4th Sem, IH

314319: Information Security Syllabus for Computer Science & Information Technology 4th Sem K Scheme MSBTE PDF

Information Security detailed Syllabus for Computer Science & Information Technology (IH), K scheme PDF has been taken from the MSBTE official website and presented for the diploma students. For Subject Code, Subject Name, Lectures, Tutorial, Practical/Drawing, Credits, Theory (Max & Min) Marks, Practical (Max & Min) Marks, Total Marks, and other information, do visit full semester subjects post given below.

For all other MSBTE Computer Science & Information Technology 4th Sem K Scheme Syllabus PDF, do visit MSBTE Computer Science & Information Technology 4th Sem K Scheme Syllabus PDF Subjects. The detailed Syllabus for information security is as follows.

Rationale

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Course Outcomes:

Students will be able to achieve & demonstrate the following COs on completion of course based learning

  1. Identify types of attacks which causes threat to Information Security.
  2. Apply multi-factor user authentication and access control mechanisms on file, folder, device and applications.
  3. Apply basic encryption / decryption techniques for a given text.
  4. Apply various encryption algorithms used for information security.
  5. Implement security techniques to prevent internet threats.

Unit I

Introduction to Information Security 1.1 Information Security Overview: Introduction to information, need of information security 1.2 Information classification, Criteria for information classification 1.3 Basic principles of information security: Confidentiality, Authentication, Integrity, Availability, Access Controls, Repudiation 1.4 Type of Attacks: Active and Passive attacks, Denial of Service, DDOS, Backdoors and Trapdoors, Sniffing, phishing, Spoofing, Man in the Middle, Replay, TCP/IP Hacking, Encryption attacks, Social Engineering 1.5 Types of Malwares and their impact on security and prevention: – Virus, Worms, Trojan horse, Spyware, Adware, Ransomware, Logic Bombs, Rootkits, Backdoors, Keyloggers 1.6 Threat and Risk Analysis: Introduction to assets, vulnerability, threats, risks, relation between: threat, vulnerability, risks

Suggested Learning Pedagogie
Lecture Using Chalk-Board Presentations Video Demonstratio

Unit II

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Unit III

Fundamentals of Cryptography 3.1 Introduction : Plain text, Cipher text, Cryptography, Cryptanalysis, Cryptology, Encryption, Decryption 3.2 Symmetric and Asymmetric cryptography : Introduction, working, key management, asymmetric cryptography -public key distribution 3.3 Substitution techniques : Caesar cipher, Playfair cipher, Vigenere cipher, Vernam cipher (One-time pad) 3.4 Transposition techniques : Rail fence technique , Simple columnar technique 3.5 Steganography : Introduction and working of steganography

Suggested Learning Pedagogie
Lecture Using Chalk-Board Presentations Video Demonstratio

Unit IV

Encryption Algorithms 4.1 DES (Data Encryption Standard) algorithm 4.2 AES (Advanced Encryption Standard) algorithm 4.3 RSA algorithm 4.4 Diffie-Hellman key exchange algorithm, Man-in-middle attack 4.5 Hash Function : Introduction, Features of Hash Functions, MD5 and SHA algorithm 4.6 Digital Signature : Introduction and working of digital signature 4.7 Threats to mobile phone and its security measures

Suggested Learning Pedagogie
Lecture Using Chalk-Board Presentations Video Demonstratio Flipped Class

Unit V

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

List of Experiments:

