To study the concepts and requirements of Information Security.
Information Security - Critical Characteristics of Information, NSTISSC Security Model,
Components of an Information System, Securing the Components, Balancing Security and
Access, SDLC, Security SDLC
Cryptography: Classical Cryptography, Symmetric Cryptography, Public Key (Asymmetric
cryptography), Modern Cryptography. Forensics: DRM technology (including watermarking
and fingerprinting of images, video and audio), Steganography, Biometrics
Network Security: Network Protocols, Wireless Security (WiFi, WiMAX,Bluetooth, cell
phone), IDSand Network Intrusion Management
Application Security: Email Security, Web Security, and Database Security, Secure Software
Development, VoIP Security
Information Security Threats: Viruses, Worms and other malware, Email Threats, Web
Threats, RFID, Identity Theft, Data Security Breaches, Hacking Tools and Techniques
1. W. Stallings, Cryptography and Network Security: Principles and Practice, 6th Edition,
Prentice Hall, 2013
2. Neil Daswani, Christoph Kern, Anita Kesavan, " Foundations of Security: What Every
Programme”, APRESS, 2007.
3. Michael E Whitman and Herbert J Mattord, "Principles of Information Security",
Vikas Publishing House,2003.
Students will be able to:
1. Explain the models of information security
2. Apply cryptography techniques to data
3. Simulate the various network security issues
4. Experiment with application security
5. Explore the nature and logic behind the various security threats on the web
Expert Lecture on Security Related Issues from Ethical Hackers.