INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

Similar documents
INSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous)

INSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad INFORMATION TECHNOLOGY COURSE DESCRIPTION FORM

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

MLR Institute of Technology

INSTITUTE OF AERONAUTICAL ENGINEERING

INSTITUTE OF AERONAUTICAL ENGINEERING Autonomous Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (AUTONOMOUS) Dundigal, Hyderabad

COURSE DESCRIPTION FORM. Level Credits Periods/ Week Prerequisites

MLR Institute of Technology

G. PULLAIAH COLLEGE OF ENGINEERING AND TECHNOLOGY Pasupula, Nandikotkur Road, Kurnool

INSTITUTE OF AERONAUTICAL ENGINEERING

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

University of Asia Pacific (UAP) Department of Computer Science and Engineering (CSE) Course Outline

University of Asia Pacific (UAP) Department of Electrical and Electronics Engineering (EEE) Course Outline

G.PULLAIH COLLEGE OF ENGINEERING & TECHNOLOGY

St. MARTIN s ENGINERING COLLEGE Dhulapally,Secunderabad

University of Asia Pacific (UAP) Department of Computer Science and Engineering (CSE)

Academic Course Description

INSTITUTE OF AERONAUTICAL ENGINEERING

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) DUNDIGAL, HYDERABAD

University of Asia Pacific (UAP) Department of Computer Science and Engineering (CSE)

Name of chapter & details.

10EC832: NETWORK SECURITY

B.E Civil Engineering Program Outcomes (POs) At the end of the B.E program, students are expected to have developed the following outcomes.

CHALAPATHI INSTITUTE OF ENGINEERING & TECHNOLOGY

COURSE OUTCOMES AND PROGRAM OUTCOMES

SRI VENKATESWARA COLLEGE OF ENGINEERING

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus

KALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER COURSE PLAN

KLS s Gogte Institute of Technology, Udyambag, Belagavi. CLO 1: To provide introduction to UNIX Operating System and its File System

Academic Course Description

M.D UNIVERSITY SCHEME OF STUDIES AND EXAMINATION M.TECH 2nd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER 3rd CBCS Scheme effective from

3.4.3 Bachelor of Technology (Electronics Engineering)

CRYPTOGRAPHY AND NETWORK SECURITY

DEPARTMENT OF INSTRUMENTATION AND CONTROL ENGINEERING VISION

Part A: Course Outline

Faculty of Science & Information Technology

Cryptography and Network Security

G.PULLAIAH COLLEGE OF ENGINEERING AND TECHNOLOGY

Course Name: Computer Networks-1 Course Code: IT222

COURSE PLAN Regulation: R11 FACULTY DETAILS: Department::

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

KALASALINGAM UNIVERSITY

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

KALASALINGAM UNIVERSITY (Kalasalingam Academy of Research and Education) KRISNANKOIL Academic Year [Odd Semester]

Undergraduate Program for Specialty of Software Engineering

Course Name: Information and Computers Networks Security Course Code: IT423

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

City University of Hong Kong. Course Syllabus. offered by Department of Computer Science with effect from Semester B 2016/17

City University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester B 2017/18

Bachelor of Information Technology (Network Security)

BCA III Network security and Cryptography Examination-2016 Model Paper 1

Introduction to Network Security Missouri S&T University CPE 5420 Exam 2 Logistics

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

Introduction to information Security

Academic Course Description

SUMMARY OF INFORMATION ON EACH COURSE

COURSE PLAN. Name of the Faculty:: K.ROSHAN & M.A.MUNEER Designation: Assoc.Professor Asst. Professor. Name Of The Programme:: B.

Academic Course Description

Academic Course Description

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

Curriculum Scheme. Dr. Ambedkar Institute of Technology, Bengaluru-56 (An Autonomous Institute, Affiliated to V T U, Belagavi)

Introduction and Overview. Why CSCI 454/554?

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Technology. on Technology. IT PH.D. Program.

