Information security-LAB
Information security-LAB
Week 1
Objectives / Learning Outcome Understand the basic concepts and scientific thinking in
information
Contents / Sub Contents • Write a program to perform Encryption / Decryption using
Caesar cipher.
Week 2
Objectives / Learning Outcome Understand the basic concepts and scientific thinking in
information security.
Contents / Sub Contents • Write a program to perform Encryption / Decryption using
playfair system.
Week 3
Objectives / Learning Outcome Understand the basic concepts and scientific thinking in
information.
Contents / Sub Contents • Write a program to perform Encryption / Decryption using
Hill cipherTechnique.
Week 4
Objectives / Learning Outcome Explain key concepts of information security such as design
principles, cryptography, risk management, and ethics.
Contents / Sub Contents • Write a program to perform Encryption / Decryption using
transposition technique.
Week 5
Objectives / Learning Outcome Explain key concepts of information security such as design
principles, cryptography, risk management, and ethics.
Contents / Sub Contents • Write a Program to implement AES.
Week 6
Objectives / Learning Outcome Explain key concepts of information security such as design
principles, cryptography, risk management, and ethics.
Contents / Sub Contents • Write a program for DES algorithm to encrypt and
decrypt the data.
Week 7
Objectives / Learning Outcome Understand the basic concepts and scientific thinking in
information
Contents / Sub Contents • Write a program to perform Encryption/Decryption using
Diffie-Helmen Key exchange.
Week 8
Objectives / Learning Outcome 1. Understand the basic concepts and scientific thinking in
information security.
2. Explain key concepts of information security such as
design principles, cryptography, risk management, and
ethics
3. Identify the current IT security issues.
Contents / Sub Contents • Write a program for simple RSA algorithm to encrypt and
decrypt the data.
Week 9
Objectives / Learning Outcome Identify the current IT security issues.
Contents / Sub Contents • Write a program for hashing in MD5.
Appropriate Teaching Strategies / Tutorial, Lab
Methods
Week 10
Objectives / Learning Outcome 1. Identify the current IT security issues.
2. Apply various security and risk management tools for
achieving information security and privacy
3. Identify appropriate techniques to tackle and solve
problems in the discipline of information security
Curriculum Contents: Information security foundations, security design principles; security mechanisms,
symmetric and asymmetric cryptography, encryption, hash functions, digital signatures, key management,
authentication and access control; software security, malware, database security; network security, firewalls,
intrusion detection; security policies, risk assessment, cybercrime, law, privacy and anonymity of data.