Information & Network Security detailed syllabus for Information Technology (IT) for 2015 revision curriculum has been taken from the SITTTRs official website and presented for the IT students. For course code, course name, number of credits for a course and other scheme related information, do visit full semester subjects post given below.
For Information Technology 6th Sem scheme and its subjects, do visit IT 6th Sem 2015 revision scheme. The detailed syllabus of information & network security is as follows.
COURSE OUTCOMES:
For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier..
Specific Outcomes:
MODULE – I: Introduction to Cryptography
- Understand Computer and Data Security concepts
- Define Confidentiality, Integrity and availability.
- Distinguish between active and passive security attacks
- Explain the different categories of Passive attacks.
- Explain the different types of Active attacks.
- Explain the Network Security Model
- Demonstrate the Model for Network Security
- Explain the Symmetric Cipher Model
- Explain the various substitution technique Caesar Cipher with example
- Explain the various substitution technique Mono-alphabetic Ciphers with example
- Explain the various substitution technique Poly-alphabetic Ciphers with example
- Explain the various substitution technique One-Time Pad
- Compare the Substitution techniques – Caesar Cipher, Mono-alphabetic Ciphers, Poly-alphabetic Ciphers and One-Time Pad
- Simulate the various substitution techniques learned.
- Describe Transposition Techniques
- Define Stegnography
MODULE – II: Symmetric and Asymmetric Ciphers
- Comprehend Symmetric Ciphers
- Define Symmetric Cipher
- Describe the DES method, its encryption and decryption procedures
- Analyze the strength of DES
- Describe the AES method of cryptography – structure and Encryption Decryption methods
- Compare and Judge the performance of DES and AES algorithms
- Comprehend Asymmetric Ciphers
- Define Asymmetric Cipher
- State Fermat’s theorem
- State Euler’s theorem.
- Explain the Public Key cryptosystems
- List the essential steps in Public Key encryption
- Describe the elements of public encryption system
- Compare the symmetric key and public key encryption system.
- Describe the RSA algorithm
MODULE – III: Cryptographic Data Integrity Algorithms
- Understand the Data Integrity algorithms
- Describe the applications of Cryptographic Hash functions
- Describe message authentication
- Explain the logic of SHA 1 algorithm
- Describe the different types of attacks in the context of communications across a network
- Summarize the Message Authentication Requirements
- Summarize Message Authentication Functions
- Describe the basic idea of Message Authentication Code
- Understand the concept of Digital Signatures
- Define Digital Signature
- Explain the properties of Digital Signature
- Identify the Digital Signature Requirements
- Explain the Digital Signature Algorithm
- Describe techniques for the distribution of public keys
- Public announcement
- Publicly available directory
- Public-key authority
- Public-key certificates
- Recognize the importance of X.509 Certificates
- Illustrate the Public-Key Certificate Use with figure
MODULE – IV: Network Security
- Understand the various Network Security concepts
- List the web security considerations
- Explain the SSL architecture
- Define the SSL concepts Connection and Session.
- Write the parameters that defines a session state.
- Write the parameters that defines a Connection state.
- Define HTTPS
- Describe HTTPS
- Describe the importance of HTTPS in web
- Describe SSH Protocol Stack
- Recognize the Wireless LAN security issues
- Write a short description on Wireless LAN Security
- List down the various 802.11i services
- Assess the different IEEE 802.11i Phases of Operation
- Define Wireless Markup Language
- Explain WAP Architecture
- Explain IPsec applications
- Discuss the benefits of IPSec
- List down the IPSec Services
MODULE – I:
For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier..
MODULE – II:
Symmetric and Assymteric Ciphers Symmetric Ciphers: Data Encryption Standard (DES)- DES Encryption, DES Decryption, Strength of DES. AES – General Structure, Detailed Structure, AES Encryption and Decryption. Asymmetric Cyphers: Fermat’s Theorem and Eulers’s Theorem, Public-Key Cryptosystems, RSA Algorithm -Description of the Algorithm.
MODULE – III:
For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier..
MODULE – IV:
Network Security Web Security Considerations, SSL Architecture, HTTPS, SSH Protocol Stack, Wireless LAN Security – IEEE 802.11i Services, IEEE 802.11i Phases of Operation, Wireless Application ProtocolOverview, IP Security overview.
Text Books:
For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier..
Reference Books:
- Network Security: Private Communication in a Public World – Charlie Kaufman, Radia Perlman, Mike Speciner, Prentice Hall Publication, Second Edition.
- Network Security and Cryptography- Bernard L. Menezes, Cengage Learning 2011
- Behrouz A. Frouzan, Cryptography and Network Security, TMH Publication, third edition, 2004
For detailed syllabus of all other subjects of Information Technology, 2015 revision curriculum do visit IT 6th Sem subject syllabuses for 2015 revision.
To see the syllabus of all other branches of diploma 2015 revision curriculum do visit all branches of SITTTR diploma 2015 revision.