Sunday, November 29, 2020

Skill Enhancement Course: SEC-B: Information Security/ E-Commerce CMS-A-SEC-B-4-1-TH: Information Security

 Overview

Overview of Security Parameters: Confidentiality, Integrity and availability-security

violation, Assumptions and Trust- Security assurance, OSI security architecture.

05 hours

Cryptography

Mathematical Tools for Cryptography, Symmetric Encryption Algorithm, Theory of Block

cipher design, Symmetric cipher model, Risk assessment, quantitative and qualitative

approaches, Network security management, Firewalls, Web and wireless security

management, Computer security log management, IT security infrastructure, Operating

system security, user security, program security.

10 hours

Finite Field and Number Theory

Groups, Rings, Fields-Modular, Prime numbers, Fermat's and Euler's Theorem, Chinese

remainder Theorem, Discrete Logarithm.

03 hours

Hash Functions and Digital Signatures

Authentication requirement – Authentication function -MAC, Hash functions, Security of

hash function, Hashing Algorithms: MD5.

05 hours

Internet Firewalls for Trusted System

Roles of Firewalls, Firewall related terminology, Types of Firewalls, Firewall designs.

02 hours

E-Mail, IP & Web Security (Qualitative study)

E-mail Security: Security Services for E-mail-attacks possible through E-mail, Pretty

Good S/MIME.

IP Security: Overview of IPSec, IP Security Architecture, Authentication Header,

Encapsulation Security Payload.

Web Security: Secure Socket Layer/Transport Layer Security, Basic Protocol, SSL

05 hours

Attacks, Secure Electronic Transaction (SET).

Cyber

Cyber laws to be covered as per IT 2008

Definitions, Digital Signature And Electronic Signature.

1) [Section 43] Penalty and Compensation for damage to computer, computer system,

etc.

2) [Section 65] Tampering with Computer Source Documents.

3) [Section 66 A] Punishment for sending offensive messages through communication

service, etc.

4) [Section 66 B] Punishments for dishonestly receiving stolen computer resource or

communication device.

5) [Section 66C] Punishment for identity theft.

6) [Section 66D] Punishment for cheating by personation by using computer resource.

7) [Section 66E] Punishment for violation of privacy.

8) [Section 66F] Punishment for cyber terrorism.

9) [Section 67] Punishment for publishing or transmitting obscene material in

electronic form.

10) [Section 67A] Punishment for publishing or transmitting of material containing

sexually explicit act, etc. in electronic form.

11) [Section 67B] Punishment for publishing or transmitting of material depicting

children in sexually explicit act, etc. in electronic form.

12) [Section 72] Breach of confidentiality and privacy.

No comments:

Post a Comment