standard –Advanced Encryption Standard - RC4 – Key distribution.

UNIT
3
ASYMMETRIC KEY CRYPTOGRAPHY

MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing – Factorization – Euler’s totient function, Fermat’s and Euler’s Theorem - Chinese Remainder Theorem. ASYMMETRIC KEY CIPHERS: RSA cryptosystem– Key management – Diffie Hellman key exchange - ElGamal cryptosystem – Elliptic curve arithmetic-Elliptic curve cryptography.

UNIT
4
CYBER SECURITY VULNERALIBILITES AND MESSAGE AUTHENTICATION

MAC – Hash function – Security of hash function and MAC, DSS, Cyber Victimization, Cyber Security Vulnerabilities – Overview, vulnerabilities in software, System administration, Complex Network Architectures, Open Access to Organizational Data, Weak Authentication, Poor Cyber Security Awareness

UNIT
5
CYBER SECURITY SAFEGUARDS AND SECURITY SERVICES

Cyber Security Safeguards – Overview, Access control, Authentication, Biometrics, Passwords -Phishing, Cryptography, Ethical Hacking, Firewalls, Intrusion Detection Systems, Incident Response, Scanning, Security policy, Threat Management. Security services: Electronic Mail security – PGP, S/MIME

Reference Book:

Stefan Beissel, “Cybersecurity Investments – Decision Support Under Economic Aspects”, Springer, 2016.

Text Book:

William Stallings, Cryptography and Network Security: Principles and Practice, PHI 3rd Edition, 2006.

 

Print    Download