0% found this document useful (0 votes)
103 views10 pages

40-21077 21077 MONALI Publication 846 1685000651706 PDF

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
103 views10 pages

40-21077 21077 MONALI Publication 846 1685000651706 PDF

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

A TEXT BOOK OF

CYBER SECURITY
FOR
SEMESTER – VI

THIRD YEAR DEGREE COURSE IN


ARTIFICIAL INTELLIGENCE AND DATA SCIENCE
Strictly According to New Revised Credit System Syllabus
of Savitribai Phule Pune University
(w.e.f. June 2021-2022)

Ms. MONALI R. BORADE NITIN N. SAKHARE


M.E. (Comp. Engg.) M. E. (Comp. Networks)
Assistant Professor, Assistant Professor,
AI & DS Department, Computer Engineering Department,
Vishwakarma Institute of Information Technology, Vishwakarma Institute of Information Technology,
Kondhwa (Bk.), Pune. Kondhwa (Bk.), Pune.

SACHIN P. GODSE
M.E. CSE (IT),
Pune.

Price ` 200.00

N6452
CYBER SECURITY (TE AI & DS) ISBN : 978-81-19115-49-5
First Edition : April 2023
© : Authors
The text of this publication, or any part thereof, should not be reproduced or transmitted in any form or stored in any computer storage system or
device for distribution including photocopy, recording, taping or information retrieval system or reproduced on any disc, tape, perforated media or other
information storage device etc., without the written permission of Authors with whom the rights are reserved. Breach of this condition is liable for legal
action.
Every effort has been made to avoid errors or omissions in this publication. In spite of this, errors may have crept in. Any mistake, error or
discrepancy so noted and shall be brought to our notice shall be taken care of in the next edition. It is notified that neither the publisher nor the authors
or seller shall be responsible for any damage or loss of action to any one, of any kind, in any manner, therefrom. The reader must cross check all the facts
and contents with original Government notification or publications.
Published By : Polyplate Printed By :
NIRALI PRAKASHAN YOGIRAJ PRINTERS AND BINDERS
Abhyudaya Pragati, 1312 Shivaji Nagar Survey No. 10/1A, Ghule Industrial Estate
Off J.M. Road, PUNE 411005 Nanded Gaon Road
Tel : (020) 25512336/37/39 Nanded, Pune 411041
Email : [email protected]

DISTRIBUTION CENTRES
PUNE
Nirali Prakashan Nirali Prakashan
(For orders outside Pune) (For orders within Pune)
S. No. 28/27, Dhayari Narhe Road, Near Asian College 119, Budhwar Peth, Jogeshwari Mandir Lane
Pune 411041, Maharashtra Pune 411002, Maharashtra
Tel : (020) 24690204; Mobile : 9657703143 Mobile : 9657703145, 9890997937
Email : [email protected] Email : [email protected]

MUMBAI
Nirali Prakashan
Rasdhara Co-op. Hsg. Society Ltd., 'D' Wing Ground Floor, 385 S.V.P. Road
Girgaum, Mumbai 400004, Maharashtra
Mobile : 7045821020, Tel : (022) 2385 6339 / 2386 9976
Email : [email protected]

DISTRIBUTION BRANCHES

DELHI BENGALURU NAGPUR


Nirali Prakashan Nirali Prakashan Nirali Prakashan
Room No. 2 Ground Floor Maitri Ground Floor, Jaya Above Maratha Mandir, Shop No. 3,
th th
4575/15 Omkar Tower, Agarwal Road Apartments, No. 99, 6 Cross, 6 First Floor, Rani Jhanshi Square,
Darya Ganj, New Delhi 110002 Main, Malleswaram, Bengaluru Sitabuldi Nagpur 440012 (MAH)
Mobile : 9555778814/9818561840 560003 Karnataka; Mob : 9686821074 Tel : (0712) 254 7129
Email : [email protected] Email : [email protected] Email : [email protected]

