X

Information Security

By Dr. Reshma P K   |   Mahatma Gandhi College, Iritty, Kannur- Kerala
Learners enrolled: 2412
The course “Information Security” is proposed for B.Sc. (Hons) Mathematics as the Generic Elective course with 4 credits.  The course starts with the overview of security and its aspects. Then goes through the different threats, and methods to protect the information. This paper gives an overview of cryptography and discusses the various techniques related with it. The students who wish to enhance their knowledge on recent trends of IT and Computers and those who wish to understand the term information or cyber security  are equally  benefitted with the contents of this course
Summary
Course Status : Completed
Course Type : Elective
Language for course content : English
Duration : 15 weeks
Category :
  • Computer Science and Engineering
Credit Points : 4
Level : Undergraduate
Start Date : 25 Jul 2022
End Date : 17 Oct 2022
Enrollment Ends : 15 Sep 2022
Exam Date :

Page Visits



Course layout

Week 1
Day 1 : Introduction to Information Security
Day 2 : Protection Vs Security  
Day 3 : Aspects of security 

Week 2
Day 1 : Security problems
Day 2 : User authentication 
Day 3 : Orange Book

Week 3
Day 1 : Security threats
Day 2 : Program threats  
Day 3 : Worms and viruses 

Week 4
Day 1 : Trojan horse and Trap door 
Day 2 : Stack and buffer overflow 
Day 3 : System threats 

Week 5
Day 1 : Communication threats
Day 2 : Introduction to Cryptography  
Day 3 : Substitution techniques-I 

Week 6
Day 1 : Substitution techniques-II
Day 2 : Transposition ciphers  
Day 3 : Overview of symmetric key algorithms

Week 7
Day 1 : Data Encryption standard
Day 2 : Advanced  Encryption standards  
Day 3 : The AES Cipher

Week 8
Day 1 : Public Key encryption
Day 2 : RSA algorithm 
Day 3 : The security of RSA

Week 9
Day 1 : Diffie-Hellman key exchange
Day 2 : ECC Cryptography  
Day 3 : Message authentication

Week 10
Day 1 : Cryptographic hash functions
Day 2 : Digital signature  
Day 3 : Symmetric key and Public key signature 

Week 11
Day 1 : Message digests
Day 2 : Public key infrastructure
Day 3 : Security mechanisms-An overview

Week 12
Day 1 : Auditing and logging
Day 2 : Trip wire
Day 3 : System call monitoring


Books and references

1. W. Stallings, Cryptography and Network Security Principles and Practices, 4th Ed., Prentice-Hall of India, 2006.
2. C. Pfleeger and S.L. Pfleeger, Security in Computing, 3rd Ed., Prentice-Hall of India, 2007.
3. D. Gollmann, Computer Security, John Wiley and Sons, NY, 2002.
4. J. Piwprzyk, T. Hardjono and J. Seberry, Fundamentals of Computer Security, Springer-Verlag Berlin, 2003.
5. J.M. Kizza, Computer Network Security, Springer, 2007.
6. M. Merkow and J. Breithaupt, Information Security: Principles and Practices, Pearson Education, 2006.

Instructor bio



Dr. Reshma P K

Mahatma Gandhi College, Iritty, Kannur- Kerala
10+ years of experience in teaching Undergraduate level Computer Science, including Computer Architecture, Operating Systems, Data structures and Algorithms, Web technologies, System software etc.
Developed study material for many Universities in Kerala for their School of Distance Education and IT Mission Programmes.  Obtained M.Phil. from the Bharathiar University and Ph.D from the University of Calicut. Completed a Minor Research Project funded by UGC during 2015-2017.
A Repurposed MOOC on IT Fundamentals with 4 credits was designed and successfully completed 2 runs on SWAYAM Platform. (during January 2019 and January 2021)

Course certificate

30% for in Course Assessment & 70% of End-term Proctored Exam.


MHRD logo Swayam logo

DOWNLOAD APP

Goto google play store

FOLLOW US