0% found this document useful (0 votes)
7 views5 pages

D1 Nis

The document outlines the teaching plan for the sixth semester of a Diploma course in Computer Security for the academic year 2024-25 at the Maharashtra State Board of Technical Education. It includes a detailed breakdown of chapters, topics, allocated hours, and teaching methods for various aspects of computer security, such as risk analysis, cryptography, firewalls, and cyber laws. The plan is structured to cover essential security concepts and practices, ensuring comprehensive coverage of the subject matter.

Uploaded by

rutuja.lokhande
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views5 pages

D1 Nis

The document outlines the teaching plan for the sixth semester of a Diploma course in Computer Security for the academic year 2024-25 at the Maharashtra State Board of Technical Education. It includes a detailed breakdown of chapters, topics, allocated hours, and teaching methods for various aspects of computer security, such as risk analysis, cryptography, firewalls, and cyber laws. The plan is structured to cover essential security concepts and practices, ensuring comprehensive coverage of the subject matter.

Uploaded by

rutuja.lokhande
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

D1

ForAICTE Diploma courses WEF-2017-18


Maharashtra State Board of Technical Education
Teaching Plan (TP)
Academic Year:2024-25 Program:CO Course:NIS Course Code:22620

Semester:Sixth Name of the Faculty: Miss.Lokhande R.N

Plan Actual
Chapter Teaching
(From- To-) Execution
No. CO UO Title/Details Method/ Remark
No. of (From- To-)
(Allocated Hrs.) Media
Lectures No. of Lectures
Foundations
of Computer Security: Definition
1A and Need of computer security, Security
Basics: Confidentiality, Integrity, Availability,
Accountability,

1A Non- Repudiation and Reliability.

01 1.2 Risk and Threat Analysis: Assets,


a 1B
(12) Vulnerability
Threats, Risks, Counter
1B
measures
Threat to Security: Viruses, Phases of
1B Viruses,
Types of Virus, Dealing with Viruses
1B Worms, Trojan Horse, Intruders, Insiders.

1C Type of Attacks: Active and Passive attacks,


Denial of Service, DDOS
Backdoors and Trapdoors, Sniffing Spoofing,
Man in
1C
the Middle, Replay, TCP/IP Hacking,
Encryption attacks.
Operating system security: Operating system
1D
updates:
1D HotFix, Patch, Service Pack.
Information, Need and Importance of
1E Information, information classification,
criteria for information classification,
Security, need of security,
1F
Basics principles of information security.

Identification and Authentication: User name


2A
and Password,

Guessing password, Password attacks-


2A Piggybacking, Shoulder surfing, Dumpster
diving.
2B Biometrics: Finger Prints, Hand prints,
Retina, patterns, Voice patterns,
02
b
(06)
Signature
2C
and Writing patterns, Keystrokes

2D Access controls: Definition, Authentication


Mechanism,
principle-Authentication, Authorization,
Audit, Policies: DAC, MAC,RBAC.
2D
3.A Introduction: Plain Text, Cipher Text,

Cryptography, Cryptanalysis, Cryptology,


3B
Encryption, Decryption.

Substitution Techniques: Caesar's cipher,


3C
Modified Caesar's Cipher,
Transposition Techniques:
c 3C Simple Columnar
03 Transposition
(06)
Steganography: Procedure
3D Symmetric and Asymmetric cryptography:
Introduction to Symmetric encryption,

DES (Data encryption Standard) algorithm,


3D Asymmetric key cryptography: Digital
Signature.

4A Firewall Need of Firewall,

4B Types of firewall- Packet Filters


04 Types of firewall- Packet Filters,
4B
(12)
4B Stateful Packet Filters,
Application Gateways,
4B
Circuit
4B
gateways.
Firewall
4B Policies,
limitations, DMZ
Intrusion
4C Detection

Configuration,
4C System
Vulnerability Assessment,
4C Misuse detection, Anomaly Detection,

4D Based IDS,

4D Host-Based IDS, Honeypots


05
5A Kerberos: Working, AS, TGS, SS
(12)
IP Security- Overview, Protocols-
5B
AH, ESP, Modes- transport and Tunnel
5C Email security- SMTP, PEM, PGP.
e Public key infrastructure (PKI):
Introduction,
Certificates, Certificate
5D
authority, Registration
X.509/PKIX certificate format.
Authority,
5E Cyber Crime:
Introduction,
Hacking,
5EDigital
Forgery,
Cyber
Stalking/Harassment,
Cyber Pornography
, Identity Theft and aud
5E
terrorism, Cyber Defamation.
NODUCH
Cyber Laws:
5F
Introduction, need,
Categories: Crime against Individual,
5F
Government, Property.
5F Government, Property.
Compliance standards: Implementing and
Security
5F
Management

Information
5G
System, ISO 27001, ISO 20000,
BS 25999, PCI DSS, ITIL framework, COBIT
5G
framework.

(Name& Signature of Faculty) (Name & Signature of H.O.D) Signature of Principal

You might also like