0% found this document useful (0 votes)
22 views4 pages

Is Syllabus

Uploaded by

hod
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views4 pages

Is Syllabus

Uploaded by

hod
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

PUIT6PC07 INFORMATION SECURITY L T P C

Course reference :

COURSE OBJECTIVES:
Current

1 To understand the basic categories of threats to computers and networks.

2 To understand various cryptographic algorithms.

3 To apply authentication functions for providing effective security.


4 To analyze the application protocols to provide web security.

5 To understand the importance and implementation of Web security and Firewalls

Modified

1
2
.
1. Students will be able to evaluate various

security attacks and will gain understanding


on services and mechanisms.
2. Students will understand the applications
and working of various symmetric and
asymmetric algorithms
3. Students will be able to identify information
Current Course outcomes system requirements for both of them such Cognitive level
as client and server.
4. Students will be able to understand the
importance of IP security and key
management.
5. Students will understand other types of
threats and also the importance of web
security

Inadequate mapping identified


with PO/PSO and scope for
improvement in Blooms level

Modified Course outcomes

UNIT – I COMPUTER SECURITY AND CRYPTOGRAPHY 9

Modified title :

Existing content
Attacks on Computers and Computer Security: Introduction, The need for security, Security
approaches, Principles of security, Types of Security attacks, Security services, Security
Mechanisms, A model for Network Security
Cryptography: Concepts and Techniques: Introduction, plain text and cipher text, substitution
techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key
cryptography, steganography, key range and key size, possible types of attacks.

Proposed modification

Modified content

Justification

UNIT – II SYMMETRIC KEY CIPHERS 9

Block Cipher principles & Algorithms(DES, AES), Block cipher modes of operation, Stream ciphers, RC4,Location and
placement of encryption function, Key distribution Asymmetric key Ciphers: Principles of public key cryptosystems,
Algorithms(RSA, Diffie-Hellman), Key Distribution.

Proposed modification

Modified content

Justification

AUTHENTICATION ALGORITHMS AND


UNIT – III 9
APPLICATIONS
Message Authentication Algorithms and Hash Functions: Authentication requirements, Functions, Message
authentication codes, Hash Functions, Secure hash algorithm, Whirlpool, HMAC, Digital signatures,
Authentication Applications: Kerberos, X.509 Authentication Service, Public Key Infrastructure, Biometric
Authentication

Proposed modification

Modified content

Justification

UNIT – IV EMAIL & IP SECURITY 9


E-Mail Security: Pretty Good Privacy, S/MIME. IP Security: IP Security overview, IP Security architecture,
Authentication Header, encapsulating security payload, combining security associations, key management

Proposed modification

Modified content

Justification

UNIT – V PUMPS 9

Web Security: Web security considerations, Secure Socket Layer and Transport Layer Security, Secure electronic
transaction. Intruders, Virus and Firewalls: Intruders, Intrusion Detection, password management, Virus and related
threats, Counter measures, Firewall design principles, Types of firewalls .Case Studies on Cryptography and security:
Secure Inter Branch Payment Transactions, Cross site Scripting Vulnerability, Virtual Elections

Proposed modification

Modified content

Justification

TOTAL: 45 PERIODS

Text BOOKS: ( 1 or 2 )

1 Cryptography and Network Security : William Stallings, Pearson Education,4" Edition


2 Cryptography and Network Security : Atul Kahate, Mc Graw Hill, 2" Edition

Reference Books ( Min. 3 to Max. 5 )

1 Information Security, Principles and Practice: Mark Stamp, Wiley India.

Introduction to Network Security: Neal Krawetz, CENGAGE Learning


2

WEBSITE REFERENCE / NPTEL/ SWAYAM/ MOOC REFERENCE: ( Don’t use symbols/web link ) ( 2 to 5 )

1. https://archive.nptel.ac.in/courses/106/106/106106157/#

2. https://archive.nptel.ac.in/courses/106/106/106106199/

.
CO-PO MAPPING

CO/ PO
PO1 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
PO 2

CO1

CO2

CO3

CO4

CO5

You might also like