Information Security (IT-8001) - B.E RGPV CBCS & CBGS Scheme Notes -->
Information Security (IT-8001)
Information Security (IT-8001) RGPV notes CBGS Bachelor of engineering

rgpv bhopal, diploma, rgpv syllabus, rgpv time table, how to get transcript from rgpv, rgpvonline,rgpv question paper, rgpv online question paper, rgpv admit card, rgpv papers, rgpv scheme

RGPV notes CBGS Bachelor of engineering

Syllabus

UNIT 1:
Basic of Cryptography, secret key cryptography, Types of attack, Substitution ciphers, Transposition ciphers, block ciphers and steam ciphers, Confusion and Diffusion, Data encryption standard, round function, modes of operation, cryptanalysis, brute force attack, Security Goals (Confidentiality, Integrity, Availability).

UNIT 2:
Public key Cryptography, Modulo arithmetic, Greatest common divisor, Euclidean algorithm, RSA algorithm, hash function, attack on collision resistance, Diffie hellman key exchange, Digital signature standard, elliptic curve cryptography.

UNIT 3:
Authentication: One way Authentication, password based, certificate based, Mutual Authentication ,shared secret based, Asymmetric based, Authentication and key agreement, centralized Authentication, eavesdropping, Kerberos, IP security overview:- security association & Encapsulating security payload ,tunnel and transfer modes, internet key exchange protocol, Secure Socket Layer(SSL), Transport Layer Security (TLS).

UNIT 4:
Software vulnerabilities: Phishing Attacks, buffer overflow vulnerability, Format String attack, Cross Site Scripting, SQL injection Attacks, Email security:- Security services of E-mail ,Establishing keys, Privacy ,Authentication of the source, Message integrity ,Non-Repudiation, Viruses, Worms, Malware.

UNIT 5:
Web Issue: Introduction, Uniform Resource Locator/uniform resource identify, HTTP, Cookies, Web security problem, Penetration Testing, Firewalls:- functionality, Polices and Access Control, Packet filters, Application level gateway, Encrypted tunnel, Security architecture, Introduction to intrusion detection system.


NOTES


Books Recommended

William Stalling, “ Cryptography and Network security”, Pearson.
Atual Kahate, “ Cryptography and Network Security”, TMH.
Bernard Menezes, “ Network Security and Cryptography”, CENGAGE Learning.
Charlie Kaufman, “ Network Security”, PHI.
Forouzan, “Cryptography & Network Security”, TMH
Randy Weaver, “ Network Infrastructure Security”, Cengage Learning.


List of Experiment:-

 Study of Network Security fundamentals - Ethical Hacking, Social Engineering practices.
 System threat attacks - Denial of Services.
 Sniffing and Spoofing.
 Web Based Password Capturing.
 Virus and Trojans.
 Anti-Intrusion Technique – Honey pot.
 Symmetric Encryption Scheme – RC4.
 Block Cipher – S-DES, 3-DES.
 Asymmetric Encryption Scheme – RSA.
 IP based Authentication.


You May Also Like

Follow Author Here:

Services

COMPLETELY FREE !!!

Yup, everything is free....

NO REGISTRATION REQUIRED

User doesn't have to register for accessing the files, all the files are free & universally accessible without any condition or restriction.

RESPONSIVE DESIGN & USER-FRIENDLY

Our webpages are responsive & user-friendly, which means it will automatically adjust according to your device screen size and you will find stuff without ant hustle.

DIRECT DOWNLOAD LINKS WITH HIGN SPEED

All the files are uploaded on our super-fast servers so that they can be easily downloaded with high speed.

NEW PROJECTS

For providing a better experience to our users we are developing our Android application, the application will have a lot of awesome features so stay tuned ;).

AWESOME SUPPORT TEAM

Our AI-powered Chatbots are always here to help you so, feel free to ask any question or report if you face any problem. Our team also monitors all chatbots traffic & they will contact you if chatbot fails to help.

Contact Us