6th Sem, IT

6262: Information & Network Security KL Diploma Syllabus for IT 6th Sem 2015 Revision SITTTR

Information & Network Security detailed syllabus for Information Technology (IT) for 2015 revision curriculum has been taken from the SITTTRs official website and presented for the IT students. For course code, course name, number of credits for a course and other scheme related information, do visit full semester subjects post given below.

For Information Technology 6th Sem scheme and its subjects, do visit IT 6th Sem 2015 revision scheme. The detailed syllabus of information & network security is as follows.

Information & Network Security

COURSE OUTCOMES:

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Specific Outcomes:

MODULE – I: Introduction to Cryptography

  1. Understand Computer and Data Security concepts
    1. Define Confidentiality, Integrity and availability.
    2. Distinguish between active and passive security attacks
    3. Explain the different categories of Passive attacks.
    4. Explain the different types of Active attacks.
    5. Explain the Network Security Model
    6. Demonstrate the Model for Network Security
    7. Explain the Symmetric Cipher Model
    8. Explain the various substitution technique Caesar Cipher with example
    9. Explain the various substitution technique Mono-alphabetic Ciphers with example
    10. Explain the various substitution technique Poly-alphabetic Ciphers with example
    11. Explain the various substitution technique One-Time Pad
    12. Compare the Substitution techniques – Caesar Cipher, Mono-alphabetic Ciphers, Poly-alphabetic Ciphers and One-Time Pad
    13. Simulate the various substitution techniques learned.
    14. Describe Transposition Techniques
    15. Define Stegnography

MODULE – II: Symmetric and Asymmetric Ciphers

  1. Comprehend Symmetric Ciphers
    1. Define Symmetric Cipher
    2. Describe the DES method, its encryption and decryption procedures
    3. Analyze the strength of DES
    4. Describe the AES method of cryptography – structure and Encryption Decryption methods
    5. Compare and Judge the performance of DES and AES algorithms
  2. Comprehend Asymmetric Ciphers
    1. Define Asymmetric Cipher
    2. State Fermat’s theorem
    3. State Euler’s theorem.
    4. Explain the Public Key cryptosystems
    5. List the essential steps in Public Key encryption
    6. Describe the elements of public encryption system
    7. Compare the symmetric key and public key encryption system.
    8. Describe the RSA algorithm

MODULE – III: Cryptographic Data Integrity Algorithms

  1. Understand the Data Integrity algorithms
    1. Describe the applications of Cryptographic Hash functions
    2. Describe message authentication
    3. Explain the logic of SHA 1 algorithm
    4. Describe the different types of attacks in the context of communications across a network
    5. Summarize the Message Authentication Requirements
    6. Summarize Message Authentication Functions
    7. Describe the basic idea of Message Authentication Code
  2. Understand the concept of Digital Signatures
    1. Define Digital Signature
    2. Explain the properties of Digital Signature
    3. Identify the Digital Signature Requirements
    4. Explain the Digital Signature Algorithm
    5. Describe techniques for the distribution of public keys
      1. Public announcement
      2. Publicly available directory
      3. Public-key authority
      4. Public-key certificates
    6. Recognize the importance of X.509 Certificates
    7. Illustrate the Public-Key Certificate Use with figure

MODULE – IV: Network Security

  1. Understand the various Network Security concepts
    1. List the web security considerations
    2. Explain the SSL architecture
    3. Define the SSL concepts Connection and Session.
    4. Write the parameters that defines a session state.
    5. Write the parameters that defines a Connection state.
    6. Define HTTPS
    7. Describe HTTPS
    8. Describe the importance of HTTPS in web
    9. Describe SSH Protocol Stack
  2. Recognize the Wireless LAN security issues
    1. Write a short description on Wireless LAN Security
    2. List down the various 802.11i services
    3. Assess the different IEEE 802.11i Phases of Operation
    4. Define Wireless Markup Language
    5. Explain WAP Architecture
    6. Explain IPsec applications
    7. Discuss the benefits of IPSec
    8. List down the IPSec Services

MODULE – I:

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

MODULE – II:

Symmetric and Assymteric Ciphers Symmetric Ciphers: Data Encryption Standard (DES)- DES Encryption, DES Decryption, Strength of DES. AES – General Structure, Detailed Structure, AES Encryption and Decryption. Asymmetric Cyphers: Fermat’s Theorem and Eulers’s Theorem, Public-Key Cryptosystems, RSA Algorithm -Description of the Algorithm.

MODULE – III:

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

MODULE – IV:

Network Security Web Security Considerations, SSL Architecture, HTTPS, SSH Protocol Stack, Wireless LAN Security – IEEE 802.11i Services, IEEE 802.11i Phases of Operation, Wireless Application ProtocolOverview, IP Security overview.

Text Books:

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Reference Books:

  1. Network Security: Private Communication in a Public World – Charlie Kaufman, Radia Perlman, Mike Speciner, Prentice Hall Publication, Second Edition.
  2. Network Security and Cryptography- Bernard L. Menezes, Cengage Learning 2011
  3. Behrouz A. Frouzan, Cryptography and Network Security, TMH Publication, third edition, 2004

For detailed syllabus of all other subjects of Information Technology, 2015 revision curriculum do visit IT 6th Sem subject syllabuses for 2015 revision.

To see the syllabus of all other branches of diploma 2015 revision curriculum do visit all branches of SITTTR diploma 2015 revision.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.