Subject Details
Dept     : CSD
Sem      : 5
Regul    : 2019
Faculty : N.Ganitha Aarthi
phone  : NIL
E-mail  : ganitha.n.csd@snsce.ac.in
227
Page views
0
Files
0
Videos
0
R.Links

Icon
Syllabus

UNIT
1
Introduction to Security

Security trends-Security attacks, services, and mechanism – Cryptographic Conventional Encryption- Classical encryption techniques: Substitution ciphers and transposition ciphers –Block cipher principles-block cipher modes of Operation-DES, Advanced Encryption Standard (AES).

UNIT
2
Public Key Cryptography and Hash Algorithms

Mathematics Of Symmetric and Asymmetric Key Cryptography: Introduction to Groups, Rings, and fields - Modular arithmetic- Euclid’s Algorithm- Prime and primality testing - Fermat’s and Euler’s theorem - Chinese Remainder theorem. RSA Algorithm-Diffie Hellman Key exchange- Hash Functions-Hash Algorithms (MD5, Secure Hash Algorithm).

UNIT
3
Fundamentals of Cyber Security

Cyber Threats-Cyber Warfare, Cyber Crime, Cyber terrorism, Cyber Espionage, etc., Comprehensive Cyber Security Policy. Fraud Techniques- Threat Infrastructure- Techniques to Gain a Foothold (Shellcode, SQL Injection, Malicious PDF Files)- Misdirection, Reconnaissance, and Disruption Methods-Case studies.

UNIT
4
Defense - Security Countermeasures

Data theft– Intrusion detection systems –Types of Insider Attack- Insider Threat Issues-Model of the Insider Sabotage Problem-Mitigation of Insider Sabotage problem

UNIT
5
Management And Incidents

Security Planning - Business Continuity Planning - Handling Incidents - Risk Analysis -Dealing with Disaster - Emerging Technologies - The Internet of Things – Artificial Intelligence- Block chain- Case studies: Economics -Electronic Voting

Reference Book:

1. BehrouzA.Foruzan, Cryptography and Network Security, Tata McGraw Hill 2007. (unit 1and 2) 2. Martti Lehto, Pekka Neittaanmäki, Cyber Security: Analytics, Technology and Automation edited, Springer International Publishing Switzerland 2015

Text Book:

1. William Stallings, Cryptography and Network Security: Principles and Practice, PHI 3rd Edition, 2006. (Unit 1 and 2) 2. James Graham, Richard Howard, and Ryan Olson (Eds), “Cyber Security Essentials”, CRC Press, 2011. (Unit 3, 4) 3. Charles P. Pfleeger Shari Lawrence Pfleeger Jonathan Margulies, Security in Computing, 5th Edition, Pearson Education, 2015 (Unit 5)

 

Print    Download