Вы находитесь на странице: 1из 3

Course Code: Introduction to Cyber Security L T P C

Version No. XXX Date of Approval: 3 0 0 3


Prerequisite/Exposure Cryptographic Fundamentals
Co-requisites

Course Objectives
1. To learn the concepts of number theory, cryptographic techniques.
2. To understand integrity and authentication process.
3. To familiarize various cyber threats, attacks, vulnerabilities and defensive
mechanisms.
4. To know about security policies and practices.

Course Outcomes
At the end of the course, student will be able to
1. Know the fundamental mathematical concepts related to security.
2. Understand and implement the cryptographic techniques and know the real time
applications of various cryptographic techniques.
3. Comprehend the authenticated process and integrity, and its implementation.
4. Know fundamentals of cybercrimes and the cyber offenses.
5. Understand the cyber threats, attacks and vulnerabilities and its defensive
mechanism.
6. Design suitable security policies.

Course Description:
This course provides knowledge on the various cyber threats and attacks. To learn
the cyber security policies and crime laws.

Text Books:
1. Cryptography and Network security, William Stallings, Pearson Education, 7th Edition,
2016.
2. Cyber Security, Understanding cyber crimes, computer forensics and legal perspectives,
Nina Godbole, Sunit Belapure, Wiley Publications, Reprint 2016.
3. Writing Information Security Policies, Scott Barman, New Riders Publications, 2002.

Reference Books:
1. Cybersecurity for Dummies, Brian Underdahl, Wiley, 2011
2. Cryptography and Network security, Behrouz A. Forouzan , Debdeep Mukhopadhyay,
Mcgraw Hill Education, 2 nd Edition, 2011.

Course Content
Unit I: Introduction 9 lecture hours
Finite Fields and Number Theory: Modular arithmetic – Euclidian Algorithm – Primality
Testing – Fermat’s and Euler’s theorem –Chinese Reminder theorem – Discrete Logarithms

Unit II: Cryptographic Techniques 9 lecture hours


Symmetric key cryptographic techniques: Introduction to Stream cipher – Block cipher:
DES – AES- IDEA. Asymmetric key cryptographic techniques: principles – RSA – ElGamal -
Elliptic Curve cryptography – Key distribution and Key exchange protocols.

Unit III: Authentication and Cybercrimes 9 lecture hours


Hash functions – Secure Hash Algorithm (SHA) Message Authentication – Message
Authentication Code (MAC) – Digital Signature Algorithm: RSA & ElGamal based
Classification of cybercrimes – planning of attacks – social engineering: Human based –
Computer based – Cyberstalking – Cybercafe and Cybercrimes

Unit IV: Cyber Threats, Attacks and Prevention: 9 lecture hours


Phishing – Password cracking – Keyloggers and Spywares – DoS and DDoS attacks – SQL
Injection. Identity Theft (ID) : Types of identity theft – Techniques of ID theft.

Unit V: Cybersecurity Policies and Practices 9 lecture hours


What security policies are – determining the policy needs – writing security policies –
Internet and email security policies – Compliance and Enforcement of policies- Review

Mode of Evaluation: Class Quiz, Assignment, CAT -1, CAT – 2 and ETE.

Theory
Components Internal (50) SEE
Assignment (5)
Quiz (15)

Cat-2 Semester End


Marks Cat-1 (15)
(15) Exam (50)

Total Marks 100

Relationship between the Course Outcomes (COs) and Program Outcomes (POs):

Mapping between Cos and Pos


Sl. No. Course Outcomes (COs) Mapped Program Outcomes

Know the fundamental mathematical


1 PO1,PO9,PO10,PO12,PSO3,
concepts related to security

Understand and implement the


cryptographic techniques and know the
2 PO1,PO4,PO9,PSO13,PSO1
real time applications of various
cryptographic techniques

3 Comprehend the authenticated process and PO1,PO2,PO,PO10,PSO2,PSO3


integrity, and its implementation
4 Know fundamentals of cybercrimes and the PO1,PO2,PO4,PO9,PSO2
cyber offenses
Understand the cyber threats, attacks and
5 vulnerabilities and its defensive PO1,PO2,PO4,PO6,PO10,PO12,PSO1
mechanism.
6 Design suitable security policies PO1,PO2,PO3,PO4,PO6,PSO1,PSO3

Вам также может понравиться