{"id":29152,"date":"2025-04-14T14:44:09","date_gmt":"2025-04-14T09:14:09","guid":{"rendered":"https:\/\/www.inspirenignite.com\/mh\/314319-information-security-syllabus-for-information-technology-4th-sem-k-scheme-msbte-pdf\/"},"modified":"2025-04-14T14:44:09","modified_gmt":"2025-04-14T09:14:09","slug":"314319-information-security-syllabus-for-information-technology-4th-sem-k-scheme-msbte-pdf","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/mh\/314319-information-security-syllabus-for-information-technology-4th-sem-k-scheme-msbte-pdf\/","title":{"rendered":"314319: Information Security Syllabus for Information Technology 4th Sem K Scheme MSBTE PDF"},"content":{"rendered":"<p align=\"justify\">Information Security detailed Syllabus for Information Technology (IF), K scheme PDF has been taken from the <a href=\"https:\/\/econtent.msbte.edu.in\/curriculum_search\/\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">MSBTE<\/a> official website and presented for the diploma students. For Subject Code, Subject Name, Lectures, Tutorial, Practical\/Drawing, Credits, Theory (Max &amp; Min) Marks, Practical (Max &amp; Min) Marks, Total Marks, and other information, do visit full semester subjects post given below. <\/p>\n<p align=\"justify\">For all other MSBTE Information Technology 4th Sem K Scheme Syllabus PDF, do visit <a href=\"..\/msbte-information-technology-4th-sem-k-scheme-syllabus-pdf\/\">MSBTE Information Technology 4th Sem K Scheme Syllabus PDF Subjects<\/a>. The detailed Syllabus for information security is as follows.<\/p>\n<p><h4>Rationale<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete Syllabus, results, class timetable, and many other features kindly download the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\/\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.<\/p>\n<p><h4>Course Outcomes:<\/h4>\n<p>Students will be able to achieve &amp; demonstrate the following COs on completion of course based learning<\/p>\n<ol>\n<li>Identify types of attacks which causes threat to Information Security.<\/li>\n<li>Apply multi-factor user authentication and access control mechanisms on file, folder, device and applications.<\/li>\n<li>Apply basic encryption \/ decryption techniques for a given text.<\/li>\n<li>Apply various encryption algorithms used for information security.<\/li>\n<li>Implement security techniques to prevent internet threats.<\/li>\n<\/ol>\n<p><h4>Unit I<\/h4>\n<p>Introduction to Information Security 1.1\tInformation Security Overview: Introduction to information, need of information security 1.2\tInformation classification, Criteria for information classification 1.3\tBasic principles of information security: Confidentiality, Authentication, Integrity, Availability, Access Controls, Repudiation 1.4\tType of Attacks: Active and Passive attacks, Denial of Service, DDOS, Backdoors and Trapdoors, Sniffing, phishing, Spoofing, Man in the Middle, Replay, TCP\/IP Hacking, Encryption attacks, Social Engineering 1.5\tTypes of Malwares and their impact on security and prevention: &#8211; Virus, Worms, Trojan horse, Spyware, Adware, Ransomware, Logic Bombs, Rootkits, Backdoors, Keyloggers 1.6\tThreat and Risk Analysis: Introduction to assets, vulnerability, threats, risks, relation between: threat, vulnerability, risks\n<\/p>\n<p><i>Suggested Learning Pedagogie<\/i><br \/>\nLecture Using Chalk-Board Presentations Video Demonstratio\n<\/p>\n<p><h4>Unit II<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete Syllabus, results, class timetable, and many other features kindly download the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\/\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.