KOLHAPUR JALGAON SOLAPUR


Nirali Prakashan Nirali Prakashan Nirali Prakashan
438/2, Bhosale Plaza, Ground Floor, 34, V. V. Golani Market, Navi Peth, R-158/2, Avanti Nagar, Near Golden
Khasbag, Opp. Balgopal Talim, Jalgaon 425001, Maharashtra Gate, Pune Naka Chowk
Kolhapur 416 012 Maharashtra Tel : (0257) 222 0395 Solapur 413001, Maharashtra
Mob : 9850046155 Mob : 94234 91860 Mobile 9890918687
Email : [email protected] Email : [email protected] Email : [email protected]

[email protected] | www.pragationline.com
Also find us on www.facebook.com/niralibooks
PREFACE

It gives us great pleasure to present the book 'Cyber Security' for the students of Third Year (TE) Degree
Course in Artificial Intelligence and Data Science of Savitribai Phule Pune University. This book is strictly as per
the New Revised Credit System Syllabus 2020 Pattern with effect from the Academic Year June 2021-2022.

As per New Revised Examination Scheme which has been implemented from this academic year,
Mid-Semester assessment carries 30 marks over first two units and End-Semester Examination carries 70
marks on the remaining units 3, 4, 5 and 6.

The Theory Course will have 3 Credits.

The book is written such that all the basic concepts are explained in a simplified manner. It is presented in a
more conceptual manner rather than mathematical, as required by the new examination system. It is our objective
to keep the presentation systematic, consistent, intensive and clear, through explanatory notes and figures.

Main feature of this book is, Complete Coverage of the New Credit System Syllabus with solved
Examples, Exercises and Model Question Papers of Mid-Sem. and End-Sem. Exams.

We are sure that this book will cater to all needs of the students for this subject.

We also take this opportunity to express our sincere thanks to Shri. Dineshbhai Furia, Shri. Jignesh Furia,
Mrs. Nirali Verma and entire team of Nirali Prakashan, namely Mrs. Deepali Lachake (Co-ordinator), who really have
taken keen interest and untiring efforts in publishing this text.

We wish to make a special mention of the valuable contribution made by Late Shri M.P. Munde during the last
two decades in reaching out to students, parents and teachers which eventually made Nirali Prakashan, a brand of
trust and quality in technical books. Without his perseverance and zeal, successive editions would not have been
possible.

The advice and suggestions of our esteemed readers, to improve the text, are most welcome and will be highly
appreciated.

Pune Authors
SYLLABUS

Unit I: Introduction (06 Hours)

Introduction, Elements of Information Security, Security Policy, Techniques, Steps, Categories, Operational Model of
Network Security, Basic Terminologies in Network Security. Threats and Vulnerability, Difference between Security and
Privacy.

Unit II: Data Encryption Techniques and Standards ( 08 Hours)

Introduction, Encryption Methods: Symmetric, Asymmetric, Cryptography, Substitution Ciphers. Transposition Ciphers,
Stenography applications and limitations, Block Ciphers and methods of operations, Feistal Cipher, Data Encryption
Standard (DES), Triple DES, Weak Keys in DES Algorithms, Advance Encryption Standard (AES).

Unit III: Public Key and Management (08 Hours)

Public Key Cryptography, RSA Algorithm: Working, Key length, Security, Key Distribution, Deffie-Hellman Key Exchange,
Elliptic Curve: Arithmetic, Cryptography, Security, Authentication methods, Message Digest, Kerberos, X.509 Authentication
service. Digital Signatures: Implementation, Algorithms, Standards (DSS), Authentication Protocol.

Unit IV: Security Requirements (08 Hours)

IP Security: Introduction, Architecture, IPV6, IPv4, IPSec protocols, and Operations, AH Protocol, ESP Protocol, ISAKMP
Protocol, VPN. WEB Security: Introduction, Secure Socket Layer (SSL), SSL Session and Connection, SSL Record Protocol,
Change Cipher Spec Protocol, Alert Protocol, Handshake Protocol. Electronic Mail Security: Introduction, Pretty Good
Privacy, MIME, S/MIME, Comparison. Secure Electronic Transaction (SET).

