3rd Sem, MCA

MCA303: Information Security Syllabus for MCA 3rd Sem 2017 Pattern Mumbai University

Information Security detailed Syllabus Scheme for Master of Computer Applications (MCA), 2017 regulation has been taken from the University of Mumbai official website and presented for the MCA students. For Course Code, Course Title, Test 1, Test 2, Avg, End Sem Exam, Team Work, Practical, Oral, Total, and other information, do visit full semester subjects post given below.

For all other Mumbai University MCA 3rd Sem Syllabus 2017 Pattern, do visit MCA 3rd Sem 2017 Pattern Scheme. The detailed Syllabus Scheme for information security is as follows.

MCA303: Information Security Syllabus for MCA 3rd Sem 2017 Pattern Mumbai University

Information Security

Prerequisites:

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdf platform to make students’s lives easier.
Get it on Google Play.

Course Educational Objectives (CEO):

At the end of the course, the students will be able to

  1. Understand information assurance as practiced in computer operating systems, distributed systems, networks and representative applications.
  2. Study cryptography and key encryption techniques used today.
  3. Comprehend relevant security parameters in the internet, web, database systems and applications

Course Outcomes:

At the end of the course, the students will be able to

  1. Understand the requirement of information security and a clear understanding of its importance
  2. Be familiar with information security threats and countermeasures, and familiar with information security designs using available secure solutions
  3. Use the database security mechanisms, intrusion detection systems, formal models of security, cryptography, network ,web security

1. Introduction

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdf platform to make students’s lives easier.
Get it on Google Play.

2. Cryptography

Private Key Cryptography: Block Encryption, DES Algorithm, Problems with DES, Variations of DES, IDEA Algorithm, Uses of Secret key Cryptography; ECB, CBC, OFB, CFB Public Key Encryption : RSA Symmetric and Asymmetric Key Cryptography together 08

3. Authentication

Types of Authentication- Password-based authentication, address-based authentication, cryptographic authentication, smart cards, biometrics, mutual authentications, reflection attacks, Message Digest : MD5 ,SHA,MAC ,HMAC, Digital Certificate process, KDC-working, multi domain KDC, Kerberos 10

4. Internet Security

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdf platform to make students’s lives easier.
Get it on Google Play.

5. Intrusion Prevention andDetection:

Introduction, Intrusion Detection Systems , Prevention versus Detection, Types of Intrusion Detection systems, DOS attacks, Flooding Attacks, DdoS Attack Prevention/Detection, Defenses Against Denial-of-Service Attacks, Malware Detection 06

6. Database Security

The Need for Database Security, Database Access Control, Inference, Statistical Databases , Database Encryption, 05

7. Firewalls

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdf platform to make students’s lives easier.
Get it on Google Play.

8. IEEE 802.11 Wireless LAN Security

Background, Authentication: Pre- WEP Authentication, Authentication in WEP, Authentication and key agreement in 802.11i, Confidentiality and Integrity: Data protection in WEP, Data protection in TKIP and CCMP 06

Reference Books:

  • AtulKahate, Cryptography and Network Security, McGraw Hill
  • Network Security sand Cryptography: Bernard Menezes, CENGAGE Learning
  • Cryptography and Information Security, V. K. Pachghare PHI Learning Pvt. Ltd.
  • M. Stamp, Information Security: Principles and Practice,2nd Edition, Wiley, ISBN: 0470626399, 2011.
  • W. Stallings, Computer Security: Principles and Practice,2nd Edition, Prentice Hall, ISBN: 0132775069, 2011.
  • Kaufman C., Perlman R., and Speciner, Network Security, Private Communication in a public world, 2nd ed., Prentice Hall PTR.,2002
  • Computer Security, 3rd Edition, Dieter Gollmann, December 2010, Wiley Publications

Assessment:

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdf platform to make students’s lives easier.
Get it on Google Play.

For detail syllabus of all other subjects of Master of Computer Applications (MCA), 2017 regulation do visit MCA 3rd Sem Subjects syllabus for 2017 regulation.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.