<\/p>\n<p><h4>Unit III<\/h4>\n<p>Fundamentals of Cryptography 3.1\tIntroduction : Plain text, Cipher text, Cryptography, Cryptanalysis, Cryptology, Encryption, Decryption 3.2\tSymmetric and Asymmetric cryptography : Introduction, working, key management, asymmetric cryptography -public key distribution 3.3\tSubstitution techniques : Caesar cipher, Playfair cipher, Vigenere cipher, Vernam cipher (One-time pad) 3.4\tTransposition techniques : Rail fence technique , Simple columnar technique 3.5\tSteganography : Introduction and working of steganography\n<\/p>\n<p><i>Suggested Learning Pedagogie<\/i><br \/>\nLecture Using Chalk-Board Presentations Video Demonstratio\n<\/p>\n<p><h4>Unit IV<\/h4>\n<p>Encryption Algorithms 4.1\tDES (Data Encryption Standard) algorithm 4.2\tAES (Advanced Encryption Standard) algorithm 4.3\tRSA algorithm 4.4\tDiffie-Hellman key exchange algorithm, Man-in-middle attack 4.5\tHash Function : Introduction, Features of Hash Functions, MD5 and SHA algorithm 4.6\tDigital Signature : Introduction and working of digital signature 4.7\tThreats to mobile phone and its security measures\n<\/p>\n<p><i>Suggested Learning Pedagogie<\/i><br \/>\nLecture Using Chalk-Board Presentations Video Demonstratio Flipped Class\n<\/p>\n<p><h4>Unit V<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete Syllabus, results, class timetable, and many other features kindly download the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\/\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.<\/p>\n<p><h4>List of Experiments:<\/h4>\n<ol>\n<li>*i. Install and configure Antivirus software on system (Licensed copy) ii. Use privacy and security settings on operating system\t2\tC<\/li>\n<li>*i.Set up single level authentication for computer system ii.Recover the password of computer system using any freeware password recovery tool (Example- John the ripper) 2\tC<\/li>\n<li>*i.Grant security to file, folder or application using access permissions and verify it ii.Grant access permission while sharing file and folder\t2\tC<\/li>\n<li>Write a utility using C\/Shell programming to create strong password authentication (Password should be more than 8 characters, and combination of digits, letters and special characters #, %, &amp;, @) 2\tC<\/li>\n<li>*i.Write a C program to implement caesar cipher technique to perform encryption and decryption of text ii.Apply Caesar cipher technique to perform encryption and decryption of text using any open-source tool (Example &#8211; Cryptool) 2\tC<\/li>\n<li>Implement Vernam cipher encryption technique to perform encryption of text using C programming language ii.Apply Vernam cipher technique to perform encryption and decryption of text using any open-source tool (Example &#8211; Cryptool) 2\tC<\/li>\n<li>* Implement rail fence encryption technique to perform encryption of text using C programming language\t2\tC<\/li>\n<li>Implement simple Columnar Transposition encryption technique to perform encryption of text using C programming language\t2\tC<\/li>\n<li>Create and verify Hash Code for given message using any Open-source tool. (Example-Cryptool) 2\tC<\/li>\n<li>i\t.Write a C program to implement Diffie-Hellman key exchange algorithm to perform encryption of text ii\t.Use Diffie-Hellman key exchange algorithm to perform encryption and decryption of text using any open-source tool (Example &#8211; Cryptool) 2\tC<\/li>\n<p>LLO 11.1 Implement steganography. <\/p>\n<li>* Use Steganography to encode and decode the message using any open-source tool (Example-OpenStego) 2\tC<\/li>\n<li>* Create and verify digital signature using any Opensource tool (Example-Cryptool) 2\tC<\/li>\n<li>* Configure firewall settings on any operating system\t2\tC<\/li>\n<li>Send a test mail securely using any open-source tool (Example- Pretty Good Privacy with GnuPG) 2\tC<\/li>\n<li>Set up security policies for any web browser and Email account (Example: setting filter, spam for email security. Low security apps settings, cookies, synchronization for web browser)) 2\tC C<\/li>\n<\/ol>\n<p><h4>Self Learning<\/h4>\n<\/p>\n<p><i>Micro Project<\/i><\/p>\n<ul>\n<li>User A wants to send message to user B securely on network.<\/li>\n<ol type=\"a\">\n<li>Select any two techniques to encrypt message.<\/li>\n<li>Implement both the techniques.<\/li>\n<li>Evaluate result of implementation.<\/li>\n<li>Compare complexity of both techniques.<\/li>\n<li>Prepare report.<\/li>\n<\/ol>\n<li>Prepare admin level report of company who wants to implement allocate fixed system to each employee for authentic access to maintain security.<\/li>\n<ol type=\"a\">\n<li>Explain various single level authentication method available to access the system.<\/li>\n<li>Analyse the weakness and security threats to this problem.<\/li>\n<li>Suggest multi factor authentication for given problem situation.<\/li>\n<li>Compare impact of single and multi-factor authentication on given situation.