A & B Section. Day. A Mrs. Krishnaveni S 1204 UB

Academic Course Description

COURSE PLAN. Regulation: R12. FACULTY DETAILS: Name of the Faculty:: B.VIJAY KUMAR Designation: Assistant Professor Department:: IT

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Systems. IS Ph.D. Program. Page 0

Geethanjali College of Engineering and Technology

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

(2½ hours) Total Marks: 75

Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II

STORAGE AREA NETWORKS COURSE PLAN. BIJAYA KUMAR BISWAL Assistant Professor, CSE

Standard Course Outline IS 656 Information Systems Security and Assurance

Course Intended Learning Outcomes (CILOs): Upon successful completion of this course, students should be able to:

CSET 3400 Unix System Administration (3 semester credit hours) IT Elective

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

Study Scheme & Syllabus Of B.Tech Production Engineering 2014 onwards

DEPARTMENT OF COMPUTER APPLICATIONS B.C.A. - THIRD YEAR ( REGULATION) SIXTH SEMESTER LESSON PLAN SRM UNIVERSITY

FIVE YEAR INTEGRATED M.Sc. SOFTWARE SYSTEMS PROGRAMME

Cryptography MIS

G COURSE PLAN ASSISTANT PROFESSOR Regulation: R13 FACULTY DETAILS: Department::

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

Academic Course Description

Networks and Communications MS216 - Course Outline -

CHHATTISGARH SWAMI VIVEKANAND TECHNICAL UNIVERSITY

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

OVERVIEW OF SUBJECT REQUIREMENTS

FIT5044 Network security. Unit Guide. Semester 1, 2010

B.TECH(COMPUTER) Will be equipped with sound knowledge of mathematics, science and technology useful to build complex computer engineering solutions.

COURSE OBJECTIVES. Name of the Program : B.Tech Year: II Section: A, B & C. Course/Subject : MATLAB/ LABVIEW LAB Course Code: GR11A2020

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2

Information Security: Principles and Practice Second Edition. Mark Stamp

Transcription:

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, yderabad - 500 043 COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Course Code Regulation Course Structure Course Coordinator Team of Instructors INFORMATION SECURITY A60522 R15 - JNTU Lectures Tutorials Practicals Credits 4 - - 4 Ms. Geetavani.B, Assistant Professor, CSE Dr. P L Srinivasa Murthy,Professor,CSE Mr. N Rajasekar, Assistant Professor, CSE Mr. P V Narsimha Rao, Assistant Professor, CSE I. COURSE OVERVIEW: This course provides an introduction to the field of network security. Specific topics to be examined include threats and vulnerabilities to network architectures and protocols. The course is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop security policies that will protect an organization s information. Students will learn how to evaluate network and Internet security issues and design. II. PREREQUISITE(S): Level Credits Periods/ Week Prerequisites UG 4 4 Computer Networks III. MARKS DISTRIBUTION: Sessional Marks Midterm Test There shall be two midterm examinations. Each midterm examination consists of essay paper, objective paper and assignment. The essay paper is for 10 marks of 60 minutes duration and shall contain 4 questions. The student has to answer 2 questions, each carrying 5 marks. The objective paper is for 10 marks of 20 minutes duration. It consists of 10 multiple choice and 10 fill-in-the blank questions, the student has to answer all the questions and each carries half mark. First midterm examination shall be conducted for the first two and half units of syllabus and second midterm examination shall be conducted for the remaining portion. Five marks are earmarked for assignments. There shall be two assignments in University End Exam marks Total marks 75 100 1 P a g e

Sessional Marks every theory course. Assignments are usually issued at the time of commencement of the semester. These are of problem solving in nature with critical thinking. Marks shall be awarded considering the average of two midterm tests in each course. University End Exam marks Total marks IV. EVALUATION SCEME: S. No Component Duration Marks 1. I Mid Examination 80 minutes 20 2. I Assignment - 5 3. II Mid Examination 80 minutes 20 4. II Assignment - 5 5. External Examination 3 hours 75 V. COURSE OBJECTIVES: At the end of the course, the students will be able to: I. Identify and classify computer and security threats and develop a security model to prevent, detect and recover II. from attack Understand various public-key cryptographic Algorithms. III. Study PGP key pair and use the PGP package to send an encrypted e-mail message. IV. Understand IP protocol security through IPSec. V. Analyze security of data in network through firewall. VI. COURSE OUTCOMES: After completing this course the student must demonstrate the knowledge and ability to: 1. Differentiate network security and computer security. 2. Understand various attacks on network. 3. Understand various conventional cryptography algorithms and asymmetric encryption algorithms. 4. Expertise in Message authentication, ash function and Public key encryption. 5. Analyze how PGP and S/MIME is used to protect messages transmitted through e-mail 6. Remembering requirements for web security and implementing security through SSL/TLS. 7. Understand various intruders, firewall design principles. 2 P a g e

