Overview
Overview of Security Parameters: Confidentiality, Integrity and availability-security
violation, Assumptions and Trust- Security assurance, OSI security architecture.
05 hours
Cryptography
Mathematical Tools for Cryptography, Symmetric Encryption Algorithm, Theory of Block
cipher design, Symmetric cipher model, Risk assessment, quantitative and qualitative
approaches, Network security management, Firewalls, Web and wireless security
management, Computer security log management, IT security infrastructure, Operating
system security, user security, program security.
10 hours
Finite Field and Number Theory
Groups, Rings, Fields-Modular, Prime numbers, Fermat's and Euler's Theorem, Chinese
remainder Theorem, Discrete Logarithm.
03 hours
Hash Functions and Digital Signatures
Authentication requirement – Authentication function -MAC, Hash functions, Security of
hash function, Hashing Algorithms: MD5.
05 hours
Internet Firewalls for Trusted System
Roles of Firewalls, Firewall related terminology, Types of Firewalls, Firewall designs.
02 hours
E-Mail, IP & Web Security (Qualitative study)
E-mail Security: Security Services for E-mail-attacks possible through E-mail, Pretty
Good S/MIME.
IP Security: Overview of IPSec, IP Security Architecture, Authentication Header,
Encapsulation Security Payload.
Web Security: Secure Socket Layer/Transport Layer Security, Basic Protocol, SSL
05 hours
Attacks, Secure Electronic Transaction (SET).
Cyber
Cyber laws to be covered as per IT 2008
Definitions, Digital Signature And Electronic Signature.
1) [Section 43] Penalty and Compensation for damage to computer, computer system,
etc.
2) [Section 65] Tampering with Computer Source Documents.
3) [Section 66 A] Punishment for sending offensive messages through communication
service, etc.
4) [Section 66 B] Punishments for dishonestly receiving stolen computer resource or
communication device.
5) [Section 66C] Punishment for identity theft.
6) [Section 66D] Punishment for cheating by personation by using computer resource.
7) [Section 66E] Punishment for violation of privacy.
8) [Section 66F] Punishment for cyber terrorism.
9) [Section 67] Punishment for publishing or transmitting obscene material in
electronic form.
10) [Section 67A] Punishment for publishing or transmitting of material containing
sexually explicit act, etc. in electronic form.
11) [Section 67B] Punishment for publishing or transmitting of material depicting
children in sexually explicit act, etc. in electronic form.
12) [Section 72] Breach of confidentiality and privacy.
No comments:
Post a Comment