<\/li>\n<\/ol>\n<li>A bank has more than 1000 user accounts. Around 100 users received message regarding deduction of speci amount without intimation and after that all authorized user are not able to access online banking service of tha i. Identify type of crime and attack.<\/li>\n<ol type=\"a\">\n<li>Write procedure to investigate that crime.<\/li>\n<li>Write preventive measure to avoid such type of attack in future.<\/li>\n<li>Write punishment of such type of attacks and state cyber law act.<\/li>\n<li>Write a report.<\/li>\n<\/ol>\n<li>Case study on Cyber Crime in Social Engineering in India.<\/li>\n<ol type=\"a\">\n<li>Explain various Social Engineering attacks.<\/li>\n<li>Select topic for case study.<\/li>\n<li>Write problem statement of attack.<\/li>\n<li>Write procedure to investigate that attack.<\/li>\n<li>Write a report.<\/li>\n<\/ol>\n<li>Teacher shall allocate any other microproject relevant to COs.<\/li>\n<\/ul>\n<p><i>Assignment<\/i><\/p>\n<ul>\n<li>Teacher shall give assignments covering all COs.<\/li>\n<\/ul>\n<p><i>Other<\/i><\/p>\n<ul>\n<li>Complete any one course related to Information Security and Cyber Crime on Infosys Springboard , Virtual NPTEL.<\/li>\n<\/ul>\n<p><h4>Laboratory Equipment<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete Syllabus, results, class timetable, and many other features kindly download the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\/\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.<\/p>\n<p><h4>Learning Materials<\/h4>\n<ol>\n<li>Mark Merkow, Jim Breithaupt\tInformation Security Principles and Practices\tPearson. ISBN 978-81-317-1288-7<\/li>\n<li>V. K. Pachghare\tCryptography and Information Security\tPrentice Hall India ISBN:978-81-203-50<\/li>\n<li>Atul Kahate\tCryptography and Network security Third Edition\tMcGraw-Hill; Fourth edition ISBN-13: 9 9353163303<\/li>\n<li>William Stallings, Lawrie Brown\tComputer Security Principles and Practice, Third Edition\tPearson. ISBN-13: 978-0-13-377392-7<\/li>\n<li>Nina Godbole\tInformation Systems Security Second Edition\tJohn Wiley ISBN-13: 978-8126564057<\/li>\n<li>Harish Chander\tCyber Laws and IT Protection Second Edition\tPHI Publication , ISBN : 9789391818463 eBook ISBN : 9789391818517<\/li>\n<\/ol>\n<p><h4>Learning Websites<\/h4>\n<ol>\n<li>https:\/\/www.youtube.com\/watch?v=NlpnJE0m-NU\tSimulation of Intrusion Detection Sy in MANET using NetSim<\/li>\n<li>https:\/\/archive.nptel.ac.in\/courses\/106\/106\/106106129\/\tNPTEL course on Introduction to Information Security<\/li>\n<li>https:\/\/onlinecourses.swayam2.ac.in\/cec22_cs15\/preview\tSwayam course on Information Technology<\/li>\n<li>https:\/\/www.youtube.com\/watch?v=T9c5ZpT2FV0\tFirewall configuration<\/li>\n<li>https:\/\/cse29-iiith.vlabs.ac.in\/List%20of%20experiments.html\tVirtual lab for cryptography<\/li>\n<\/li>\n<\/ol>\n<p align=\"justify\">For detail Syllabus of all other subjects of Information Technology, K scheme do visit <a href=\"..\/category\/msbte\/if\/\">Information Technology 4th Sem Syllabus for K scheme<\/a>.<\/p>\n<p align=\"justify\">For all Information Technology results, visit <a href=\"https:\/\/www.inspirenignite.com\/mh\/msbte-results\/\">MSBTE Information Technology all semester results<\/a> direct links.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information Security detailed Syllabus for Information Technology (IF), K scheme PDF has been taken from the MSBTE official website and presented for the diploma students. For Subject Code, Subject Name, [&hellip;]<\/p>\n","protected":false},"author":2351,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[118,154],"tags":[],"class_list":["post-29152","post","type-post","status-publish","format-standard","hentry","category-4th-sem-msbte","category-if-msbte"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/posts\/29152","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/users\/2351"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/comments?post=29152"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/posts\/29152\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/media?parent=29152"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/categories?post=29152"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/tags?post=29152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}