INFORMATION SECURITY AND CRYPTOGRAPHY

Paper Code: 
BCA 602
Credits: 
04
Periods/week: 
04
Max. Marks: 
100.00
Objective: 

In this module, the students will gain conceptual/ theoretical knowledge of the various security- related issues and mechanisms to overcome them. The emphasis is given on basic concepts and direct application of mathematical expressions without analysis

12.00
Unit I: 

Introduction: Attacks, Services and Mechanism, Model for Internetwork Security, Internet Standards and RFCs; Cryptography Basics: Conventional Encryption Principles (Cryptography, Cryptanalysis) & Algorithms (Data Encryption Standard, Triple DEA, AES), Cipher Block Modes of Operation (Cipher Block Chaining & Cipher Feedback Mode), Location of Encryption Devices, Key Distribution, Viruses and Anti Viruses.

 

12.00
Unit II: 

Public Key Cryptography & Message Authentication: Approaches, Secure Hash Functions; Public Key Cryptography Principles, Public Key Algorithms (RSA & Diffie –Hellman Key Exchange); Digital Signatures, Key Management

12.00
Unit III: 

Web Security: Web Security Threats, Web Traffic Security Approaches, Secure Socket Layer & Transport Layer Security (SSL Architecture, SSL Record Protocol, Handshake Protocol) and Secure Electronic Transactions (SET Overview, Dual Signature, Payment Processing).

 

12.00
Unit IV: 

Information Security: Definition, History, Need, Characteristics, Threats, Attacks, Introduction to Firewall, Types of Firewall, NSTISSC Security Model, Securing the Components, Balancing Security and Access, introduction to SDLC Security, Risk Management: Identifying and Assessing Risk, Assessing and Controlling Risk.

 

Unit V: 

Cyber Security: Laws, Investigation and Ethics: Cyber Crime, Information Security and Law, Types & overview of Cyber, Crimes, Cyber Law Issues in E-Business Management, Overview of Indian IT Act, Copy Right, Patents, Data Privacy and protection, Domain Name, Software piracy, Plagiarism, Issues in ethical hacking.

 

ESSENTIAL READINGS: 
  1. William Stallings, "Network Security Essentials: Applications and Standards", Prentice Hall of India.
  2. V. K. Pachghare, “Cryptography and Information Security”, PHI Learning Pvt. Ltd., 2009
REFERENCES: 

1. William Stallings, "Network Security & Cryptology", Prentice Hall of India.
2. Pfleeger & Pfleeger, “Security in Computing”, Pearson Education.
3. Gollmann, Dieter, "Computer Security", Edition 2, John Wiley & Sons.
4. M Krause, H.F. Tipton, "Handbook of Information Security Management", Taylor & Francis Inc.
5. Debby Russell, T. Gangemi, Sr., "Computer Security Basics", O’ Reilly Media Inc.

 

Academic Year: