0% found this document useful (0 votes)
36 views2 pages

Ps 806.3 (E2) : Cyber Security:) Course Objectives

This document provides information on the PS 806.3 (E2): CYBER SECURITY course, including objectives, outcomes, topics, and suggested books. The course aims to teach students about computer and network security threats and developing security models. It will cover basics of cryptography, encrypting and decrypting messages, and maintaining data confidentiality, integrity and availability. Students will learn security protocols to protect networks and how to authenticate, control access, detect and prevent intrusions. The course consists of 45 lectures over 15 weeks, earning 3 credits upon successful completion.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views2 pages

Ps 806.3 (E2) : Cyber Security:) Course Objectives

This document provides information on the PS 806.3 (E2): CYBER SECURITY course, including objectives, outcomes, topics, and suggested books. The course aims to teach students about computer and network security threats and developing security models. It will cover basics of cryptography, encrypting and decrypting messages, and maintaining data confidentiality, integrity and availability. Students will learn security protocols to protect networks and how to authenticate, control access, detect and prevent intrusions. The course consists of 45 lectures over 15 weeks, earning 3 credits upon successful completion.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

PS 806.

3 (E2): CYBER SECURITY


Total No. of Lectures: 45 Total Marks: 100 [ L – T – P – S ]
No. of Lectures / Week: 3 Credits : 3 [ 3 – 2 - 2 - 2 ]

Course Objectives:

Students are expected to demonstrate the ability to:

 To understand basics of Cryptography and Network security


 To learn about computer and network security threats, classify the threats and develop a security mod
to prevent, detect and recover from the attacks.
 To learn about Encrypt and decrypt messages using block ciphers, sign and verify
messages using well known signature generation and verification algorithms
 To learn about how to maintain the Confidentiality, Integrity and
Availability of a data.
 To understand various protocols for network security to protect against
the threats in the networks

Course Outcomes:

Upon the successful completion of the course.,

 Understand the basics of security attacks and threat model


 Appreciate the vulnerabilities and threats posed by criminals, terrorist and nation
states to national infrastructure
 Have a strong understanding of different cryptographic protocols and techniques
and be able to use them.
 Apply methods for authentication, access control, intrusion detection and prevention.
 Identify and mitigate software security vulnerabilities in existing systems

a. Introduction: Security attacks to information systems. Threat model. Security services. Mechanisms for
providing confidentiality, authentication, integrity, non-repudiation, and access control. Cryptography in data
and communication security.

b. Conventional Cryptography: Cryptosystems and cryptanalysis. Block ciphers and stream ciphers.
Confidentiality using encryption. Key distribution. Random number generation.

c. Public-Key Cryptography: One-way functions. Trapdoor one-way functions. Public-key cryptosystems. RSA,
Diffie-Hellman, ElGamal, and elliptic curve cryptosystems.

d. Message Authentication and Hash Functions: Cryptographic checksums. Message authentication codes.
Hash functions. Security issues. Attacks and countermeasures. Digital Signatures and Strong Authentication:
Digital signatures. One-way and mutual authentication protocols.

e. Network Security Practice: Authentication applications. Kerberos. Directory services. PGP and S/MIME. IP
Security and Web security. Wireless Network Security: Wireless networking protocols and security issues.
801.11 protocols, attacks, and countermeasures.
SUGGESTED BOOKS

1. Pfleeger, C.P., Security in Computing 5th Edition, Prentice Hall, 2012

2. Schneier, Bruce. Applied Cryptography, Second Edition, John Wiley & Sons, 2016

You might also like