{"id":10784,"date":"2020-08-23T17:04:10","date_gmt":"2020-08-23T17:04:10","guid":{"rendered":"https:\/\/www.inspirenignite.com\/mh\/mca303-information-security-syllabus-for-mca-3rd-sem-2017-pattern-mumbai-university\/"},"modified":"2020-08-23T17:04:10","modified_gmt":"2020-08-23T17:04:10","slug":"mca303-information-security-syllabus-for-mca-3rd-sem-2017-pattern-mumbai-university","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/mh\/mca303-information-security-syllabus-for-mca-3rd-sem-2017-pattern-mumbai-university\/","title":{"rendered":"MCA303: Information Security Syllabus for MCA 3rd Sem 2017 Pattern Mumbai University"},"content":{"rendered":"<p align=\"justify\">Information Security detailed Syllabus Scheme for Master of Computer Applications (MCA), 2017 regulation has been taken from the <a href=\"https:\/\/mu.ac.in\/syllabus\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">University of Mumbai<\/a> official website and presented for the MCA students. For Course Code, Course Title, Test 1, Test 2, Avg, End Sem Exam, Team Work, Practical, Oral, Total, and other information, do visit full semester subjects post given below. <\/p>\n<p align=\"justify\">For all other Mumbai University MCA 3rd Sem Syllabus 2017 Pattern, do visit <a href=\"..\/mumbai-university-mca-3rd-sem-syllabus-2017-pattern\">MCA 3rd Sem 2017 Pattern Scheme<\/a>. The detailed Syllabus Scheme for information security is as follows.<\/p>\n<h2 align=\"center\">MCA303: Information Security Syllabus for MCA 3rd Sem 2017 Pattern Mumbai University<\/h2>\n<p>  <title>Information Security<\/title><\/p>\n<h4>Prerequisites:<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete Syllabus, results, class timetable, and many other features kindly download the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdf platform to make students&#8217;s lives easier.<\/b><br \/><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.  <\/p>\n<h4>Course Educational Objectives (CEO):<\/h4>\n<p align=\"justify\">\nAt the end of the course, the students will be able to<\/p>\n<ol>\n<li>Understand information assurance as practiced in computer operating systems, distributed systems, networks and representative applications.<\/li>\n<li>Study cryptography and key encryption techniques used today.<\/li>\n<li>Comprehend relevant security parameters in the internet, web, database systems and applications<\/li>\n<\/ol>\n<h4>Course Outcomes:<\/h4>\n<p align=\"justify\">\nAt the end of the course, the students will be able to<\/p>\n<ol>\n<li>Understand the requirement of information security and a clear understanding of its importance<\/li>\n<li>Be familiar with information security threats and countermeasures, and familiar with information security designs using available secure solutions<\/li>\n<li>Use the database security mechanisms, intrusion detection systems, formal models of security, cryptography, network ,web security<\/li>\n<\/ol>\n<h4>1. Introduction<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete Syllabus, results, class timetable, and many other features kindly download the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdf platform to make students&#8217;s lives easier.<\/b><br \/><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.  <\/p>\n<h4>2. Cryptography<\/h4>\n<p align=\"justify\">\nPrivate Key Cryptography: Block Encryption, DES Algorithm, Problems with DES, Variations of DES, IDEA Algorithm, Uses of Secret key Cryptography; ECB, CBC, OFB, CFB Public Key Encryption : RSA Symmetric and Asymmetric Key Cryptography together 08<\/p>\n<h4>3. Authentication<\/h4>\n<p align=\"justify\">\nTypes of Authentication- Password-based authentication, address-based authentication, cryptographic authentication, smart cards, biometrics, mutual authentications, reflection attacks, Message Digest : MD5 ,SHA,MAC ,HMAC, Digital Certificate process, KDC-working, multi domain KDC, Kerberos 10<\/p>\n<h4>4. Internet Security<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete Syllabus, results, class timetable, and many other features kindly download the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdf platform to make students&#8217;s lives easier.<\/b><br \/><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.  <\/p>\n<h4>5. Intrusion Prevention andDetection:<\/h4>\n<p align=\"justify\">\nIntroduction, Intrusion Detection Systems , Prevention versus Detection, Types of Intrusion Detection systems, DOS attacks, Flooding Attacks, DdoS Attack Prevention\/Detection, Defenses Against Denial-of-Service Attacks, Malware Detection 06<\/p>\n<h4>6. Database Security<\/h4>\n<p align=\"justify\">\nThe Need for Database Security, Database Access Control, Inference, Statistical Databases , Database Encryption, 05<\/p>\n<h4>7. Firewalls<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete Syllabus, results, class timetable, and many other features kindly download the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdf platform to make students&#8217;s lives easier.<\/b><br \/><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.  <\/p>\n<h4>8. IEEE 802.11 Wireless LAN Security<\/h4>\n<p align=\"justify\">\nBackground, Authentication: Pre- WEP Authentication, Authentication in WEP, Authentication and key agreement in 802.11i, Confidentiality and Integrity: Data protection in WEP, Data protection in TKIP and CCMP 06<\/p>\n<h4>Reference Books:<\/h4>\n<p align=\"justify\">\n<ul>\n<li>AtulKahate, Cryptography and Network Security, McGraw Hill<\/li>\n<li>Network Security sand Cryptography: Bernard Menezes, CENGAGE Learning<\/li>\n<li>Cryptography and Information Security, V. K. Pachghare PHI Learning Pvt. Ltd.<\/li>\n<li>M. Stamp, Information Security: Principles and Practice,2nd Edition, Wiley, ISBN: 0470626399, 2011.<\/li>\n<li>W. Stallings, Computer Security: Principles and Practice,2nd Edition, Prentice Hall, ISBN: 0132775069, 2011.<\/li>\n<li>Kaufman C., Perlman R., and Speciner, Network Security, Private Communication in a public world, 2nd ed., Prentice Hall PTR.,2002<\/li>\n<li>Computer Security, 3rd Edition, Dieter Gollmann, December 2010, Wiley Publications<\/li>\n<\/ul>\n<h4>Assessment:<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete Syllabus, results, class timetable, and many other features kindly download the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdf platform to make students&#8217;s lives easier.<\/b><br \/><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.<\/p>\n<p align=\"justify\">For detail syllabus of all other subjects of Master of Computer Applications (MCA), 2017 regulation do visit <a href=\"..\/category\/mca+3rd-sem\">MCA 3rd Sem Subjects<\/a> syllabus for 2017 regulation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information Security detailed Syllabus Scheme for Master of Computer Applications (MCA), 2017 regulation has been taken from the University of Mumbai official website and presented for the MCA students. For [&hellip;]<\/p>\n","protected":false},"author":2351,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[35,71],"tags":[],"class_list":["post-10784","post","type-post","status-publish","format-standard","hentry","category-3rd-sem","category-mca"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/posts\/10784","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/users\/2351"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/comments?post=10784"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/posts\/10784\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/media?parent=10784"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/categories?post=10784"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/tags?post=10784"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}