0% found this document useful (0 votes)
70 views7 pages

Foundation of Cyber Security: Semester III

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views7 pages

Foundation of Cyber Security: Semester III

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Semester III

JCB2321 Foundation of Cyber Security


L T P C
FOUNDATION OF CYBER SECURITY
3 0 0 3

COURSE OBJECTIVES
 To understand the difference between threats, vulnerability, attacks, impact, risks and
countermeasure.
 To learn about security in operating system and networks.
 To analyze the different security available in databases.
 To understand the concept of privacy and security in emerging technologies.
 To learn about management and risks in different technologies.

PREREQUISITE:
 Computer Programming
 Computer Networks

UNIT-I INTRODUCTION TO CYBER SECURITY 9


Introduction - Computer Security - Threats - Harm - Vulnerabilities - Controls - Authentication
- Access Control, AAA and Cryptography – Web-User Side - Browser Attacks - Web Attacks
Targeting Users - Obtaining User or Website Data - Email Attacks.

UNIT-II SECURITY IN OPERATING SYSTEM & NETWORKS 9


Security in Operating Systems - Security in the Design of Operating Systems – Root kit
- Network Security Attack - Threats to Network Communications - Wireless Network Security
- Denial of Service - Distributed Denial-of-Service.

UNIT-III DEFENCES SECURITY COUNTER MEASURES 9


Cryptography in Network Security - Firewalls - Intrusion Detection and Prevention Systems
- Network Management - Databases - Security Requirements of Databases - Reliability and
Integrity - Database Disclosure - Data Mining and Big Data.

UNIT-IV PRIVACY IN CYBERSPACE 9


Privacy concepts –privacy principles and policies, Data Principle, Controller/Fiduciary and Processor
Privacy by Design and Default, Authentication and Privacy - Data mining –Privacy on the Web
- Email Security - Privacy Impacts of Emerging Technologies - where the field is headed
(GDPR, DPDPA), Introduction to (PIMS) Privacy Information Management System.

UNIT-V MANAGEMENT AND INCIDENTS 9


Security Planning - Business Continuity Planning - Handling Incidents - Risk Analysis - Dealing
with Disaster - Emerging Technologies - The Internet of Things - Economics - Electronic Voting
- Cyber Warfare - Cyberspace and the Law - International Laws - Cyber Crime - Cyber Warfare
and Home Land Security, Introduction to NIST CSF.

TOTAL: 45 PERIODS
COURSE OUTCOMES:

At the end of the course, the student should be able to:


 Classify various types of attacks and learn the tools to launch the attacks
 Apply various tools to perform information gathering
 Analyze intrusion techniques to detect intrusion
 Apply intrusion prevention techniques to prevent intrusion
 Explain the basics of cyber security, cyber crime and cyber law

TEXT BOOKS:
1. Charles P. Pfleeger Shari Lawrence Pfleeger Jonathan Margulies, Security in Computing,
5th Edition, Pearson Education, 2015.
2. David Kim & Michael G. Solomon, “FOUNDATIONS” and Custom Edition 1 Jan 1,
2014.

REFERENCES:
1. George K.Kostopoulous, Cyber Space and Cyber Security, CRC Press, 2013.
2. MarttiLehto, PekkaNeittaanmäki, Cyber Security: Analytics, Technology and
Automation edited, Springer International Publishing Switzerland 2015
3. Nelson Phillips and EnfingerSteuart, ―Computer Forensics and Investigations‖, Cengage
Learning, New Delhi, 2009.

WEB REFERENCES:
 https://onlinecourses.nptel.ac.in/noc23_cs62/preview
 https://onlinecourses.nptel.ac.in/noc23_cs44/preview
 https://www.javatpoint.com/cyber-security-tutorial
 https://www.edureka.co/blog/cybersecurity-fundamentals-introduction-to-cybersecurity/
 https://cnitarot.github.io/courses/fc_Fall_2022/2550_intro_history_pub_cnr.pdf

CO-PO MAPPINGS:
CO\PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12

CO1 2 - 2 - - - - - - - 2 -
CO2 - 2 2 1 2 - - - - - - 2
CO3 - 2 2 2 - - - - - - - 2
CO4 2 - - 2 - - 1 - - 1 2 -
CO5 3 - 2 2 2 - - - - 1 - -
L T P C
CRYPTOGRAPHY AND CRYPTANALYSIS 3 0 0 3
COURSE OBJECTIVES
 To study about the fundamentals of Cryptography
 To analyze Key Management techniques and importance of number Theory
 To understand the concept of Message Authentication Codes and Hash Functions
 To design a security solution for a given application
 To understand about cyber crimes and the different security practice.

