COURSE CODE COURSE TITLE L T P C 2161CS127 CYBER SECURITY PRINCIPLES 3 0 0 3 Course Category: Program Core A
Total Page:16
File Type:pdf, Size:1020Kb
COURSE CODE COURSE TITLE L T P C 2161CS127 CYBER SECURITY PRINCIPLES 3 0 0 3 Course Category: Program Core A. Preamble : This course describes the concepts of network security and cyber security principles. B. Course Outcomes : Upon the successful completion of the course, students will be able to: Level of learning CO domain (Based on Course Outcomes Nos. revised Bloom’s taxonomy) CO1 Compare and contrast various cryptographic protocols K2 CO2 Demonstrate various ethical hacking and system hacking K3 CO3 Explain the various cyber threats and vulnerabilities. K2 Discuss the pseudo random sequence generators and stream CO4 K2 ciphers CO5 Design and implement secure applications K2 C. Correlation of COs with POs : COs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 CO1 H L CO2 H H CO3 L L L CO4 M L M M CO5 M M H M H- High; M-Medium; L-Low D. Course Content : UNIT I Cryptographic Protocols (9) Introduction to Protocols-Communications Using Symmetric Cryptography-One-Way Functions- One-Way Hash Functions-Communications Using Public-Key Cryptography-Digital Signatures- Digital Signatures with Encryption-Random and Pseudo-Random-Sequence Generation-Basic Protocols-Key Exchange-Authentication-Authentication and Key Exchange. UNIT II Ethical Hacking and System Hacking (9) Introduction-Importance of Security-Elements of Security-Phase of an Attack- Hacker Attacks – Hacktivism –Ethical Hackers –Computer Crimes and Implication. Introduction–Cracking password–Password cracking websites–Password guessing Algorithms–Password cracking Tools Countermeasure–Escalating Privileges-Executing Applications –Key loggers and spywares. UNIT III Cyber Threats and Vulnerabilities (9) Cyber Threats-Cyber Activism-Cybercrime-Cyber Espionage-Cyber terrorism-Cyber Warfare- Cyber World Vulnerabilities-Cyber Operations-Cyber Weaponry-Society’s Critical Structures as Targets. UNIT IV Pseudo-Random-Sequence Generators and Stream Ciphers (9) Linear Congruential Generators-Linear Feedback Shift Registers-Design and Analysis of Stream Ciphers-Stream Ciphers Using LFSRs-A5-Hughes XPD/KPD-Nanoteq-Rambutan-Additive Generators-Real Random-Sequence Generators-RC4-SEAL-WAKE-Feedback with Carry Shift Registers. UNIT V Real Time Example (9) IBM Secret-Key Management Protocol-MITRENET-ISDN-STU-III-Kerberos-KryptoKnight- SESAME-Privacy-Enhanced Mail (PEM) - Message Security Protocol (MSP) - Pretty Good Privacy (PGP) - Smart Cards. TOTAL : 45 PERIODS TextBooks: 1. Bruce Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley & Sons,Inc, 2nd Edition, 2007. 2. EC-Council, Ethical Hacking and Countermeasures: Attack Phases, Cengage Learning, 2009. REFERENCES: Martti Lehto Pekka Neittaanmaki,Cyber Security:Analytics,Technology and Automation, Intelligent Systems, Control and automation: Science and Engineering, Spinger .