Unit V: Firewall and Intrusion (08 Hours)

Introduction, Computer Intrusions. Firewall Introduction, Characteristics and types, Benefits and limitations. Firewall
architecture, Trusted Systems, Access Control. Intrusion detection, IDS: Need, Methods, Types of IDS, Password
Management, Limitations and Challenges.

Unit VI: Cyber Forensic, Hacking and its Countermeasures (08 Hours)

Personally Identifiable Information (PII), Cyber Stalking, Cybercrime, PII Confidentiality Safeguards, Information Protection
Law: Indian Perspective. Hacking: Remote connectivity and VoIP hacking, Wireless Hacking, Mobile Hacking,
countermeasures
CONTENTS
Unit I : Introduction 1.1 – 1.12
1.1 Introduction 1.1
1.2 Security Overview 1.1
1.2.1 Security Enhancement Strategies 1.1
1.3 Elements of Information Security 1.2
1.4 Attributes of Security 1.3
1.5 Security Policies 1.3
1.6 Security Techniques / Mechanisms 1.6
1.7 Basic Terminologies in Network Security/ Network Terminology 1.7
1.8 Steps for Better Security 1.8
1.9 Types /Categories of Security 1.8
1.10 Operational Model of Network Security 1.8
1.10.1 Secure Communication 1.9
1.10.2 Secure Systems 1.9
1.11 Basic Security Terminology 1.9
1.12 Threats and Vulnerability 1.11
1.13 Difference between Security and Privacy 1.11
• Exercise 1.11
• University Questions 1.11
Unit II : Data Encryption Techniques and Standards 2.1 – 2.24
2.1 Introduction 2.1
2.1.1 Cryptography Goals 2.1
2.2 Types of Cryptographic Methods 2.1
2.3 Terms Related to Cryptography 2.2
2.4 Cipher Techniques 2.2
2.4.1 Substitution Techniques 2.2
2.4.2 Transposition Ciphers 2.5
2.5 Steganography 2.7
2.5.1 Types of Steganography 2.7
2.5.2 Steganography Applications and Limitations 2.9
2.6 Block Ciphers 2.9
2.6.1 Concept of Confusion and Diffusion 2.9
2.6.2 Iterated Ciphers 2.10
2.7 Stream Ciphers 2.10
2.7.1 Comparison between Stream Ciphers and Block Ciphers 2.10
2.8 Symmetric Key Algorithms 2.11
2.8.1 Data Encryption Standard 2.11
2.8.2 AES Advanced Encryption Standard Algorithm 2.16
2.9 Modes of Operations of Algorithms 2.17
2.9.1 Electronic Code Book (ECB) 2.18
2.9.2 Cipher Block Chaining (CBC) Mode 2.18
2.9.3 Cipher Feedback (CFB) Mode 2.19
2.9.4 Output Feedback Mode 2.21
2.9.5 Counter Mode 2.22
• Exercise 2.22
• University Questions 2.23
Unit III : Public Key and Management 3.1 – 3.34
3.1 Public Key Cryptography 3.1
3.2 One–Way Functions 3.1
3.3 Trapdoor One–Way Functions 3.2
3.4 RSA (Rivest–Shamir–Adleman) Algorithm 3.2
3.4.1 Implementation of RSA 3.2
3.4.2 RSA Algorithm 3.3
3.4.3 RSA Key Usage 3.3
3.4.4 Example of RSA 3.3
3.4.5 RSA Security 3.3
3.5 Key Management 3.4
3.5.1 Distribution of Public Keys 3.5
3.5.2 Distribution of Secret Keys 3.6
3.5.3 Distribution of Secret Key using Public Key Cryptography 3.7
