Information Security (IT-8001)
rgpv bhopal, diploma, rgpv syllabus, rgpv time table, how to get transcript from rgpv, rgpvonline,rgpv question paper, rgpv online question paper, rgpv admit card, rgpv papers, rgpv scheme
RGPV notes CBGS Bachelor of engineering
Syllabus
UNIT 1:
Basic of Cryptography, secret key cryptography, Types of attack, Substitution ciphers,
Transposition ciphers, block ciphers and steam ciphers, Confusion and Diffusion, Data encryption
standard, round function, modes of operation, cryptanalysis, brute force attack, Security Goals
(Confidentiality, Integrity, Availability).
UNIT 2:
Public key Cryptography, Modulo arithmetic, Greatest common divisor, Euclidean
algorithm, RSA algorithm, hash function, attack on collision resistance, Diffie hellman key
exchange, Digital signature standard, elliptic curve cryptography.
UNIT 3:
Authentication: One way Authentication, password based, certificate based, Mutual
Authentication ,shared secret based, Asymmetric based, Authentication and key agreement,
centralized Authentication, eavesdropping, Kerberos, IP security overview:- security association &
Encapsulating security payload ,tunnel and transfer modes, internet key exchange protocol, Secure
Socket Layer(SSL), Transport Layer Security (TLS).
UNIT 4:
Software vulnerabilities: Phishing Attacks, buffer overflow vulnerability, Format String
attack, Cross Site Scripting, SQL injection Attacks, Email security:- Security services of E-mail
,Establishing keys, Privacy ,Authentication of the source, Message integrity ,Non-Repudiation,
Viruses, Worms, Malware.
UNIT 5:
Web Issue: Introduction, Uniform Resource Locator/uniform resource identify, HTTP,
Cookies, Web security problem, Penetration Testing, Firewalls:- functionality, Polices and Access
Control, Packet filters, Application level gateway, Encrypted tunnel, Security architecture,
Introduction to intrusion detection system.
NOTES
- Unit 1
- Unit 2
- Unit 3
- Unit 4
- Unit 5
Books Recommended
William Stalling, “ Cryptography and Network security”, Pearson.
Atual Kahate, “ Cryptography and Network Security”, TMH.
Bernard Menezes, “ Network Security and Cryptography”, CENGAGE Learning.
Charlie Kaufman, “ Network Security”, PHI.
Forouzan, “Cryptography & Network Security”, TMH
Randy Weaver, “ Network Infrastructure Security”, Cengage Learning.
List of Experiment:-
Study of Network Security fundamentals - Ethical Hacking, Social Engineering practices.
System threat attacks - Denial of Services.
Sniffing and Spoofing.
Web Based Password Capturing.
Virus and Trojans.
Anti-Intrusion Technique – Honey pot.
Symmetric Encryption Scheme – RC4.
Block Cipher – S-DES, 3-DES.
Asymmetric Encryption Scheme – RSA.
IP based Authentication.
You May Also Like
- IT-8002 - Soft Computing
- IT-8003 - Digital Image Processing [Elective-V]
- IT-8003 - Data Science [Elective-V]
- IT-8003 - Information theory and coding [Elective-V]
- IT-8004 - Data Mining & Warehousing [Elective-VI]
- IT-8004 - Internet of Things [Elective-VI]
- IT-8004 - Unix & Shell Programming [Elective-VI]
- IT-8005 - Project-II
- IT-8006 - Lab (Elective-VI)
- IT-8007 - Group Discussion (Internal Assessment)