0% found this document useful (0 votes)
21 views4 pages

22IT510 - Course Plan

The document outlines the course plan for the B.Tech IT program's Information Security subject at Thiagarajar College of Engineering for the academic year 2024-25. It details the course objectives, topics to be covered, teaching methods, and required textbooks. The course focuses on security models, cryptography, system attacks, and defenses, with a total of 36 lecture hours planned.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views4 pages

22IT510 - Course Plan

The document outlines the course plan for the B.Tech IT program's Information Security subject at Thiagarajar College of Engineering for the academic year 2024-25. It details the course objectives, topics to be covered, teaching methods, and required textbooks. The course focuses on security models, cryptography, system attacks, and defenses, with a total of 36 lecture hours planned.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

THIAGARAJAR COLLEGE OF ENGINEERING, MADURAI 625 015.

DEPARTMENT OF INFORMATION TECHNOLOGY


COURSE PLAN

Degree : B.Tech IT Department : Information Technology


Semester :V Academic Year : 2024-25 (ODD SEM)
Subject Code : 22IT510 Subject Name : Information Security
Staff In charge : C. Jeyamala / M.Suguna
Staff Dept. : Information Technology

Objective:
This course on Information Security focuses on the models, tools, and techniques for enforcement of
security with emphasis on the use of cryptography. Upon completion of the course, the learners will be able
to develop basic understanding of security, cryptography, system attacks and defenses against them.

Course Plan:

Mod Topic No. of Content Delivery Method Tools/Active


ule Lectures Learning
No. Strategy
1 BASICS OF INFORMATION SECURITY
1.1 Perspectives and Impact, Attacks, Threats 2 Classroom teaching Case Studies
and vulnerabilities
Security Services -CIA Triad and Security
Models
Internet Law and Cyber Crimes
Security Standards
2 CRYPTOGRAPHY
Mathematics for Cryptography- Number 1 Lecture with Tutorials Problem
Theory Solving and
2.1 Modulo Arithmetic Worksheets
2.2 Euclidean and extended Euclidean Theorem
2.3 Chinese Remainder Theorem 1 Lecture with Tutorials
2.4 Galois Fields 2 Lecture with Tutorials
2.5 Euler and Fermat theorem 1 Lecture with Tutorials
2.6 Primality Testing Methods
Symmetric Key Cryptography 2 Lecture with Tutorials Demo with
2.7 Hill Cipher Cryptool
2.8 Advanced Encryption Standard 3 Lecture with Demonstration Rijndael
Animation/
Problem
Solving
Public Key Cryptography 2 Lecture with Demonstration RSA
2.9 RSA Challenge
/Problem
Solving
2.10 Elliptic Curve Cryptosystems 2 Lecture with Demonstration ECC

Page 1 of 4
Challenge/
Problem
Solving
2.11 Integrity 2 Lecture with Demonstration Online Hash
Message Authentication Code and Hash calculators
/Problem
Solving
2.12 Application of Hash in Blockchain 1 Lecture with Demonstration Blockchain
Technologies Explorers
2.13 Digital Signatures 1 Lecture with Demonstration Problem
Digital Signature Standard Solving
3 AUTHENTICATION AND KEY EXCHANGE
3.1 One way Authentication Password
3.2 Mutual Authentication 1 Lecture with demonstration cracker
3.3 Dictionary Attacks
3.4 Biometrics and Multifactor Authentication 1 Lecture
3.5 Key management –Digital certificates 1 Lecture Creation of
public and
private keys
using Free
Open Source
Tools
3.6 Public Key Infrastructure 1 Lecture Demonstratio
ns in Website
4 SECURITY PROTOCOLS
4.1 Security at Application Layer – PGP 2 Lecture
Electronic Payments - SET
4.2 Security at Transport Layer –SSL and TLS 1 Lecture with demonstration Wireshark
4.3 Security at Network layer –IP Sec 1 Lecture
5 NETWORK DEFENSE TOOLS:
5.1 Firewalls 1 Demonstration Cisco Packet
Tracer
5.2 Intrusion Prevention and Detection Systems 1 Lecture with demonstration KDD data set
6 SECURE SOFTWARE DEVELOPMENT
Software Vulnerabilities 1 Lecture with demonstration Coding
6.1 Phishing
6.2 Buffer Overflows
6.3 Format String Attacks
6.4 Cross Site Scripting 1 Lecture with demonstration Demonstratio
6.5 SQL injection. 1 Lecture with demonstration n with DVWA
6.6 DoS and DDoS
6.7 Session Hijacking 1 Lecture
6.8 Pharming Attacks
7 Malicious Code 2 Lecture Case
Viruses, Worms and Malware Analysis - Studies/
Case Studies Presentation
Total Lecture Hours 36

Page 2 of 4
Course Outcomes

Text Book
● Behrouz. A. Foruzan and Debdeep Mukhopadhyay, “Cryptography and Network Security”,
Tata McGraw Hill , Third Edition, 2016.
● William Stallings, “Cryptography and Network Security: Principles and Practice”,Prentice
Hall,Seventh Edition, 2017.
● Bernard L Menezes, and Ravinder Kumar “Cryptography, Network Security andCyber
Laws”, Cengage Learning India Pvt Limited, 2018.
● Charlie Kaufman and Radia Perlman, Mike Speciner, “Network Security, Private
Communication in Public World”, Prentice Hall India, Second Edition, 2002.

Page 3 of 4
● William Stallings, "Network Security Essentials: Applications and Standards", Prentice Hall,
Sixth Edition, 2016.
● Man Young Rhee, "Internet Security Cryptographic Principles, Algorithms and Protocols",
Wiley, First Edition, 2003.
● Douglas R. Stinson, “Cryptography Theory and Practice”, Third Edition, Chapman&
Hall/CRC, 2006.
● http://cse.iitkgp.ac.in/~debdeep/courses_iitkgp/Crypto/index.htm
● http://nptel.ac.in/courses/106105031/
● https://canvas.uw.edu/courses/1064488

Staff In-charge HDIT


QR/C4-04(02)05-11-2004

Page 4 of 4

You might also like