0% found this document useful (0 votes)
35 views2 pages

IS Course

Just read them
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views2 pages

IS Course

Just read them
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

B.Tech.

IT AR20 Regulation

GEETHANJALI COLLEGE OF ENGINEERING AND TECHNOLOGY


(UGC Autonomous)
Cheeryal (V), Keesara (M), Medchal Dist., Telangana-501301

20CS32006 - INFORMATION SECURITY


(Professional Elective-II)

B.Tech. IT - III Year, II Sem.


Prerequisite(s): L T P/D C
3 0 0 3
20MA11001-BASIC ENGINEERING MATHEMATICS
20CS12002-DISCRETE MATHEMATICS
20CS31002-COMPUTER NETWORKS

Course Objectives:
Develop ability to

1. Describe the importance and applications of information security aspects, namely,


confidentiality, integrity, authentication and availability.
2. Understanding Malware Analysis.
3. Interpret Android Malware Analysis and IP security.
4. Discuss Transport Layer Security and Email Security.
5. Summarize SNMP, Intrusion Detection Techniques and Firewalls.

Course Outcomes (COs):


At the end of the course, the student would be able to
CO1. Classify information security aspects, security attacks, services and mechanisms.
CO2. Understand the characteristics of various malware
CO3. Analyze Android Malware Analysis and IP Security mechanisms.
CO4. Evaluate the performance of SSL protocol and analyze email security
CO5. Illustrate SNMP and categories of Firewalls and their applications

UNIT I
Security Concepts: Security Attacks (Interruption, Interception, Modification and Fabrication),
Security Services (Confidentiality, Authentication, Integrity, Non-repudiation, access Control
and Availability) and Mechanisms, A model for Internetwork security, Internet Standards and
RFCs, Distributed Denial of Service Attacks. TCP session hijacking, ARP attacks, route table
modification, UDP hijacking, and man-in- the-middle attacks. Buffer overflow & format string
vulnerabilities.

UNIT II
Malware Analysis: Viruses, Worms, goals of Malware Analysis, AV Scanning, Hashing,
Finding Strings, Packing and Obfuscation, PE file format, Static, Linked Libraries and
Functions, Static Analysis tools, Virtual Machines and their usage in malware analysis,
Sandboxing, Basic dynamic analysis, Malware execution, Process Monitoring, Viewing
processes, Registry snapshots.

Department of Information Technology 166


B.Tech. IT AR20 Regulation

UNIT III
Android Malware Analysis: Android architecture, App development cycle, APK Tool, APK
Inspector, Dex2Jar, JD-GUI, Static and Dynamic Analysis, Case studies. IP Security: IP
Security overview, IP Security architecture, Authentication Header, encapsulating security
payload, combining, security associations, Internet Key Exchange.

UNIT IV
Transport-level Security: Web security considerations, Secure Socket Layer, Transport Layer
Security and Secure Shell (SSH). E-Mail Security: Pretty Good Privacy, S/MIME

UNIT V
SNMP: Basic concepts of SNMP, SNMPv1 Community facility and SNMPv3., Digital
envelope, Digital Signature, SET protocol, Digital Certificate. Firewalls and Intrusion Detection
Systems: Intrusion Detection Password Management, Firewall Characteristics Types of
Firewalls, Firewall Basing, Firewall Location and Configurations.

TEXT BOOK(S)
1. Cryptography and Network Security Principles and Practice: William Stallings,
Pearson Education, Seventh Edition,2017.
2. Practical Malware Analysis by Michael Sikorski and Andrew Honig, First
Edition,2012.

REFERENCE BOOK(S)
1. Cryptography and Network Security: C K Shyamala, N Harini, Dr. T R
Padmanabhan, Wiley India, First Edition,2011.
2. Information Security, Principles and Practice: Mark Stamp, Wiley India, Second
Edition,2011.
3. Principles of Computer Security: WM Arthur Conklin, Greg White, TMH, Fourth
Edition,2016.
4. Introduction to Network Security: Neal Krawetz, CENGAGE Learning, First
Edition,2007.

Department of Information Technology 167

You might also like