{"id":2844,"date":"2021-06-20T03:27:14","date_gmt":"2021-06-20T03:27:14","guid":{"rendered":"https:\/\/www.inspirenignite.com\/kl\/5136-information-security-kl-diploma-syllabus-for-computer-hardware-5th-sem-2015-revision-sitttr\/"},"modified":"2021-06-20T03:27:14","modified_gmt":"2021-06-20T03:27:14","slug":"5136-information-security-kl-diploma-syllabus-for-computer-hardware-5th-sem-2015-revision-sitttr","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/kl\/5136-information-security-kl-diploma-syllabus-for-computer-hardware-5th-sem-2015-revision-sitttr\/","title":{"rendered":"5136: Information Security KL Diploma Syllabus for Computer Hardware 5th Sem 2015 Revision SITTTR"},"content":{"rendered":"<p align=\"justify\">Information Security detailed syllabus for Computer Hardware (Computer Hardware) for 2015 revision curriculum has been taken from the <a class=\"rank-math-link\" href=\"http:\/\/www.sitttrkerala.ac.in\/\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">SITTTRs<\/a> official website and presented for the Computer Hardware students. For course code, course name, number of credits for a course and other scheme related information,  do visit full semester subjects post given below. <\/p>\n<p align=\"justify\">For Computer Hardware 5th Sem scheme and its subjects, do visit <a class=\"rank-math-link\" href=\"..\/computer-hardware-computer-hardware-kl-diploma-syllabus-for-5th-sem-2015-revision-sitttr\">Computer Hardware 5th Sem 2015 revision scheme<\/a>. The detailed syllabus of information security is as follows. <\/p>\n<p>  <title>Information Security<\/title><\/p>\n<h4>Course General Outcomes<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.   <\/p>\n<h4>Specific Outcome:<\/h4>\n<p align=\"justify\">\n  MODULE I: Introduction to computer Security &amp; Cryptography<\/p>\n<ol>\n<li>To understand the concept of Computer Security\n<ol type=\"i\">\n<li>Define computer Security.<\/li>\n<li>Explain Computer Security triad: Confidentiality, Integrity, Availability.<\/li>\n<li>Explain the terminologies: Authenticity, accountability.<\/li>\n<li>Explain the Model of Computer Security, Security concepts and relationships.<\/li>\n<li>Differentiate Threats and Attacks &amp; Threats and Assets.<\/li>\n<li>Explain various Security aspects in Communication Lines and Networks.<\/li>\n<li>List security functional requirements.<\/li>\n<li>Explain Security architecture for OSI.<\/li>\n<li>Explain the Scope of Computer and Network Security with block diagram.<\/li>\n<li>Discuss three aspects of computer security strategy.<\/li>\n<\/ol>\n<\/li>\n<li>To Comprehend Cryptographic Tools\n<ol type=\"i\">\n<li>Explain simplified model of symmetric encryption with block diagram.<\/li>\n<li>Explain Symmetric block encryption algorithms.<\/li>\n<li>Explain block and Stream Cipher encryption.<\/li>\n<li>Explain message authentication with symmetric encryption<\/li>\n<li>Describe message authentication without message encryption.<\/li>\n<li>Explain message authentication with message authentication code (MAC) using figure.<\/li>\n<li>Describe message authentication with one way hash functions<\/li>\n<li>Explain Public key cryptography<\/li>\n<li>Explain digital signature, public key certificates and Symmetric key exchange using public key encryption<\/li>\n<li>Explain the use of Random numbers in encryption<\/li>\n<li>Define pseudorandom numbers<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>  MODULE II: User Authentication and Access Control<\/p>\n<ol>\n<li>To understand User Authentication\n<ol type=\"i\">\n<li>Define User Authentication<\/li>\n<li>Explain the means of authentication<\/li>\n<li>Describe Password based Authentication<\/li>\n<li>Explain Password attack strategies and countermeasures<\/li>\n<li>Explain the use of hashed passwords<\/li>\n<li>Explain the password cracking approaches and user password choices<\/li>\n<li>Explain password File access control<\/li>\n<li>Illustrate various password selection strategies<\/li>\n<\/ol>\n<\/li>\n<li>To Understand Various Authentication Methods\n<ol type=\"i\">\n<li>Explain Token based authentication<\/li>\n<li>Explain Biometric Authentication<\/li>\n<li>Explain various physical characteristics used in biometric applications<\/li>\n<li>Explain the operation of a biometric authentication system<\/li>\n<li>Explain the biometric accuracy<\/li>\n<li>Discuss Remote User Authentication<\/li>\n<li>Explain various security issues for user authentication<\/li>\n<\/ol>\n<\/li>\n<li>To understand Access control in computer security\n<ol type=\"i\">\n<li>Discuss Access Control Principles &#8211; Relationship among other security functions<\/li>\n<li>Explain various access control policies<\/li>\n<li>Discuss various access control requirements<\/li>\n<li>Explain the various basic elements of Access control: subject, object and Access right<\/li>\n<li>Illustrate the UNIX File Access Control<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>  MODULE III: Intrusion Detection &amp; Malicious Software<\/p>\n<ol>\n<li>To Know Intrusion and Detection\n<ol type=\"i\">\n<li>List various classes of intruders and the intruder behavior patterns.<\/li>\n<li>Explain the Intrusion Detection System classification and the requirements of IDS.