In this module, the students will gain conceptual/ theoretical knowledge of the various security- related issues and mechanisms to overcome them. The emphasis is given on basic concepts and direct application of mathematical expressions without analysis
Introduction: Attacks, Services and Mechanism, Model for Internetwork Security, Internet Standards and RFCs; Cryptography Basics: Conventional Encryption Principles (Cryptography, Cryptanalysis) & Algorithms (Data Encryption Standard, Triple DEA, AES), Cipher Block Modes of Operation (Cipher Block Chaining & Cipher Feedback Mode), Location of Encryption Devices, Key Distribution, Viruses and Anti Viruses.
Public Key Cryptography & Message Authentication: Approaches, Secure Hash Functions; Public Key Cryptography Principles, Public Key Algorithms (RSA & Diffie –Hellman Key Exchange); Digital Signatures, Key Management
Web Security: Web Security Threats, Web Traffic Security Approaches, Secure Socket Layer & Transport Layer Security (SSL Architecture, SSL Record Protocol, Handshake Protocol) and Secure Electronic Transactions (SET Overview, Dual Signature, Payment Processing).
Information Security: Definition, History, Need, Characteristics, Threats, Attacks, Introduction to Firewall, Types of Firewall, NSTISSC Security Model, Securing the Components, Balancing Security and Access, introduction to SDLC Security, Risk Management: Identifying and Assessing Risk, Assessing and Controlling Risk.
Cyber Security: Laws, Investigation and Ethics: Cyber Crime, Information Security and Law, Types & overview of Cyber, Crimes, Cyber Law Issues in E-Business Management, Overview of Indian IT Act, Copy Right, Patents, Data Privacy and protection, Domain Name, Software piracy, Plagiarism, Issues in ethical hacking.
1. William Stallings, "Network Security & Cryptology", Prentice Hall of India.
2. Pfleeger & Pfleeger, “Security in Computing”, Pearson Education.
3. Gollmann, Dieter, "Computer Security", Edition 2, John Wiley & Sons.
4. M Krause, H.F. Tipton, "Handbook of Information Security Management", Taylor & Francis Inc.
5. Debby Russell, T. Gangemi, Sr., "Computer Security Basics", O’ Reilly Media Inc.