VII. OW PROGRAM OUTCOMES AREASSESSED: PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 Program Outcomes Engineering knowledge: Apply the knowledge of mathematics, science, engineering fundamentals, and an engineering specialization to the solution of complex engineering problems. Problem analysis: Identify, formulate, review research literature, and analyze complex engineering problems reaching substantiated conclusions using first principles of mathematics, natural sciences, and engineering sciences. Design/development of solutions: Design solutions for complex engineering problems and design system components or processes that meet the specified needs with appropriate consideration for the public health and safety, and the cultural, societal, and environmental considerations. Conduct investigations of complex problems: Use research-based knowledge and research methods including design of experiments,analysis and interpretation of data, and synthesis of the information to provide valid conclusions. Modern tool usage: Create, select, and apply appropriate techniques, resources, and modern engineering and IT tools including prediction and modeling to complex engineering activities with an understanding of the limitations. The engineer and society: Apply reasoning informed by the contextual knowledge to assess societal, health, safety, legal and cultural issues and the consequent responsibilities relevant to the professional engineering practice. Environment and sustainability: Understand the impact of the professional engineering solutions in societal and environmental contexts, and demonstrate the knowledge of, and need for sustainable development. Ethics: Apply ethical principles and commit to professional ethics and responsibilities and norms of the engineering practice. Individual and team work: Function effectively as an individual, and as a member or leader in diverse teams, and in multidisciplinary settings. Communication: Communicate effectively on complex engineering activities with the engineering community and with society at large, such as, being able to comprehend and write effective reports and design documentation, make effective presentations, and give and receive clear instructions. Project management and finance: Demonstrate knowledge and understanding of the engineering and management principles and apply these to one s own work, as a member and leader in a team, to manage projects and in multidisciplinary environments. Life-long learning: Recognize the need for, and have the preparation and ability to engage in independent and life-long learning in the broadest context of technological change. Level Proficiency assessed by Assignments, Tutorials Assignments Mini Projects S -- S Mini Projects S -- N None S Supportive - ighly Related 3 P a g e

VIII. OW PROGRAM SPECIFIC OUTCOMES AREASSESSED: PSO1 PSO2 PSO3 Program Specific Outcomes Professional Skills: The ability to research, understand and implement computer programs in the areas related to algorithms, system software, multimedia, web design, big data analytics, and networking for efficient analysis and design of computer-based systems of varying complexity. Problem-Solving Skills: The ability to apply standard practices and strategies in software project development using open-ended programming environments to deliver a quality product for business success. Successful Career and Entrepreneurship: The ability to employ modern computer languages, environments, and platforms in creating innovative career paths, to be an entrepreneur, and a zest for higher studies. Level S Proficiency assessed by Lectures, Assignments Projects Guest Lectures N - None S - Supportive - ighly Related IX. SYLLABUS: UNIT I Attacks on Computers and Computer Security: Introduction, The need for security, Security approaches, Principles of security, Types of Security attacks, Security Services, Security Mechanism, A model for Network Security. Cryptography: Concepts and Techniques: Introduction, plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography, steganography, key range and key size, possible types of attacks. UNIT II Symmetric key Ciphers: Block Cipher principles & Algorithms (DES,AES, Blowfish), Differential and Linear Cryptanalysis, Block cipher modes of operation, Stream ciphers,rc4 Location, and placement of encryption function, key distribution Asymmetric key Ciphers: Principles of public key cryptosystems, Algorithms (RSA Diffie-elman, ECC) Key Distribution. UNIT III Message Authentication Algorithm and ash Functions: Authentication requirements, Functions, Message, authentication codes, ash Functions, Secure hash algorithm, Whirlpool, MAC, CMAC, Digital Signatures, knapsack algorithm Authentication Application: Kerberos, X.509 Authentication Service, Public Key Infrastructure, Biometric Authentication. UNIT IV E-mail Security: Pretty Good Privacy, S/MIMI IP Security: IP Security overview, IP Security architecture, Authentication eader, Encapsulating Security payload, Combining Security associations, key management. UNIT V Web Security: Web security considerations, Secure Socket Layer and Transport Layer Security, Secure electronic transaction Intruders, Virus and Firewalls: Intruders, Intrusion detection password management, virus and related threats, Countermeasures, Firewall design principles, Types of firewalls. Case Studies on Cryptography and Security: Secure Inter-branch Payment Transactions, Cross site Scripting Vulnerability, Virtual Electronics. TEXT BOOKS: 1. Cryptography and Network Security: William Stallings, Pearson Education, 4thEdition. 2. Cryptography and Network Security: Atul Kahate, McGraw ill, 2ndEdition. 4 P a g e

