5th Sem, Computer Hardware

5136: Information Security KL Diploma Syllabus for Computer Hardware 5th Sem 2015 Revision SITTTR

Information Security detailed syllabus for Computer Hardware (Computer Hardware) for 2015 revision curriculum has been taken from the SITTTRs official website and presented for the Computer Hardware students. For course code, course name, number of credits for a course and other scheme related information, do visit full semester subjects post given below.

For Computer Hardware 5th Sem scheme and its subjects, do visit Computer Hardware 5th Sem 2015 revision scheme. The detailed syllabus of information security is as follows.

Information Security

Course General Outcomes

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Specific Outcome:

MODULE I: Introduction to computer Security & Cryptography

  1. To understand the concept of Computer Security
    1. Define computer Security.
    2. Explain Computer Security triad: Confidentiality, Integrity, Availability.
    3. Explain the terminologies: Authenticity, accountability.
    4. Explain the Model of Computer Security, Security concepts and relationships.
    5. Differentiate Threats and Attacks & Threats and Assets.
    6. Explain various Security aspects in Communication Lines and Networks.
    7. List security functional requirements.
    8. Explain Security architecture for OSI.
    9. Explain the Scope of Computer and Network Security with block diagram.
    10. Discuss three aspects of computer security strategy.
  2. To Comprehend Cryptographic Tools
    1. Explain simplified model of symmetric encryption with block diagram.
    2. Explain Symmetric block encryption algorithms.
    3. Explain block and Stream Cipher encryption.
    4. Explain message authentication with symmetric encryption
    5. Describe message authentication without message encryption.
    6. Explain message authentication with message authentication code (MAC) using figure.
    7. Describe message authentication with one way hash functions
    8. Explain Public key cryptography
    9. Explain digital signature, public key certificates and Symmetric key exchange using public key encryption
    10. Explain the use of Random numbers in encryption
    11. Define pseudorandom numbers

MODULE II: User Authentication and Access Control

  1. To understand User Authentication
    1. Define User Authentication
    2. Explain the means of authentication
    3. Describe Password based Authentication
    4. Explain Password attack strategies and countermeasures
    5. Explain the use of hashed passwords
    6. Explain the password cracking approaches and user password choices
    7. Explain password File access control
    8. Illustrate various password selection strategies
  2. To Understand Various Authentication Methods
    1. Explain Token based authentication
    2. Explain Biometric Authentication
    3. Explain various physical characteristics used in biometric applications
    4. Explain the operation of a biometric authentication system
    5. Explain the biometric accuracy
    6. Discuss Remote User Authentication
    7. Explain various security issues for user authentication
  3. To understand Access control in computer security
    1. Discuss Access Control Principles – Relationship among other security functions
    2. Explain various access control policies
    3. Discuss various access control requirements
    4. Explain the various basic elements of Access control: subject, object and Access right
    5. Illustrate the UNIX File Access Control

MODULE III: Intrusion Detection & Malicious Software

  1. To Know Intrusion and Detection
    1. List various classes of intruders and the intruder behavior patterns.
    2. Explain the Intrusion Detection System classification and the requirements of IDS.
    3. Explain Host based Intrusion detection
    4. Explain the relevance of audit records, anomaly detection, and signature detection
    5. Explain Distributed host based intrusion detection
    6. Discuss Network based intrusion detection
    7. Discuss Intrusion Detection Exchange Format
    8. Explain the functioning of Honey pots
    9. Explain the functioning of SNORT IDS – Architecture and rules
  2. To Study about Malicious Software
    1. Explain various types of Malicious Software
    2. Discuss Viruses – The nature of viruses, Virus structure, Virus classification
    3. Explain various Antivirus approaches & Antivirus techniques
    4. Describe Study Worms- Worm propagation model, requirements for Worm Countermeasures
    5. Discuss BOT and RCF
    6. Discuss about Constructing the Attack Network
    7. Explain ROOTKIT functions, classifications, installation

MODULE IV: Denial of Service and Firewall

  1. To Understand Denial of Service
    1. Define a Denial of Service (DoS)
    2. Explain the effect of DoS on Network bandwidth, System resources and Application resources
    3. Explain classic Denial of Service Attacks
    4. Discuss about Source Address Spoofing
    5. Explain the SYN Spoofing
    6. Explain Flooding Attacks- ICMP Flood, UDP Flood, TCP SYN Flood
    7. Explain the Distributed Denial of Service Attacks, and DDoS attack architecture
    8. Discuss the Reflector and Amplifier attacks
    9. Explain defenses against DoS Attacks, and how to respond to DoS Attacks
  2. To Understand Firewall
    1. List the need for firewall
    2. List various characteristics of a Firewall
    3. Discuss various types of firewalls:
    4. Illustrate Bastion Host, Host based firewalls and Personal firewalls
    5. Explain Internal and external Firewall Configuration
    6. Explain Distributed Firewalls

MODULE I : Introduction to Computer Security & Cryptography

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

MODULE II : User Authentication and Access Control

User Authentication: means of authentication – Password based Authentication – Password attack strategies and countermeasures – hashed passwords – password cracking – user password choices -password File access control – password selection. Authentication Methods: Token based authentication -Biometric Authentication – physical characteristics in biometric applications – operation – accuracy – Remote User Authentication – security issues Access control: Principles – Relationship among other security functions – access control policies – access control requirements – basic elements of Access control: subject, object and Access right – UNIX File Access Control

MODULE III : Intrusion Detection & Malicious Software

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

MODULE IV : Denial of Service and Firewall

Denial of Service: Definition – Effect of DoS on Network bandwidth – System resources – Application resources -Classic Denial of Service Attacks – Source Address Spoofing – SYN Spoofing – Flooding Attacks – ICMP Flood – UDP Flood – TCP SYN Flood – Distributed Denial of Service Attacks – DoS attack architecture – Reflector and Amplifier attacks – Defenses against DoS Attacks – Response to DoS Attacks Firewall: Need – Characteristics – Packet filtering – Stateful inspection – Application level – Circuit level gateway – Bastion Host – Host based firewalls – Personal firewalls – Internal and external Firewall Configuration – Distributed Firewalls

Text Books:

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Reference Books:

  1. Cryptography and Security – Author: C K Chyamala, N Harini & Dr T R Padmanabhan Publisher: Wiley – India 2010
  2. Network Security -M.V. Arun Kumar, USP2011 First Edition

For detailed syllabus of all other subjects of Computer Hardware, 2015 revision curriculum do visit Computer Hardware 5th Sem subject syllabuses for 2015 revision.

To see the syllabus of all other branches of diploma 2015 revision curriculum do visit all branches of SITTTR diploma 2015 revision.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.