<\/li>\n<li>Explain Host based Intrusion detection<\/li>\n<li>Explain the relevance of audit records, anomaly detection, and signature detection<\/li>\n<li>Explain Distributed host based intrusion detection<\/li>\n<li>Discuss Network based intrusion detection<\/li>\n<li>Discuss Intrusion Detection Exchange Format<\/li>\n<li>Explain the functioning of Honey pots<\/li>\n<li>Explain the functioning of SNORT IDS &#8211; Architecture and rules<\/li>\n<\/ol>\n<\/li>\n<li>To Study about Malicious Software\n<ol type=\"i\">\n<li>Explain various types of Malicious Software<\/li>\n<li>Discuss Viruses &#8211; The nature of viruses, Virus structure, Virus classification<\/li>\n<li>Explain various Antivirus approaches &amp; Antivirus techniques<\/li>\n<li>Describe Study Worms- Worm propagation model, requirements for Worm Countermeasures<\/li>\n<li>Discuss BOT and RCF<\/li>\n<li>Discuss about Constructing the Attack Network<\/li>\n<li>Explain ROOTKIT functions, classifications, installation<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>  MODULE IV: Denial of Service and Firewall<\/p>\n<ol>\n<li>To Understand Denial of Service\n<ol type=\"i\">\n<li>Define a Denial of Service (DoS)<\/li>\n<li>Explain the effect of DoS on Network bandwidth, System resources and Application resources<\/li>\n<li>Explain classic Denial of Service Attacks<\/li>\n<li>Discuss about Source Address Spoofing<\/li>\n<li>Explain the SYN Spoofing<\/li>\n<li>Explain Flooding Attacks- ICMP Flood, UDP Flood, TCP SYN Flood<\/li>\n<li>Explain the Distributed Denial of Service Attacks, and DDoS attack architecture<\/li>\n<li>Discuss the Reflector and Amplifier attacks<\/li>\n<li>Explain defenses against DoS Attacks, and how to respond to DoS Attacks<\/li>\n<\/ol>\n<\/li>\n<li>To Understand Firewall\n<ol type=\"i\">\n<li>List the need for firewall<\/li>\n<li>List various characteristics of a Firewall<\/li>\n<li>Discuss various types of firewalls:<\/li>\n<li>Illustrate Bastion Host, Host based firewalls and Personal firewalls<\/li>\n<li>Explain Internal and external Firewall Configuration<\/li>\n<li>Explain Distributed Firewalls<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<h4>MODULE I : Introduction to Computer Security &amp; Cryptography<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.   <\/p>\n<h4>MODULE II : User Authentication and Access Control<\/h4>\n<p align=\"justify\">\n  User Authentication: means of authentication &#8211; Password based Authentication &#8211; Password attack strategies and countermeasures &#8211; hashed passwords &#8211; password cracking &#8211; user password choices -password File access control &#8211; password selection. Authentication Methods: Token based authentication -Biometric Authentication &#8211; physical characteristics in biometric applications &#8211; operation &#8211; accuracy &#8211; Remote User Authentication &#8211; security issues Access control: Principles &#8211; Relationship among other security functions &#8211; access control policies &#8211; access control requirements &#8211; basic elements of Access control: subject, object and Access right &#8211; UNIX File Access Control\n<\/p>\n<h4>MODULE III : Intrusion Detection &amp; Malicious Software<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.   <\/p>\n<h4>MODULE IV : Denial of Service and Firewall<\/h4>\n<p align=\"justify\">\n  Denial of Service: Definition &#8211; Effect of DoS on Network bandwidth &#8211; System resources &#8211; Application resources -Classic Denial of Service Attacks &#8211; Source Address Spoofing &#8211; SYN Spoofing &#8211; Flooding Attacks &#8211; ICMP Flood &#8211; UDP Flood &#8211; TCP SYN Flood &#8211; Distributed Denial of Service Attacks &#8211; DoS attack architecture &#8211; Reflector and Amplifier attacks &#8211; Defenses against DoS Attacks &#8211; Response to DoS Attacks Firewall: Need &#8211; Characteristics &#8211; Packet filtering &#8211; Stateful inspection &#8211; Application level &#8211; Circuit level gateway &#8211; Bastion Host &#8211; Host based firewalls &#8211; Personal firewalls &#8211; Internal and external Firewall Configuration &#8211; Distributed Firewalls\n<\/p>\n<h4>Text Books:<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.   <\/p>\n<h4>Reference Books:<\/h4>\n<p align=\"justify\">\n<ol>\n<li>Cryptography and Security &#8211; Author: C K Chyamala, N Harini &amp; Dr T R Padmanabhan Publisher: Wiley &#8211; India 2010<\/li>\n<li>Network Security -M.V. Arun Kumar, USP2011 First Edition<\/li>\n<\/ol>\n<p align=\"justify\">For detailed syllabus of all other subjects of Computer Hardware, 2015 revision curriculum do visit <a class=\"rank-math-link\" href=\"..\/category\/computer-hardware+5th-sem\">Computer Hardware 5th Sem subject syllabuses for 2015 revision<\/a>. <\/p>\n<p align=\"justify\">To see the syllabus of all other branches of diploma 2015 revision curriculum do visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/kl\/kerala-diploma-syllabus\/\">all branches of SITTTR diploma 2015 revision<\/a>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information Security detailed syllabus for Computer Hardware (Computer Hardware) for 2015 revision curriculum has been taken from the SITTTRs official website and presented for the Computer Hardware students. For course [&hellip;]<\/p>\n","protected":false},"author":2462,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[36,48],"tags":[],"class_list":["post-2844","post","type-post","status-publish","format-standard","hentry","category-5th-sem","category-computer-hardware"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/posts\/2844","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/users\/2462"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/comments?post=2844"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/posts\/2844\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/media?parent=2844"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/categories?post=2844"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/tags?post=2844"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}