6th Sem, Information Tech Diploma

Information Security and It Laws Information Tech 6th Sem Syllabus for Diploma BTEUP 2017

Information Security and It Laws detail BTEUP Diploma syllabus for Information Technology, effective from 2017 is collected from BTEUP 2017 Syllabus official website and presented for diploma students. The course details such as exam duration, Teaching Hr/week, Practical Hr/week, Total Marks, internal marks, theory marks, duration and credits do visit complete sem subjects post given below. The syllabus PDFs can be downloaded from official website.

For all other information tech 6th sem bteup diploma syllabus 2017 you can visit Information Tech 6th Sem BTEUP Diploma Syllabus 2017 Subjects. The detail syllabus for information security and it laws is as follows.

Rationale:

Diploma holders are required to not only possess subject related knowledge but aslo soft skills to get good jobs and to rise steadily at their workplace. This subject is included to develop employability skills amongst the student.

DETAILED CONTENTS

1. INTRODUCTION AND SECURITY TRENDS :

  1. Need for security, Security basics : Confidentiality, Integraity, Availability, Authentication, Access control.
  2. Threats to security : Viruses and Worms, Intruders, Insiders, Criminal organization, Terrorist, Information warface, Avenues of attack, Steps in Attack.
  3. Types of attack : Active and Passive attacks, Denial of service, backdoors and trapdorrs, sniffing, spoofing, man in the middle, replay, TCP/IP Hacking, Encryption attacks, Malware : Viruses, Logic bombs.

2. ORGANIZATIONAL/ OPERATIONAL SECURITY :

For complete syllabus and results, class timetable and more pls download iStudy Syllabus App. It’s a lightweight, easy to use, no images, no pdfs platform to make students life easier.

3. CRYPTOGRAPHY AND PUBLIC KEY INFRASTRUCTURE :

  1. Introduction : Cryptography, Cryptanalysis, Cryptology, Substitution techniques ; Caesar’s cipher, monoalphabetic and polyalphabetic transposition techniques- Rail fence technique, simple columnar, steganography.
  2. Hashing – Concept
  3. Symmetric and asymmetric cryptography : Introduction symmetric encryption : DES (Data Encryption Standard) algorithm, Diffle-Hellman algorithm, Problem of key distribution, Asymmetric key cryptography : Digital signature, key escrow.
  4. Public key infrastures : Basics, digital certificates, certificate authorities, registration authorities, steps for obtaining a digital certificate, steps for verifying authenticity and integrity of a certificate.
  5. Thust models : Hierarchinal, Peer to peer, hybrid.

4. NETWORK SECURITY :

  1. Firewalls : Concept, design, principles, limitations, trusted system, keyberos- concept.
  2. Security topologies – Security zones, DMZ, Internet, Intranet, VLAN, Security implication, Tunneling.
  3. IP security : Overview, architecture, IPSec, IPSec configuration, IPSec security.
  4. Virtual Private Network.
  5. Email security : Email security standards : Working priciples of SMTP, PEM, PGP, S/MINE, spam.

5. SYSTEM SECURITY :

For complete syllabus and results, class timetable and more pls download iStudy Syllabus App. It’s a lightweight, easy to use, no images, no pdfs platform to make students life easier.

6. APPLICATION AND WEB SECURITY :

  1. Application hardening, applicaito patches, Web servers, Active director.
  2. Web security threats, Web traffic security approaches, Secure socket layer and transport layer security, secure electronic transaction software development : secure code techniques, buffer overflow, code injection, least privilege, good practices, equirements, testing.

7. IT LAWS :

  1. INformation SEcurity Standards – ISO, IT Act, Copyright Act, Patent Law, IPR, Cyber Laws in India. IT Act 200 Provisions.
  2. Intellectural property law : Copy Right Law, Software License, Semiconductor Law and Patent Law.

For complete syllabus and results, class timetable and more pls download iStudy Syllabus App. It’s a lightweight, easy to use, no images, no pdfs platform to make students life easier.

List of Experiments:

  1. Knowledge the security proveided with windows operating system.
  2. Recovery the password of window machines using password recover utility (John the ripper ) or any other utility.
  3. Tracing of email origin using email trace pro utility.
  4. Use of Keylogger and anti-keylogger to secure yours system.
  5. Encrypt and decrypt the message using simple transposition -Permutation (Cryptool)
  6. Encrypt variable and key decrypt the message (Cryptool. using Caesar Cipher With
  7. Encrypt and decrypt the message using 3 X 3 Hill Ciper (Cryptool)
  8. Create Digital Signature document useing (Cryptool)
  9. Send and receive secret message using stenography techniques using steghide.
  10. Recover the data from formatted Pen Drive adn Hard Disk using Power Data Recovery Utility or any other utility.

For detail syllabus of all other subjects of BE Information Tech, effective from 2017 do visit Information Tech 6th Sem BTEUP syllabus for 2017.

Dont forget to download iStudy Syllabus App for latest syllabus and results, class timetable and more.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.