CF

5283A: Data and Application Security Syllabus for Cyber Forensics & Information Security 5th Sem 2021 Revision SITTTR (Professional Elective-I)

Data and Application Security detailed syllabus for Cyber Forensics & Information Security (CF) for 2021 revision curriculum has been taken from the SITTTRs official website and presented for the Cyber Forensics & Information Security (CF) students. For course code, course name, number of credits for a course and other scheme related information, do visit full semester subjects post given below.

For Cyber Forensics & Information Security 5th Sem scheme and its subjects, do visit Cyber Forensics & Information Security (CF) 5th Sem 2021 regulation scheme. For Professional Elective-I scheme and its subjects refer to Cyber Forensics & Information Security (CF) Professional Elective-I syllabus scheme. The detailed syllabus of data and application security is as follows.

Course Objectives:

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Course Outcomes:

On completion of the course, the student will be able to:

  1. Understand symmetric cryptographic systems and cryptology through cryptography techniques and algorithms.
  2. Understand asymmetric cryptographic systems and cryptology through cryptography techniques and algorithms.
  3. Explain the hash function as an application of cryptography with the concept of message integrity and digital signature authentication.
  4. Describe various security threats to web applications/ servers and providing security to web servers.

Module 1:

Introduction: History of Cryptography. Mathematical background: Probability theory -Information theory – Complexity theory, Number theory. Symmetric (Private) Key Cryptographic Systems: Caesar – Affine – Monoalphabetic Substitution – Transposition – Homophonic substitution – Vignere – Beaufort and DES Family –
Product cip hers – Lucifer and DES.

Module 2:

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Module 4:

Web application security- Key Problem factors – Core defense mechanisms-Handling user access- handling user input- Handling attackers – web spidering – Discovering hidden content. Transmitting data via the client – Hidden form fields – HTTP cookies – URL parameters – Handling client-side data securely – Attacking authentication – design flaws in authentication mechanisms -securing authentication Attacking access controls – Common vulnerabilities – Securing access controls

Text Books:

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

  1. Cryptography and Network Security: Principles and Practice, Global Edition, 7/E, William Stallings, Pearson
  2. Padmanabhan T R, Shyamala C and Harini N, “Cryptography and Security”, Wiley Publications 2011.
  3. DafyddStuttard, Marcus Pinto, The Web Application Hacker’s Handbook, 2nd Edition, Wiley Publishing, Inc.

Online Resources

  1. https://www.tutorialspoint.com

For detailed syllabus of all other subjects of Cyber Forensics & Information Security, 2021 revision curriculum do visit Cyber Forensics & Information Security (CF) 5th Sem subject syllabuses for 2021 revision.

To see the syllabus of all other branches of diploma 2021 revision curriculum do visit SITTTR diploma all branches syllabus..

To see the results of Cyber Forensics & Information Security of diploma 2021 revision curriculum do visit SITTTR diploma results..

For all Cyber Forensics & Information Security academic calendars, visit Cyber Forensics & Information Security all semesters academic calendar direct link.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.