Foundation of Cyber Security: Semester III
Foundation of Cyber Security: Semester III
COURSE OBJECTIVES
To understand the difference between threats, vulnerability, attacks, impact, risks and
countermeasure.
To learn about security in operating system and networks.
To analyze the different security available in databases.
To understand the concept of privacy and security in emerging technologies.
To learn about management and risks in different technologies.
PREREQUISITE:
Computer Programming
Computer Networks
TOTAL: 45 PERIODS
COURSE OUTCOMES:
TEXT BOOKS:
1. Charles P. Pfleeger Shari Lawrence Pfleeger Jonathan Margulies, Security in Computing,
5th Edition, Pearson Education, 2015.
2. David Kim & Michael G. Solomon, “FOUNDATIONS” and Custom Edition 1 Jan 1,
2014.
REFERENCES:
1. George K.Kostopoulous, Cyber Space and Cyber Security, CRC Press, 2013.
2. MarttiLehto, PekkaNeittaanmäki, Cyber Security: Analytics, Technology and
Automation edited, Springer International Publishing Switzerland 2015
3. Nelson Phillips and EnfingerSteuart, ―Computer Forensics and Investigations‖, Cengage
Learning, New Delhi, 2009.
WEB REFERENCES:
https://onlinecourses.nptel.ac.in/noc23_cs62/preview
https://onlinecourses.nptel.ac.in/noc23_cs44/preview
https://www.javatpoint.com/cyber-security-tutorial
https://www.edureka.co/blog/cybersecurity-fundamentals-introduction-to-cybersecurity/
https://cnitarot.github.io/courses/fc_Fall_2022/2550_intro_history_pub_cnr.pdf
CO-PO MAPPINGS:
CO\PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 - 2 - - - - - - - 2 -
CO2 - 2 2 1 2 - - - - - - 2
CO3 - 2 2 2 - - - - - - - 2
CO4 2 - - 2 - - 1 - - 1 2 -
CO5 3 - 2 2 2 - - - - 1 - -
L T P C
CRYPTOGRAPHY AND CRYPTANALYSIS 3 0 0 3
COURSE OBJECTIVES
To study about the fundamentals of Cryptography
To analyze Key Management techniques and importance of number Theory
To understand the concept of Message Authentication Codes and Hash Functions
To design a security solution for a given application
To understand about cyber crimes and the different security practice.
PREREQUISITE:
Fundamentals of Mathematics
TEXT BOOKS:
1. Forouzan Mukhopadhyay “Cryptography and Network Security” McGraw Hill, 2nd
Edition
2. William Stallings, "Cryptography and Network Security - Principles and Practice",
Seventh Edition, Pearson Education, 2017.
3. Nina Godbole, Sunit Belapure, “Cyber Security: Understanding Cyber-crimes, Computer
Forensics and Legal Perspectives”, First Edition, Wiley India, 2011.
REFERENCES:
1. Behrouz A. Forouzan, DebdeepMukhopadhyay, "Cryptography and Network Security",
3rd Edition, Tata McGraw Hill, 2015.
2. Charles Pfleeger, Shari Pfleeger, Jonathan Margulies, "Security in Computing", Fifth
Edition, Prentice Hall, New Delhi, 2015.
WEB REFERENCES:
https://www.w3.org/TR/WebCryptoAPI/
https://ukdiss.com/examples/web-based-crypto-analysis-learning-application.php
https://developer.mozilla.org/en-US/docs/Web/API/Web_Crypto_API
https://www.garykessler.net/library/crypto.html
https://www.cryptomathic.com/news-events/blog/summary-of-cryptographic-algorithms-according-to-nist
CO-PO MAPPINGS:
CO\PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2 2 1 - - - - - - 2 2
CO2 1 2 2 1 2 - - - - - 2 2
CO3 2 2 2 2 - - - - - - - 2
CO4 2 2 1 2 - - 1 - - 1 2 1
CO5 3 1 2 2 2 - - - - 1 2 2