5th Sem, Information Tech Diploma

Information Security and It Laws Information Tech 5th Sem BTEUP Syllabus 2019-2020

Information Security and It Laws detail BTEUP syllabus for Information Technology, effective from 2019-2020, is collected from BTEUP 2017 Syllabus official website and presented for diploma students. PDF download is possible from official site but you can download the istudy mobile app for syllabus on mobile. The course details such as exam duration, Teaching Hr/week, Practical Hr/week, Total Marks, internal marks, theory marks, duration and credits do visit complete sem subjects post given below. The syllabus PDFs can be downloaded from official website.

For all other bteup syllabus 5th sem information tech 2019-2020 you can visit BTEUP Syllabus 5th Sem Information Tech 2019-2020 Subjects. The detail syllabus for information security and it laws is as follows.

Rationale:

Contents of this course provide understanding of Information Security & theirs measures. Content of this course will enable students to use techniques like Cryptography, VPNs, IDS etc. and IT Laws in the field of Information Technology.

Learning Outcomes:

After undergoing this course, the students will be able to:

  • Understand the need for security, Security principles related to Information Management.
  • Understand the various computer related attacks.
  • Apply different types of cryptography techniques to encrypt/decrypt data or information.
  • Understand the network security measures and the concept of VPNs.
  • Understand concept of IDS, Operating system security and web security
  • Understand the IT Laws and latest amendments applicable in India as well as Intellectual property laws

1. INTRODUCTION AND SECURITY TRENDS : (06 Periods)

For complete syllabus and results, class timetable and more pls download iStudy Syllabus App. It’s a lightweight, easy to use, no images, no pdfs platform to make students life easier.

2. ORGANIZATIONAL/ OPERATIONAL SECURITY : (07 Periods)

  1. Role of people in security : Password selection, Piggybacking, Shoulder surfing, Dumpster diving, Installing unauthorized software/hardware, Access by non-employees,Security awareness, Individual users responsibilities.
  2. Physical security : Access controls Biometrics : Fingerprints, hand prints, retina, patterns, voice patterns, signature and writing patterns, keystrokes and physical barriers.
  3. Network security basics, model for network security.

3. CRYPTOGRAPHY AND PUBLIC KEY INFRASTRUCTURE :(13 Periods)

  1. Introduction: Cryptography, Cryptanalysis, Cryptology, Substitution techniques; Caesar’s cipher, monoalphabetic and polyalphabetic transposition techniques- Rail fencetechnique, simple columnar, steganography.
  2. Hashing – Concept
  3. Symmetric and asymmetric cryptography : Introduction Symmetric encryption: DES (Data Encryption Standard) algorithm, Diffle-Hellman algorithm, Problem of key distribution, Asymmetric key cryptography Digital signature, key escrow.
  4. Public key encryption : Basics, digital certificates, certificate authorities, registration authorities, steps for obtaining a digital certificate, steps for verifying authenticity and integrity of a certificate.

4. NETWORK SECURITY : (08 Periods)

For complete syllabus and results, class timetable and more pls download iStudy Syllabus App. It’s a lightweight, easy to use, no images, no pdfs platform to make students life easier.

5. SYSTEM SECURITY : (08 Periods)

  1. Intruders, Intrusion detection system (IDS), Host Based IDS, Network based IDS.
  2. Password Management, Vulnerability of password, Password selection strategies, Components of good password.
  3. Operating system security : Operating system hardening, General steps for securing windows operating system, Hardening UNIX/LINUX based operating system, Updates : Hot Fix, Patch, Service pack.

6. APPLICATION AND WEB SECURITY : (06 Periods)

  1. Application hardening, application patches, Web servers, Active director.
  2. Web security threats, Web traffic security approaches, Secure socket layer and transport layer security, secure electronic transaction software development : secure codetechniques, buffer overflow, code injection, least privilege, good practices, Testing.

7. IT LAWS : (08 Periods)

For complete syllabus and results, class timetable and more pls download iStudy Syllabus App. It’s a lightweight, easy to use, no images, no pdfs platform to make students life easier.

List of Experiments:

  1. Knowledge the security provided with windows operating system.
  2. Recovery the password of window machines using password recover utility (John the ripper ) or any other utility.
  3. Tracing of email origin using email trace pro utility.
  4. Use of Keylogger and anti-keylogger to secure yours system.
  5. Encrypt and decrypt the message using simple transposition – Permutation (Cryptool)
  6. Encrypt and decrypt the message using Caesar Cipher With variable key (Cryptool)
  7. Encrypt and decrypt the message using 3 X 3 Hill Ciper (Cryptool)
  8. Create Digital Signature document using (Cryptool)
  9. Send and receive secret message using stenography techniques using steghide.
  10. Recover the data from formatted Pen Drive and Hard Disk using Power DataRecovery Utility or any other utility.

Instructional Strategy:

The content of this course is to be taught on conceptual basis with real world examples. Since this subject is practice oriented, the teacher should demonstrate the capabilities of websites/Webpages to students while doing practical exercises for information security. The students should be made familiar with preventive measures for information and computer security.

Means of Assessment:

  1. Assignments and quiz/class tests, mid-term and end-term written tests
  2. Actual laboratory and practical work, exercises and viva-voce
  3. Software installation, operation, development and viva-voce

Text Books:

  1. Information Security Handbook by Darren Death ,Packt Publishing
  2. Principles of Information Security by Whitman , Cengage Publisher
  3. Cyber Security by Nina Godbole, Wiley Publisher
  4. Introduction to Information Security And Cyber Laws by Dr. Surya Prakash Tripathi
  5. Information Systems Security: Security Management, Metrics, Frameworks and Best Practices by Nina Godbole, Wiley Publisher
  6. Cryptography and Network Security – Principles and Practice by Stallings William, Pearson Education Publisher. Cyber Law & Cyber Crimes Simplified ,by Cyber Infomedia Publisher
  7. Information Technology Act, 2000 Along with Rules & Regulations by Universal Law Publishing e-books/e-tools/relevant software to be used as recommended by AICTE/UPBTE/NITTTR, Chandigarh.

Reference Books:

  1. http://swayam. gov.in
  2. http://spoken-tutorial.org

For detail syllabus of all other subjects of BE Information Tech, effective from 2019-2020 do visit Information Tech 5th Sem BTEUP syllabus for 2019-2020.

Dont forget to download iStudy Syllabus App for latest syllabus and results, class timetable and more.

1 Comment

  1. Twinkal kumari

    It laws all chapters notes

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.