Connected successfully
Security trends-Security attacks, services, and mechanism – Cryptographic Conventional Encryption- Classical encryption techniques: Substitution ciphers and transposition ciphers –Block cipher principles-block cipher modes of Operation-DES, Advanced Encryption Standard (AES).
Mathematics Of Symmetric and Asymmetric Key Cryptography: Introduction to Groups, Rings, and fields - Modular arithmetic- Euclid’s Algorithm- Prime and primality testing - Fermat’s and Euler’s theorem - Chinese Remainder theorem. RSA Algorithm-Diffie Hellman Key exchange- Hash Functions-Hash Algorithms (MD5, Secure Hash Algorithm).
Cyber Threats-Cyber Warfare, Cyber Crime, Cyber terrorism, Cyber Espionage, etc., Comprehensive Cyber Security Policy. Fraud Techniques- Threat Infrastructure- Techniques to Gain a Foothold (Shellcode, SQL Injection, Malicious PDF Files)- Misdirection, Reconnaissance, and Disruption Methods-Case studies.
Data theft– Intrusion detection systems –Types of Insider Attack- Insider Threat Issues-Model of the Insider Sabotage Problem-Mitigation of Insider Sabotage problem
Security Planning - Business Continuity Planning - Handling Incidents - Risk Analysis -Dealing with Disaster - Emerging Technologies - The Internet of Things – Artificial Intelligence- Block chain- Case studies: Economics -Electronic Voting
Reference Book:
1. BehrouzA.Foruzan, Cryptography and Network Security, Tata McGraw Hill 2007. (unit 1and 2) 2. Salvator J.Stolfo, Steven M.Bellovin, Shlomo Hershkop, Angelos D. Keromytis, Sara Sinclair, and Sean W.Smith (Eds), “Insider Attack and Cyber Security: Beyond the Hackerâ€, Springer, 2008.
Text Book:
1. William Stallings, Cryptography and Network Security: Principles and Practice, PHI 3rd Edition, 2006. (Unit 1 and 2) 2. James Graham, Richard Howard, and Ryan Olson (Eds), “Cyber Security Essentialsâ€, CRC Press, 2011. (Unit 3, 4) 3. Charles P. Pfleeger Shari Lawrence Pfleeger Jonathan Margulies, Security in Computing, 5th Edition, Pearson Education, 2015 (Unit 5)