3.5.4 PKI for Key Management 3.8
3.5.5 PKI Architecture Model and Components 3.8
3.6 Diffie-Hellman (DH) Key Exchange/Agreement Algorithm 3.9
3.6.1 Diffie-Hellman Key Exchange Algorithm Steps 3.9
3.6.2 Example of Diffie-Hellman Key Exchange 3.9
3.6.3 Security 3.9
3.6.4 Problems with the Algorithm 3.9
3.7 Elliptic Curve: Arithmetic Cryptography 3.10
3.7.1 Key Generation 3.11
3.7.2 Encryption 3.11
3.7.3 Decryption 3.11
3.7.4 Proof 3.11
3.8 Authentication Methods 3.11
3.8.1 One Way Authentication 3.11
3.8.2 Mutual Authentication 3.12
3.8.3 Entity Authentication / Identification 3.13
3.9 Message Digest 3.13
3.9.1 Message Digest Functions 3.14
3.9.2 Hash Function 3.15
3.9.3 Security of Hash Functions and MAC 3.16
3.9.4 HMAC Algorithm 3.17
3.10 Hash Algorithms 3.18
3.10.1 Secure Hash Algorithm (SHA)–1 3.18
3.10.2 MD–5 (Message Digest –5) Algorithm 3.19
3.11 Kerberos Authentication Protocol 3.21
3.11.1 Kerberos Version 5.0 3.23
3.12 X.509 Certificates 3.23
3.12.1 Certificate Directories 3.24
3.12.2 Certificate Revocation List (CRL) 3.24
3.13 Digital Certificate 3.24
3.13.1 Certificate Creation Steps 3.25
3.13.2 Verification of a Digital Certificate 3.26
3.13.3 Revocation of Digital Certificates 3.27
3.14 Digital Signature 3.28
3.14.1 DSS (Digital Signature Standard) 3.28
3.14.2 Digital Signature Algorithm 3.29
3.14.3 The Direct Digital Signature 3.29
3.14.4 The Arbitrated Digital Signature 3.29
3.15 DSS Standards 3.30
3.16 Authentication Protocol 3.31
• Exercise 3.33
• University Questions 3.33
Unit IV: Security Requirements 4.1 – 4.28
4.1 IPSec (IP Security) 4.1
4.1.1 Introduction to IPSec 4.1
4.1.2 IP Security Architecture 4.2
4.1.3 Tunneling Protocols 4.3
4.1.4 IPSec Protocols 4.3
4.1.5 IPSec Modes 4.4
4.2 IPV6 (Internet Protocol Version 6) 4.5
4.3 IPV4 (Internet Protocol Version 4) 4.5
4.4 IKE- Internet Key Exchange Protocol 4.7
4.4.1 ISAKMP Internet Security Association and Key Management Protocol 4.7
4.4.2 IKE Phases / Modes 4.8
4.4.3 IKE Authentication Methods 4.10
4.4.4 Security Mechanisms 4.10
4.5 Oakley Determination Protocol 4.11
4.6 Virtual Private Networks (VPNs) 4.12
4.7 WEB Security: Introduction 4.12
4.8 SSL (Secure Socket Layer) 4.13
4.8.1 Introduction to SSL 4.14
4.9 Change Cipher Spec Protocol 4.14
4.10 Alert Protocol 4.15
4.11 Handshake Protocol 4.15
4.11.1 Difference between IPSec and SSL 4.16
4.12 Introduction to Electronic Mail Security 4.17
4.13 Pretty Good Privacy 4.17
4.13.1 Notations used in PGP 4.17
4.13.2 PGP Operation 4.17
4.13.3 Cryptographic Keys and Key Rings 4.19
4.13.4 PGP Message Format 4.20
4.13.5 PGP Message Generation and Reception 4.20
4.13.6 PGP Trust Model 4.21
4.14 S/MIME 4.22
4.14.1 Multipurpose Internet Mail Extensions (MIME) 4.22
