{"id":12840,"date":"2020-03-09T02:02:33","date_gmt":"2020-03-09T02:02:33","guid":{"rendered":"https:\/\/www.inspirenignite.com\/up\/information-security-and-it-laws-information-tech-5th-sem-bteup-syllabus-2019-2020\/"},"modified":"2020-03-09T02:02:33","modified_gmt":"2020-03-09T02:02:33","slug":"information-security-and-it-laws-information-tech-5th-sem-bteup-syllabus-2019-2020","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/up\/information-security-and-it-laws-information-tech-5th-sem-bteup-syllabus-2019-2020\/","title":{"rendered":"Information Security and It Laws Information Tech 5th Sem BTEUP Syllabus 2019-2020"},"content":{"rendered":"<p>Information Security and It Laws detail BTEUP syllabus for Information Technology, effective from 2019-2020,  is collected from <a href=\"http:\/\/bteup.ac.in\/webapp\/SYLLABUS.aspx?type=6\" rel=\"nofollow noopener\" target=\"_blank\">BTEUP 2017 Syllabus<\/a> official website and presented for diploma students. PDF download is possible from official site but you can download the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" rel=\"nofollow noopener\" target=\"_blank\">istudy mobile app<\/a> for syllabus on mobile. The course details such as exam duration, Teaching Hr\/week, Practical Hr\/week, Total Marks, internal marks, theory marks, duration and credits do visit complete sem subjects post given below. The syllabus PDFs can be downloaded from official website.<\/p>\n<p>For all other bteup syllabus 5th sem information tech 2019-2020 you can visit <a href=\"..\/bteup-syllabus-5th-sem-information-tech-2019-2020\">BTEUP Syllabus 5th Sem Information Tech 2019-2020 Subjects<\/a>. The detail syllabus for information security and it laws is as follows.<\/p>\n<p><h4>Rationale:<\/h4>\n<p>Contents of this course provide understanding of Information Security &amp; theirs measures. Content of this course will enable students to use techniques like Cryptography, VPNs, IDS etc. and IT Laws in the field of Information Technology.\n<\/p>\n<p><h4>Learning Outcomes:<\/h4>\n<p>After undergoing this course, the students will be able to:<\/p>\n<ul>\n<li>Understand the need for security, Security principles related to Information Management.<\/li>\n<li>Understand the various computer related attacks.<\/li>\n<li>Apply different types of cryptography techniques to encrypt\/decrypt data or information.<\/li>\n<li>Understand the network security measures and the concept of VPNs.<\/li>\n<li>Understand concept of IDS, Operating system security and web security<\/li>\n<li>Understand the IT Laws and latest amendments applicable in India as well as Intellectual property laws<\/li>\n<\/ul>\n<p><h4>1.\tINTRODUCTION AND SECURITY TRENDS :\t(06 Periods)<\/h4>\n<p><b>For complete syllabus and results, class timetable and more pls <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" rel=\"nofollow noopener\" target=\"_blank\">download iStudy Syllabus App<\/a>.<\/b> It&#8217;s a lightweight, easy to use, no images, no pdfs platform to make students life easier.<\/p>\n<p><h4>2.\tORGANIZATIONAL\/ OPERATIONAL SECURITY :\t(07 Periods)<\/h4>\n<ol>\n<li>Role of people in security : Password selection, Piggybacking, Shoulder surfing, Dumpster diving, Installing unauthorized software\/hardware, Access by non-employees,Security awareness, Individual users responsibilities.<\/li>\n<li>Physical security : Access controls Biometrics : Fingerprints, hand prints, retina, patterns, voice patterns, signature and writing patterns, keystrokes and physical barriers.<\/li>\n<li>Network security basics, model for network security.<\/li>\n<\/ol>\n<p><h4>3.\tCRYPTOGRAPHY AND PUBLIC KEY INFRASTRUCTURE :(13 Periods)<\/h4>\n<ol>\n<li>Introduction: Cryptography, Cryptanalysis, Cryptology, Substitution techniques; Caesar&#8217;s cipher, monoalphabetic and polyalphabetic transposition techniques- Rail fencetechnique, simple columnar, steganography.<\/li>\n<li>Hashing &#8211; Concept<\/li>\n<li>Symmetric and asymmetric cryptography : Introduction Symmetric encryption: DES (Data Encryption Standard) algorithm, Diffle-Hellman algorithm, Problem of key distribution, Asymmetric key cryptography Digital signature, key escrow.<\/li>\n<li>Public key encryption : Basics, digital certificates, certificate authorities, registration authorities, steps for obtaining a digital certificate, steps for verifying authenticity and integrity of a certificate.<\/li>\n<\/ol>\n<p><h4>4.\tNETWORK SECURITY : (08 Periods)<\/h4>\n<p><b>For complete syllabus and results, class timetable and more pls <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" rel=\"nofollow noopener\" target=\"_blank\">download iStudy Syllabus App<\/a>.<\/b> It&#8217;s a lightweight, easy to use, no images, no pdfs platform to make students life easier.<\/p>\n<p><h4>5.\tSYSTEM SECURITY :\t(08 Periods)<\/h4>\n<ol>\n<li>Intruders, Intrusion detection system (IDS), Host Based IDS, Network based IDS.<\/li>\n<li>Password Management, Vulnerability of password, Password selection strategies, Components of good password.<\/li>\n<li>Operating system security : Operating system hardening, General steps for securing windows operating system, Hardening UNIX\/LINUX based operating system, Updates : Hot Fix, Patch, Service pack.