REFERENCE BOOKS: 1. Cryptography and Network Security: C K Shymala, N harini, Dr. T R Padmanabhan, Wiley India, 1st Edition. 2. Cryptography and Network Security: Forouzan Mukhopadhyay, Mc Graw ill 2nd Edition. 3. Information Security, Principles and Practice: Mark Stamp, WileyIndia. 4. Principles of Computer Security: WM. Arthur Conklin, Greg White, TM. 5. Introduction to Network Security: Neal Krawetz, CENGAGE Learning. 6. Network Security and Crytography: Bernard Menezes, CENGAGE Learning. X. COURSE PLAN: At the end of the course, the students are able to achieve the following course learning outcomes: Lecture No. Topics to be covered Course Learning Outcomes Reference 1 3 Introduction, The need for security, Security approaches, Principles of security Types of Security attacks, Security 4 6 Security Mechanism, A model for Network Security. Introduction, plain text and cipher text 7-12 transposition techniques encryption and decryption symmetric and asymmetric key cryptography, steganography 12-16 key range and key size Possible types of attacks. Symmetric key Ciphers Block Cipher principles 17-22 Algorithms (DES,AES, Blowfish) Block cipher modes of operation Stream ciphers Understand the importance of identifying threats to network Evaluate various types of attacks on the network. Understand how Unauthorized person acquires data in middle of transmission of data in network Analyze how security depends on location of encryption devices in network Understand various public key cryptography algorithms 23-26 RC4 Location placement of encryption Illustrate how security provided function through signature 27-33 key distribution Asymmetric key Ciphers Compare various security aspects Principles of public key cryptosystems for entering into secure network 34-37 Algorithms (RSA Diffie-elman, ECC) Key Understand various methods of Distribution message authentication algorithms Message Authentication Algorithm and ashfunctions: Authentication requirements 38-40 Functions, Message authentication codes, Understand how authentication ash Functions Secure hash algorithm header provides authentication 41-45 Whirlpool, MAC, CMAC Digital Analyze the importance of secured Signatures, knapsack algorithm architecture for internet protocol Authentication Application: Kerberos 46-49 Public Key Infrastructure, Biometric Understand PGP functionality Authentication. Pretty Good Privacy S/MIME IP Security: IP Security overview 50-54 IP Security architecture, Authentication Understand how devices are eader Encapsulating Security payload, managed on IP network Combining Security associations, key Management. 55-59 Web security considerations, Secure Socket Analyze how SSL provides security Layer and Transport Layer Security in www 60-63 Types of firewalls virus and related threats, Understand various types of Countermeasures, Firewall design principles. firewalls and viruses. 64-65 Case Studies on Cryptography and Analyze different Inter branch Security: Secure Inter-branch Payment payment transactions cross site Transactions, Cross site Scripting Scripting. Vulnerability, Virtual Electronics T1:1.3-1.7 R2, R3 T1:2.1-2.2,2.4 T1:2.5-2.6,3.1 T1:3.3-3.4 T1:3.5,3.6, T1:4.1-4.2 T1:5.1 T1:5.2 T1:6.1-6.3 T1:7.1-7.2 T1:7.2-7.3 T1:8.1-8.3 T:11.1-11.2 T:11.2-11.6 5 P a g e

XI. MAPPING COURSE OBJECTIVES LEADING TO TE ACIEVEMENTOF PROGRAM OUTCOMES AND PROGRAM SPECIFIC OUTCOMES: Course Objectives Program Outcomes Program Specific Outcomes PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 I S S II S S III S S IV S S V S S S Supportive - ighly Related XII. MAPPING COURSE OUTCOMES LEADING TO TE ACIEVEMENT OF PROGRAM OUTCOMES AND PROGRAM SPECIFICOUTCOMES: PSO3 Course Outcomes Program Outcomes Program Specific Outcomes PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3 1 S S S 2 S S 3 S S 4 S S S 5 S S 6 S S S 7 S S S Supportive - ighly Related Prepared By, Geetavani.B, Assistant Professor, CSE Dr. P L Srinivasa Murthy, Professor, CSE Mr. N.Rajasekar, Assistant Professor, CSE Mr. P V Narasimha Rao, Assistant Professor, CSE OD, CSE 6 P a g e