PREREQUISITE:
 Fundamentals of Mathematics

UNIT-I INTRODUCTION TO CRYPTOGRAPHY 9


Number theory – Algebraic Structures – Modular Arithmetic - Euclid‘s algorithm – Congruence
and matrices – Group, Rings, Fields, Finite Fields - Symmetric Key Ciphers - SDES – Block
Ciphers – DES – Strength of DES – Differential and linear cryptanalysis – Block Cipher Design
principles – Block cipher mode of operation – Evaluation criteria for AES – Pseudorandom
Number Generators – RC4 – Key distribution.

UNIT-II ASYMMETRIC CRYPTOGRAPHY 9


Primes – Primality Testing – Factorization – Euler’s totient function, Fermat’s and Euler’s
Theorem – Chinese Remainder Theorem – Exponentiation and logarithm - Asymmetric Key
Ciphers - RSA cryptosystem – Key distribution – Key management – Diffie Hellman key
exchange – Elliptic curve arithmetic – Elliptic curve cryptography.

UNIT-III MESSAGE AUTHENTICATION AND HASH FUNCTION 9


Authentication Requirements - Authentication Function - Message Authentication Codes - Hash
Functions - Security of Hash Functions and MACs - Secure Hash Algorithm - Whirlpool,
HMAC, CMAC - Digital Signatures - Authentication Protocol - Digital Signature Standard
- Authentication Applications- Kerberos - X.509 Authentication Service - Public-key
infrastructure.

UNIT-IV FIREWALLS AND CRYPTANALYSIS 9


Intruder – Intrusion Detection System - Password Management - Virus and Related Threats
- Countermeasures - Firewall Design Principles- Trusted Systems -Practical Implementation of
Cryptography and Security.

UNIT-V CYBER CRIMES AND SECURITY 9


Cyber Crime and Information Security – Classifications of Cyber Crimes – Tools and Methods
– Password Cracking, Keyloggers, Spywares, SQL Injection – Network Access Control – Cloud
Security – Web Security – Wireless Security.
TOTAL: 45 PERIODS
COURSE OUTCOMES:

At the end of the course, the student should be able to:

 Understand the fundamentals of networks security.


 Demonstrate the different cryptographic operations of symmetric cryptographic
algorithms.
 Develop the different cryptographic operations of public key cryptography.
 Explain the various Authentication schemes to simulate different applications.
 Understand various cyber-crimes and cyber security.

TEXT BOOKS:
1. Forouzan Mukhopadhyay “Cryptography and Network Security” McGraw Hill, 2nd
Edition
2. William Stallings, "Cryptography and Network Security - Principles and Practice",
Seventh Edition, Pearson Education, 2017.
3. Nina Godbole, Sunit Belapure, “Cyber Security: Understanding Cyber-crimes, Computer
Forensics and Legal Perspectives”, First Edition, Wiley India, 2011.

REFERENCES:
1. Behrouz A. Forouzan, DebdeepMukhopadhyay, "Cryptography and Network Security",
3rd Edition, Tata McGraw Hill, 2015.
2. Charles Pfleeger, Shari Pfleeger, Jonathan Margulies, "Security in Computing", Fifth
Edition, Prentice Hall, New Delhi, 2015.

WEB REFERENCES:
 https://www.w3.org/TR/WebCryptoAPI/
 https://ukdiss.com/examples/web-based-crypto-analysis-learning-application.php
 https://developer.mozilla.org/en-US/docs/Web/API/Web_Crypto_API
 https://www.garykessler.net/library/crypto.html
 https://www.cryptomathic.com/news-events/blog/summary-of-cryptographic-algorithms-according-to-nist

CO-PO MAPPINGS:
CO\PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12

CO1 2 2 2 1 - - - - - - 2 2
CO2 1 2 2 1 2 - - - - - 2 2
CO3 2 2 2 2 - - - - - - - 2
CO4 2 2 1 2 - - 1 - - 1 2 1
CO5 3 1 2 2 2 - - - - 1 2 2

You might also like