Lecture1 Intro (Part-I)
Lecture1 Intro (Part-I)
Welcome to
Foundation of Information Security
Foundation of Information
Security
Lecture-1
Introduction
• Instructor : Sweta Mishra
• Room No. : 219C, Block-C
• Phone Number: 477 (internal)
• Email : [email protected]
• Web Link : https://cse.snu.edu.in/people/faculty/sweta-mishra
• Research Interests
• Cryptography, Password-based Cryptosystems, Biometric Security, Information
Security, Blockchain Technology…
• Google scholar link: https://scholar.google.co.in/citations?user=nqSP0nIAAAAJ&hl=en
Spring Semester 2025: Timetable
Lecture Time: 2:00 – 3:30 PM (Tuesday & Thursday)
Credits: 3
Contact Hours (L:T:P): 3:0:0
• Relative Grading
• Cryptography Basics: Stream Ciphers and Block Ciphers, Public Key Cryptography,
Hash Functions
Online
- work/ school
- Play games
- Buy goods from merchants
- track activities with sensors on our wrists.
- Connect IoTs
Online
- work/ school
- Play games
- Buy goods from merchants
- track activities with sensors on our wrists.
- Connect IoTs
Poses Major
Access of information on a click!!! Security Risks…
Authorized Access
Database Breach!
Biometric
Authentication
Alternate
approach to
Fingerprint…
Secure?
Liveness
detection – Face
Recognition?
Blink your
Eyes…
Personal Identifying Information!
Many Challenges…
Cryptography
Security
Cryptography
Learning Outcomes
• Recognize threats to Confidentiality, Integrity, and Availability of Information
systems and how security evolves around the CIA principle
• Understand and explain the basic computer security terminologies
• To use the security solutions correctly
• Find and apply documentation of security-related problems and tools
• Think of the countermeasures to identified threats and argue their effectiveness
• Compare different security mechanisms
Information Security
The term ‘information security’ means protecting
information and information systems from
unauthorized access, use, disclosure, disruption,
modification, or destruction in order to provide
confidentiality, integrity and availability
• Considering the
Threats also known as
Disclosure, Alteration,
and Denial (DAD)
• A Model for malicious
user