  1. *i. Install and configure Antivirus software on system (Licensed copy) ii. Use privacy and security settings on operating system 2 C
  2. *i.Set up single level authentication for computer system ii.Recover the password of computer system using any freeware password recovery tool (Example- John the ripper) 2 C
  3. *i.Grant security to file, folder or application using access permissions and verify it ii.Grant access permission while sharing file and folder 2 C
  4. Write a utility using C/Shell programming to create strong password authentication (Password should be more than 8 characters, and combination of digits, letters and special characters #, %, &, @) 2 C
  5. *i.Write a C program to implement caesar cipher technique to perform encryption and decryption of text ii.Apply Caesar cipher technique to perform encryption and decryption of text using any open-source tool (Example – Cryptool) 2 C
  6. i.Implement Vernam cipher encryption technique to perform encryption of text using C programming language ii.Apply Vernam cipher technique to perform encryption and decryption of text using any open-source tool (Example – Cryptool) 2 C
  7. * Implement rail fence encryption technique to perform encryption of text using C programming language 2 C
  8. Implement simple Columnar Transposition encryption technique to perform encryption of text using C programming language 2 C
  9. Create and verify Hash Code for given message using any Open-source tool. (Example-Cryptool) 2 C
  10. i .Write a C program to implement Diffie-Hellman key exchange algorithm to perform encryption of text ii .Use Diffie-Hellman key exchange algorithm to perform encryption and decryption of text using any open-source tool (Example – Cryptool) 2 C
  11. * Use Steganography to encode and decode the message using any open-source tool (Example-OpenStego) 2 C
  12. * Create and verify digital signature using any Opensource tool (Example-Cryptool) 2 C
  13. * Configure firewall settings on any operating system 2 C
  14. Send a test mail securely using any open-source tool (Example- Pretty Good Privacy with GnuPG) 2 C
  15. Set up security policies for any web browser and Email account (Example: setting filter, spam for email security. Low security apps settings, cookies, synchronization for web browser)) 2 C C

Self Learning

Micro Project

  • User A wants to send message to user B securely on network.
    1. Select any two techniques to encrypt message.
    2. Implement both the techniques.
    3. Evaluate result of implementation.
    4. Compare complexity of both techniques.
    5. Prepare report.
  • Prepare admin level report of company who wants to implement allocate fixed system to each employee for authentic access to maintain security.
    1. Explain various single level authentication method available to access the system.
    2. Analyse the weakness and security threats to this problem.
    3. Suggest multi factor authentication for given problem situation.
    4. Compare impact of single and multi-factor authentication on given situation.
  • A bank has more than 1000 user accounts. Around 100 users received message regarding deduction of speci amount without intimation and after that all authorized user are not able to access online banking service of tha
    1. Identify type of crime and attack.
    2. Write procedure to investigate that crime.
    3. Write preventive measure to avoid such type of attack in future.
    4. Write punishment of such type of attacks and state cyber law act.
    5. Write a report.
  • Case study on Cyber Crime in Social Engineering in India.
    1. Explain various Social Engineering attacks.
    2. Select topic for case study.
    3. Write problem statement of attack.
    4. Write procedure to investigate that attack.
    5. Write a report.
  • Teacher shall allocate any other microproject relevant to COs.

Assignment

  • Teacher shall give assignments covering all COs.

Other

  • Complete any one course related to Information Security and Cyber Crime on Infosys Springboard , Virtual NPTEL.

Laboratory Equipment

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Learning Materials / Books

  1. Mark Merkow, Jim Breithaupt Information Security Principles and Practices Pearson. ISBN 978-81-317-1288-7
  2. V. K. Pachghare Cryptography and Information Security Prentice Hall India ISBN:978-81-203-50
  3. Atul Kahate Cryptography and Network security Third Edition McGraw-Hill; Fourth edition ISBN-13: 9 9353163303
  4. William Stallings, Lawrie Brown Computer Security Principles and Practice, Third Edition Pearson. ISBN-13: 978-0-13-377392-7
  5. Nina Godbole Information Systems Security Second Edition John Wiley ISBN-13: 978-8126564057
  6. Harish Chander Cyber Laws and IT Protection Second Edition PHI Publication , ISBN : 9789391818463 eBook ISBN : 9789391818517

Learning Websites & Portals

  1. https://www.youtube.com/watch?v=NlpnJE0m-NU Simulation of Intrusion Detection Sy in MANET using NetSim
  2. https://archive.nptel.ac.in/courses/106/106/106106129/ NPTEL course on Introduction to Information Security
  3. https://onlinecourses.swayam2.ac.in/cec22_cs15/preview Swayam course on Information Technology
  4. https://www.youtube.com/watch?v=T9c5ZpT2FV0 Firewall configuration
  5. https://cse29-iiith.vlabs.ac.in/List%20of%20experiments.html Virtual lab for cryptography

For detail Syllabus of all other subjects of Computer Science & Information Technology, K scheme do visit Computer Science & Information Technology 4th Sem Syllabus for K scheme.

For all Computer Science & Information Technology results, visit MSBTE Computer Science & Information Technology all semester results direct links.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.