<\/li>\n<\/ol>\n<p><h4>6.\tAPPLICATION AND WEB SECURITY :\t(06 Periods)<\/h4>\n<ol>\n<li>Application hardening, application patches, Web servers, Active director.<\/li>\n<li>Web security threats, Web traffic security approaches, Secure socket layer and transport layer security, secure electronic transaction software development : secure codetechniques, buffer overflow, code injection, least privilege, good practices, Testing.<\/li>\n<\/ol>\n<p><h4>7.\tIT LAWS :\t(08 Periods)<\/h4>\n<p><b>For complete syllabus and results, class timetable and more pls <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" rel=\"nofollow noopener\" target=\"_blank\">download iStudy Syllabus App<\/a>.<\/b> It&#8217;s a lightweight, easy to use, no images, no pdfs platform to make students life easier.<\/p>\n<p><h4>List of Experiments:<\/h4>\n<ol>\n<li>Knowledge the security provided with windows operating system.<\/li>\n<li>Recovery the password of window machines using password recover utility (John the ripper ) or any other utility.<\/li>\n<li>Tracing of email origin using email trace pro utility.<\/li>\n<li>Use of Keylogger and anti-keylogger to secure yours system.<\/li>\n<li>Encrypt and decrypt the message using simple transposition &#8211; Permutation (Cryptool)<\/li>\n<li>Encrypt and decrypt the message using Caesar Cipher With variable key (Cryptool)<\/li>\n<li>Encrypt and decrypt the message using 3 X 3 Hill Ciper (Cryptool)<\/li>\n<li>Create Digital Signature document using (Cryptool)<\/li>\n<li>Send and receive secret message using stenography techniques using steghide.<\/li>\n<li>Recover the data from formatted Pen Drive and Hard Disk using Power DataRecovery Utility or any other utility.<\/li>\n<\/ol>\n<p><h4>Instructional Strategy:<\/h4>\n<p>The content of this course is to be taught on conceptual basis with real world examples. Since this subject is practice oriented, the teacher should demonstrate the capabilities of websites\/Webpages to students while doing practical exercises for information security. The students should be made familiar with preventive measures for information and computer security.\n<\/p>\n<p><h4>Means of Assessment:<\/h4>\n<ol>\n<li>Assignments and quiz\/class tests, mid-term and end-term written tests<\/li>\n<li>Actual laboratory and practical work, exercises and viva-voce<\/li>\n<li>Software installation, operation, development and viva-voce<\/li>\n<\/ol>\n<p><h4>Text Books:<\/h4>\n<ol>\n<li>Information Security Handbook by Darren Death ,Packt Publishing<\/li>\n<li>Principles of Information Security by Whitman , Cengage Publisher<\/li>\n<li>Cyber Security by Nina Godbole, Wiley Publisher<\/li>\n<li>Introduction to Information Security And Cyber Laws by Dr. Surya Prakash Tripathi<\/li>\n<li>Information Systems Security: Security Management, Metrics, Frameworks and Best Practices by Nina Godbole, Wiley Publisher<\/li>\n<li>Cryptography and Network Security &#8211; Principles and Practice by Stallings William, Pearson Education Publisher. Cyber Law &amp; Cyber Crimes Simplified ,by Cyber Infomedia Publisher<\/li>\n<li>Information Technology Act, 2000 Along with Rules &amp; Regulations by Universal Law Publishing e-books\/e-tools\/relevant software to be used as recommended by AICTE\/UPBTE\/NITTTR, Chandigarh.<\/li>\n<\/ol>\n<p><h4>Reference Books:<\/h4>\n<ol>\n<li>http:\/\/swayam. gov.in<\/li>\n<li>http:\/\/spoken-tutorial.org<\/li>\n<\/ol>\n<p>For detail syllabus of all other subjects of BE Information Tech, effective from 2019-2020  do visit <a href=\"..\/category\/information-tech-diploma+5th-sem\">Information Tech 5th Sem BTEUP syllabus for 2019-2020<\/a>.<\/p>\n<p>Dont forget to <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" rel=\"nofollow noopener\" target=\"_blank\">download iStudy Syllabus App<\/a> for latest syllabus and results, class timetable and more.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information Security and It Laws detail BTEUP syllabus for Information Technology, effective from 2019-2020, is collected from BTEUP 2017 Syllabus official website and presented for diploma students. PDF download is [&hellip;]<\/p>\n","protected":false},"author":2300,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[40,93],"tags":[],"class_list":["post-12840","post","type-post","status-publish","format-standard","hentry","category-5th-sem","category-information-tech-diploma"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/up\/wp-json\/wp\/v2\/posts\/12840","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/up\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/up\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/up\/wp-json\/wp\/v2\/users\/2300"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/up\/wp-json\/wp\/v2\/comments?post=12840"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/up\/wp-json\/wp\/v2\/posts\/12840\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/up\/wp-json\/wp\/v2\/media?parent=12840"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/up\/wp-json\/wp\/v2\/categories?post=12840"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/up\/wp-json\/wp\/v2\/tags?post=12840"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}