This course is aimed at developing an understanding of security aspects related to network & cyber security.
Introduction: Attacks, Services and Mechanism, Model for Internetwork Security, Internet standards and RFCs; Cryptography Basics: Conventional Encryption Principles (Cryptography, Cryptanalysis) & Algorithms : Data Encryption Standard, DES, Cipher Block Modes of Operation (Cipher Block Chaining & Cipher Feedback Mode) and their implementation, Location of Encryption Devices, Key Distribution.
Conventional Encryption Algorithm: Triple DES, AES (With Implementation), Blowfish, International Data Encryption Algorithm (IDEA), RC5, RC2, Placement and Encryption Function, Key Distribution, Random Number generation & its implementation.
Public Key Encryption: Public Key Cryptography: Principles of Public Key Cryptosystems, RSA Algorithm and its Implementation, Key Management, Fermat’s and Euler’s Theorem, Diffie- Hellman Key Exchange Algorithm and its implementation.
Information Security: Components and Critical Characteristics of an Information System, History and Need of Information Security, NSTISSC Security Model, Securing the Components, Balancing Security and Access, The Security SDLC , Business Needs, Threats, Attacks, Legal, Ethical and Professional Issues, Risk Management: Identifying and Assessing Risk, Assessing and Controlling Risk
Cyber Security: Laws, Investigation and Ethics: Cyber Crime, Information Security and Law, Types & overview of Cyber Crimes, Cyber Law Issues in E-Business Management, Overview of Indian IT Act 2000, Copy Right, Patents, Data Privacy and Protection, Domain Name System, Software piracy, Plagiarism, Ethical Hacking and its Issues.