{"id":1591,"date":"2016-06-20T19:07:28","date_gmt":"2016-06-20T19:07:28","guid":{"rendered":"http:\/\/www.inspirenignite.com\/jntuh\/?p=1591"},"modified":"2021-10-27T20:49:02","modified_gmt":"2021-10-27T20:49:02","slug":"jntuh-b-tech-3rd-year-2-sem-computer-science-and-engineering-r13-3-2-information-security-r13-syllabus","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/jntuh\/jntuh-b-tech-3rd-year-2-sem-computer-science-and-engineering-r13-3-2-information-security-r13-syllabus\/","title":{"rendered":"JNTUH B.Tech 3rd Year 2 sem Computer Science and Engineering R13 (3-2) Information Security R13 syllabus."},"content":{"rendered":"<p>JNTUH B.Tech 3rd year (3-2) Information Security gives you detail information of Information Security R13 syllabus It will be help full to understand you complete curriculum of the year.<\/p>\n<p><strong>Objectives<\/strong><\/p>\n<ul>\n<li>Explain the objectives of information security<\/li>\n<li>Explain the importance and application of each of confidentiality,\u00a0<span style=\"line-height: 1.5\">integrity, authentication and availability<\/span><\/li>\n<li>Understand various cryptographic algorithms.<\/li>\n<li>Understand the basic categories of threats to computers and networks<\/li>\n<li>Describe public-key cryptosystem.<\/li>\n<li>Describe the enhancements made to IPv4 by IPSec<\/li>\n<li>Understand Intrusions and intrusion detection<\/li>\n<li>Discuss the fundamental ideas of public-key cryptography.<\/li>\n<li>Generate and distribute a PGP key pair and use the PGP package to\u00a0send an encrypted e-mail message.<\/li>\n<li>Discuss Web security and Firewalls<\/li>\n<\/ul>\n<p><strong>UNIT -I<\/strong><\/p>\n<ul>\n<li><strong>Attacks on Computers and Computer Security: <\/strong>Introduction, The need \u00a0for security, Security approaches, Principles of security, Types of Security \u00a0attacks, Security services, Security Mechanisms, A model for Network<br \/>\nSecurity<\/li>\n<li><strong>Cryptography: Concepts and Techniques: <\/strong>Introduction, plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography, stenography, key range and key size, possible types of attacks.<\/li>\n<\/ul>\n<p><strong>UNIT &#8211; II<\/strong><\/p>\n<ul>\n<li><strong>Symmetric key Ciphers: <\/strong>Block Cipher principles &amp; Algorithms(DES, AES, Blowfish), Differential and Linear Crypt analysis, Block cipher modes of operation, Stream ciphers, RC4,Location and placement of encryption<br \/>\nfunction, Key distribution<\/li>\n<li><strong>Asymmetric key Ciphers: <\/strong>Principles of public key cryp to systems, Algorithms(RSA, Diffie-Hellman, ECC), Key Distribution.<\/li>\n<\/ul>\n<p><strong>UNIT &#8211; III<\/strong><\/p>\n<ul>\n<li><strong>Message Authentication Algorithms and Hash Functions: <\/strong>Authentication requirements, Functions, Message authentication codes, Hash Functions, Secure hash algorithm, Whirlpool, HMAC, CMAC, Digital signatures, knapsack algorithm<\/li>\n<li><strong>Authentication Applications: <\/strong>Kerberos, X.509\u00a0Authentication Service, Public &#8211; Key Infrastructure, Biometric Authentication.<\/li>\n<\/ul>\n<p><strong>TEXT BOOKS<\/strong><\/p>\n<ul>\n<li>Cryptography and Network Security : William Stallings, Pearson\u00a0Education,4&#8243;&#8216; Edition<\/li>\n<li>Cryptography and Network Security : Atul Kahate, Mc Graw Hill\u00a0Edition<\/li>\n<\/ul>\n<p><strong>REFERENCE BOOKS<\/strong><\/p>\n<ul>\n<li>Cryptography and Network Security: C K Shyamala, N Harin i, Dr T R\u00a0Padmanabhan, Wiley India, <strong>1&#8221; <\/strong>Edition.<\/li>\n<li>Cryptography and Network Security : Forouzan Mukhopadhyay, MC\u00a0Graw Hill, 2&#8243;&#8221; Edition<\/li>\n<li>Information Security, Principles and Practice: Mark Stamp, Wiley India.<\/li>\n<li>Principles of Computer Security: WM.Arthur Conklin, Greg White,\u00a0TMH<\/li>\n<li>Introduction to Network Security: Neal Krawetz, CENGAGE Learning<\/li>\n<li>Network Security and Cryptography: Bernard Menezes, CENGAGE\u00a0Learning<\/li>\n<\/ul>\n<p><strong>Outcomes<\/strong><\/p>\n<ul>\n<li>Student will be able to understand basic cryptographic a algorithms,\u00a0message and web authentication and security issues.<\/li>\n<li>Ability to identify information system requirements for both of them\u00a0such as client and server.<\/li>\n<li>Ability to understand the current legal issues towards inform<span style=\"font-size: 13.3333px;line-height: 20px\">ation\u00a0<\/span>security.<\/li>\n<\/ul>\n<p style=\"text-align: center\"><strong><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #ff0000\">Download iStudy Android App for complete JNTUH syllabus, results, timetables and all other updates. There are no ads and no pdfs and will make your life way easier<\/span>.<\/a><\/strong><\/p>\n<p><strong>For more information about all JNTU updates please stay connected to us on FB and don\u2019t hesitate to ask any questions in the comment.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>JNTUH B.Tech 3rd year (3-2) Information Security gives you detail information of Information Security R13 syllabus It will be help full to understand you complete curriculum of the year. Objectives [&hellip;]<\/p>\n","protected":false},"author":2259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[62,153,122,2],"tags":[],"class_list":["post-1591","post","type-post","status-publish","format-standard","hentry","category-syllabus","category-2nd-sem-2","category-3rd-year","category-cse"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/1591","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/users\/2259"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/comments?post=1591"}],"version-history":[{"count":4,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/1591\/revisions"}],"predecessor-version":[{"id":17312,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/1591\/revisions\/17312"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/media?parent=1591"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/categories?post=1591"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/tags?post=1591"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}