4.14.2 MIME Types and Subtypes 4.23
4.14.3 MIME Transfer Encodings 4.23
4.14.4 S/MIME Functionality 4.23
4.14.5 Cryptographic Algorithms Used in S/MIME 4.24
4.14.6 S/MIME Messages 4.24
4.14.7 Difference between PGP and S/MIME 4.25
4.15 Secure Electronic Transaction (SET) 4.25
4.15.1 Key Features of SET 4.25
4.15.2 SET Participants 4.25
4.15.3 Dual Signature 4.27
• Exercise 4.27
• University Questions 4.28
Unit V : Firewall and Intrusion 5.1 – 5.14
5.1 Introduction 5.1
5.2 Computer Intrusions 5.1
5.3 Firewalls 5.1
5.3.1 Firewall Uses 5.1
5.3.2 Firewall Technology 5.2
5.3.3 Firewall Characteristics/Design Principles 5.2
5.3.4 Techniques to Control Access 5.2
5.3.5 Limitations of Firewall 5.2
5.3.6 Firewall Types 5.2
5.3.7 Firewall Configurations 5.4
5.4 Trusted Systems and Access Control 5.5
5.4.1 Data Access Control 5.5
5.4.2 Access Control Model 5.5
5.5 Intrusion Detection Systems 5.7
5.5.1 Need of Intrusion Detection Systems 5.7
5.5.2 Components of IDS 5.7
5.5.3 Structure and Architecture of Intrusion Detection System 5.8
5.5.4 Types of Intrusion Detection System 5.8
5.5.5 Distributed Intrusion Detection Systems 5.10
5.6 Password Management 5.11
5.6.1 Challenges in Password Protections 5.11
5.6.2 Access Control 5.12
5.6.3 Password Selection Strategies 5.12
• Exercise 5.13
• University Questions 5.13
Unit VI : Cyber Forensic, Hacking and its Countermeasures 6.1 – 6.20
6.1 Introduction to Personally Identifiable Information (PII) 6.1
6.2 Cyber Stalking 6.1
6.2.1 How Cyber Stalkers Operate 6.1
6.2.2 Investigating Cyber Stalking 6.2
6.2.3 Cyber Stalking Case Example 6.3
6.2.4 Summary of Cyber Stalking 6.4
6.3 PII Impact Levels with Examples 6.4
6.4 Cyber Crime 6.7
6.4.1 Reasons and Origins of Cyber Crime 6.8
6.4.2 Cyber Criminals 6.9
6.4.3 Classification of Cyber Crimes 6.9
6.4.4 Categories of Cyber Crime 6.9
6.4.5 Types of Cyber Crimes 6.10
6.5 PII Confidentiality Safeguards 6.12
6.5.1 Strategies Used to Safeguard Confidential Information 6.13
6.5.2 Implementing Personal Policies 6.13
6.5.3 Managing Documents 6.14
6.6 Cyber Crime and Cyber Laws : Indian Perspective 6.14
6.6.1 Statutory Provision 6.15
6.7 Cyber Crime and Cyber Laws : Global Perspective 6.15
6.8 Hacking: Remote connectivity and VoIP Hacking 6.16
6.8.1 Remote Connectivity 6.16
6.8.2 RDP Hacking 6.16
6.8.3 VoIP Hacking 6.16
6.8.4 Wireless Hacking 6.16
6.8.5 Wireless Networks 6.17
6.8.6 Wireless Encryption Protocols 6.17
6.8.7 Wireless Hacking Techniques 6.17
6.8.8 Wireless Hacking Tools 6.18
6.8.9 Mobile Hacking 6.17
6.9 Countermeasures 6.18
6.9.1 Hacking Countermeasures 6.19
• Exercise 6.20

• Model Question Papers


In Sem. Exam. (30 Marks) P.1-P.1
End Sem. Exam. (70 Marks) P.2-P.2

You might also like