{"id":2016,"date":"2016-07-08T20:04:47","date_gmt":"2016-07-08T20:04:47","guid":{"rendered":"http:\/\/www.inspirenignite.com\/jntuh\/?p=2016"},"modified":"2019-07-13T20:40:33","modified_gmt":"2019-07-13T20:40:33","slug":"jntuh-b-tech-4th-year-1-sem-information-technology-r13-4-1-information-security-r13-syllabus","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/jntuh\/jntuh-b-tech-4th-year-1-sem-information-technology-r13-4-1-information-security-r13-syllabus\/","title":{"rendered":"JNTUH B.Tech 4th Year 1 sem Information Technology  R13 (4-1) Information Security R13 syllabus."},"content":{"rendered":"<p style=\"text-align: justify\">JNTUH B.Tech 4th year (4-1) Information Security gives you detail information of Information Security R13 syllabus It will be help full to understand you complete curriculum of the year.<\/p>\n<p style=\"text-align: justify\"><strong>Objectives<\/strong><\/p>\n<ul style=\"text-align: justify\">\n<li>Explain the objectives of information security<\/li>\n<li>Explain the importance and application of each of confidentiality, integrity, authentication and availability<\/li>\n<li>Understand various cryptographic algorithms.<\/li>\n<li>Understand the basic categories of threats to computers and networks<\/li>\n<li>Describe public-key cryptosystem.<\/li>\n<li>Describe the enhancements made to lPv4 by IPSec<\/li>\n<li>Understand Intrusions and intrusion detection<\/li>\n<li>Discuss the fundamental ideas of public-key cryptography.<\/li>\n<li>Generate and distribute a PGP key pair and use the PGP package to send an encrypted e-mail message.<\/li>\n<li>Discuss Web security and Firewalls<\/li>\n<\/ul>\n<p style=\"text-align: justify\">UNIT\u2014I<\/p>\n<p style=\"text-align: justify\">Attacks on Computers and Computer Security: Introduction, The need for security, Security approaches, Principles of security, Types of Security attacks, Security services, Security Mechanisms, A model for Network Security Cryptography: Concepts and Techniques: Introduction, plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography, stenography, key range and key size, possible types of attacks.<\/p>\n<p style=\"text-align: justify\">UNIT\u2014II<\/p>\n<p style=\"text-align: justify\">Symmetric key Ciphers: Block Cipher principles &amp; Algorithms(DES, AES,Blowfish), Differential and Linear Cryptanalysis, Block cipher modes of operation, Stream ciphers, RC4,Location and placement of encryption function, Key distribution Asymmetric key Ciphers: Principles of public key cryptosystems1 Algorithms(RSA, Diffie-Hellman,ECC), Key Distribution<\/p>\n<p style=\"text-align: justify\">UNIT\u2014III<\/p>\n<p style=\"text-align: justify\">Message Authentication Algorithms and Hash Functions: Authentication requirements, Functions, Message authentication codes, Hash Functions, Secure hash algorithm, Whirlpool, HMAC, CMAC, Digital signatures, knapsack algorithm Authentication Applications: Kerberos, X.509 Authentication Service, Public \u2014 Key Infrastructure, Biometric Authentication.<\/p>\n<p style=\"text-align: center\"><strong><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #ff0000\">Download iStudy Android App for complete JNTUH syllabus, results, timetables and all other updates. There are no ads and no pdfs and will make your life way easier<\/span>.<\/a><\/strong><\/p>\n<p style=\"text-align: justify\"><strong>TEXT BOOKS<\/strong><\/p>\n<ul style=\"text-align: justify\">\n<li>Cryptography and Network Security : William Stallings, Pearson Education,4t\u201d Edition.<\/li>\n<li>Cryptography and Network Security : Atul Kahate, Mc Graw Hill, 2nd Edition.<\/li>\n<\/ul>\n<p style=\"text-align: justify\"><strong>REFERENCE BOOKS<\/strong><\/p>\n<ul style=\"text-align: justify\">\n<li>Cryptography and Network Security: C K Shyamala, N Harini, Dr T R Padmanabhan, Wiley India, 1\u2019 Edition.<\/li>\n<li>Cryptography and Network Security: Forouzan Mukhopadhyay, Mc Graw Hill, 2 Edition.<\/li>\n<li>Information Security, Principles and Practice: Mark Stamp, Wiley India.<\/li>\n<li>Principles of Computer Sceurity: WM.Arthur Conklin, Greg White, TMH.<\/li>\n<li>Introduction to Network Security: Neal Krawetz, CENGAGE Learning.<\/li>\n<li>Network Security and Cryptography: Bernard Menezes, CENGAGE Learning.<\/li>\n<\/ul>\n<p style=\"text-align: justify\"><strong>Outcomes<\/strong><\/p>\n<p style=\"text-align: justify\">Student will be able to understand basic cryptographic algorithms, message and web authentication and security issues.<\/p>\n<ul style=\"text-align: justify\">\n<li>Ability to identify information system requirements for both of them such as client and server.<\/li>\n<li>Ability to understand the current legal issues towards information security.<\/li>\n<\/ul>\n<p style=\"text-align: justify\">For more information about all JNTU updates please stay connected to us on FB and don\u2019t hesitate to ask any questions in the comment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>JNTUH B.Tech 4th year (4-1) Information Security gives you detail information of Information Security R13 syllabus It will be help full to understand you complete curriculum of the year. Objectives [&hellip;]<\/p>\n","protected":false},"author":2259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[62],"tags":[],"class_list":["post-2016","post","type-post","status-publish","format-standard","hentry","category-syllabus"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/2016","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/users\/2259"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/comments?post=2016"}],"version-history":[{"count":3,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/2016\/revisions"}],"predecessor-version":[{"id":17417,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/2016\/revisions\/17417"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/media?parent=2016"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/categories?post=2016"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/tags?post=2016"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}