Cyber Security Honor Syllbus Sem I
Cyber Security Honor Syllbus Sem I
http://unipune.ac.in
http://unipune.ac.in/university_files/syllabi.htm
Savitribai Phule Pune University
Hours / Week
Presentation
Mid-Semester
End-Semester
Total Marks
Total Credit
Term work
Practical
Practical
Theory /
Practical
Theory
Tutorial
Tutorial
TE Information and 04 -- -- 30 70 -- -- -- 100 04 -- 04
& Cyber Security
V Information and -- -- 02 -- -- 50 -- -- 50 -- 01 01
Cyber Security
Laboratory
Total 04 - 02 100 50 - - 150 04 01 05
Total Credits = 05
TE Enterprise Architecture 04 -- -- 30 70 -- -- -- 100 04 -- 04
& and Components
VI Total 04 - - 100 - - - 100 04 - 04
Total Credits = 04
BE Internet of Things 04 -- -- 30 70 -- -- -- 100 04 -- 04
& and Embedded
VII Security
Risk Assessment -- -- 02 -- -- 50 -- -- 50 -- 01 01
Laboratory
Total 04 - 02 100 50 - - 150 04 01 05
Total Credits = 05
BE Information Systems 04 - -- 30 70 -- -- -- 100 04 -- 04
& Management
VIII Seminar -- 02 -- -- -- - -- 50 50 02 -- 02
Total 04 - 02 100 - -- 50 150 06 - 06
Total Credits = 06
For any other Major Disciplines which is not mentioned above, it may be offered as Minor Degree.
Reference: https://www.aicte-india.org/sites/default/files/APH%202020_21.pdf / page 99-100
SavitribaiPhule Pune University
Honours* in Cyber Security
Third Year of Engineering (Semester V)
Information and Cyber Security
Teaching Scheme: Credit: Examination Scheme:
Theory: 04 Hours/Week 04 Mid_Semester(TH): 30 Marks
End_Semester(TH): 70 Marks
Companion Course, if any: - Information and Cyber Security Laboratory
Course Objectives:
To understand the basics of computer, network and information security.
To study operating system security and malwares.
To acquaint with security issues in internet protocols.
To analyze the system for vulnerabilities.
Course Outcomes:
On completion of the course, learner will be able to–
Use cryptographic techniques in secure application development.
Apply methods for authentication, access control, intrusion detection and prevention.
To apply the scientific method for security assessment
To develop computer forensics awareness.
Course Contents
Unit I Security Fundamentals (06 Hours)
An Overview of Information Security: The Basic Components, Threats, Policy and Mechanism, Assumptions and
Trust, Assurance, Operational Issues, Human Issues, Security nomenclature.
Access Control Matrix, Security Policies: Confidentiality, Integrity, Availability Policies and Hybrid Policies OS
Security
Unit II Modular Arithmetic and Cryptography Basics (08 Hours)
Modular Arithmetic : Modular Arithmetic Notations, Modular Arithmetic Operations, Euclid’s method of
finding GCD, The extended Euclid’s algorithm.
Cryptography : Classical encryption techniques, Block and Chain ciphers, Data Encryption Standard,
Advanced Encryption Standard, RC5
Unit III Advanced Cryptography (08 Hours)
Chinese Remainder Theorem and its implication in Cryptography, Diffie-Hellman key exchange algorithm,
RSA algorithm, Elgamal Arithmetic, Elliptic Curve Cryptography, Message Digest and Cryptographic Hash
Functions, MD5 and SHA-1, Digital Signatures and Authentication.
Unit IV Issues in Security Management and Cyber Laws (08 Hours)
Overview, Risk identification, Risk Assessment, Risk Control Strategies, Quantitative vs. Qualitative Risk
Control Practices. Risk Management. Laws and Ethics in Information Security, Codes of Ethics, Protecting
programs and data
Cybercrime and Information security, Classification of Cybercrimes, The legal perspectives- Indian
perspective, Global perspective, Categories of Cybercrime, Types of Attacks, a Social Engineering, Cyber
stalking, Cloud Computing and Cybercrime.
Unit V Key Management and Secure Communication (08 Hours)
Public Key Infrastructure(PKI), X.509 Certificate, Needham Schroeder algorithm and Kerberos
IP Security: IPv6 and IPSec,
Web Security: SSL, HTTPS, Mail Security: PGP, S/MIME
Firewall : Different Types and Functionalities
Unit VI Attacks, Malicious Logic and Countermeasures (08 Hours)
Phishing, Password Cracking, Key-loggers and Spywares, Types of Virus, Worms, DoS and DDoS, SQL
injection, Buffer Overflow, Spyware, Adware and Ransom ware. Antivirus and other security measures
Intrusion Detection System: IDS fundamentals, Different types of IDS. Intrusion Prevention.
Learning Resources
Text Books:
1. William Stallings, “Computer Security: Principles and Practices”, Pearson 6Ed, ISBN 978-0-13-335469-0
2. Nina Godbole, Sunit Belapure , “Cyber Security- Understanding Cyber Crimes”, Computer Forensics
and Legal Perspectives, Wiely India Pvt.Ltd, ISBN- 978-81-265-2179-1
Reference Books:
1. Bruice Schneier , “Applied Cryptography- Protocols, Algorithms and Source code in C”, Algorithms,
Wiely India Pvt Ltd, 2nd Edition, ISBN 978-81-265-1368-0.
3. CK Shyamala et el., “Cryptography and Security”, Wiley India Pvt. Ltd, ISBN-978-81-265-2285-9.
4. Berouz Forouzan, “Cryptography and Network Security”, TMH, 2 edition, ISBN -978-00-707-0208-0.
5. Mark Merkow, “Information Security-Principles and Practices”, Pearson Ed., ISBN- 978-81-317-1288-7.