0% found this document useful (0 votes)
94 views2 pages

AI 403 Cyber Security and Forensics

This document outlines the course AI 403 Cyber Security and Forensics. The course aims to help students understand cyber security requirements, implement access controls, explore intrusion detection systems and firewalls, and analyze cryptographic and forensic methods. It is divided into sections on introduction to cyber security, information security, internet security, access control, intrusion detection, security auditing, cyber forensics, and cyber law. Students will learn about issues like cyber crimes, authentication protocols, transport security, access control principles, intrusion detection approaches, security auditing, cybercrime investigation, and relevant laws.

Uploaded by

somnath.sinha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
94 views2 pages

AI 403 Cyber Security and Forensics

This document outlines the course AI 403 Cyber Security and Forensics. The course aims to help students understand cyber security requirements, implement access controls, explore intrusion detection systems and firewalls, and analyze cryptographic and forensic methods. It is divided into sections on introduction to cyber security, information security, internet security, access control, intrusion detection, security auditing, cyber forensics, and cyber law. Students will learn about issues like cyber crimes, authentication protocols, transport security, access control principles, intrusion detection approaches, security auditing, cybercrime investigation, and relevant laws.

Uploaded by

somnath.sinha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

AI 403 Cyber Security and Forensics

Max. Marks: 100 LTPC


(CA: 40 + ESA: 60) 4004

Learning Outcomes:
 After successful completion of the course students will be able to
 Understand the cyber space and requirement of cyber security.
 Implement the access controls in cyber space.
 Explore the Intrusion detection & prevention systems and firewalls.
 Analyse the different types of cryptographic and forensic methods.
 Identify and solve different cyber security threats.

Section-A

Introduction to Cyber Security: Cyber Security, Issues and challenges of cyber


security, Architecture of Cyber Space, Types of Cyber Crime, Conventional crimes vs.
Cyber Crimes. White Collar Crimes, Economic Offences, Organized Crimes, Cyber
Terrorism.

Information Security: Digital Rights Management (DRM), Managing Identity and


Authentication, Common Authentication Protocols: Password Authentication
Protocol (PAP), Challenge Handshake Authentication Protocol (CHAP), Extensible
Authentication Protocols: Remote Access with RADIUS and TACACS, Single Sign on,
Kerberos, SEASAME.

Section-B
Internet Security: Transport security: TLS, SSL, IPSec., Email security, Secure
Electronic Transaction (SET), Web Security, Introduction to Network Simulator
Netsim, NS2/NS3, Cooja.
Access Control: Access Control Principles, Subjects, Objects, and Access Rights,
Discretionary Access Control, Role-Based Access Control, Attribute-Based Access
Control, Identity, Credential, and Access Management
Intrusion Detection: Intruders, Intrusion Detection, Analysis Approaches, Host-Based
Intrusion Detection, Network-Based Intrusion Detection, Distributed or Hybrid
Intrusion Detection, ML-based IDS, Network Traffic Monitoring, Intrusion prevention
system (IPS), Firewalls, Types of firewalls.

Section-C
Security Auditing: Internal Audit and IT Audit Function, Identifying information
assets, Risk assessment, Risk management, ISO 27001 PCIDSS.
Cyber Forensics: Windows Forensic Analysis: Window artifacts, Evidence volatility,
System time, Logged on user(s). Open files, MRUs, Network information, Process
information, Service information. Cybercrime investigation: incident response,
Vulnerability analysis, Penetration Testing, etc CDR Analysis.
Cyber Law: Introduction to cybercrime and cyber law, International Cyber Law, IT Act
2000/2008, offences under IT Act, Intellectual Property right. Cyber Security
Standards, National Cyber Law, National Cyber Security Policy 2013.

Suggested Books:

1. Computer security principles and practice, William Stallings, Lawrie Brown, third
edition, Prentice-Hall, 2011

2. RMichael E. Whitman and Herbert J Mattord, "Principles of Information Security",


6th edition, Vikas Publishing House, 2017.

3. Bill Nelson, Amelia Phillips, FEnfinger and Christopher Stuart, “Guide to Computer
Forensics and Investigations, 4th ed., Thomson Course Technology, 2010.

You might also like