This course introduces the students to the concepts of information security and different type of attacks in the cyber space. The course also introduces countermeasures to mitigate attacks and different existing cyber laws.
At the end of the course, students should be able to:
Definitions :Protection, Security, risk, threat, vulnerability, exploit, attack, confidentiality, integrity, availability, non-repudiation, authentication, authorization, codes, plain text, encryption, decryption, cipher text, key, ciphers, Symmetric and asymmetric cryptography, Public key , private key ,Crypt analysis,, Cyber forensics. Substitution cipher (Caesar), Transposition cipher (Rail-Fence).
Risk analysis, process, key principles of conventional computer security, security policies, data protection, access control, internal vs external threat, security assurance, passwords, access control, computer forensics and incident response.
CYBER ATTACKS (definitions and examples): Denial-of-service attacks, Man-in-the- middle attack, Phishing, spoofing and spam attacks, Drive-by attack, Password attack, SQL injection attack, Cross-site scripting attack, Eavesdropping attack, Birthday attack, Malware attacks, Social Engineering attacks.
Brief Introduction of handling the attacks described in UNIT 3. Firewalls, logging and intrusion detection systems, e-mail security, security issues in operating systems, ethics of hacking and cracking..
Definitions: Digital Signature and Electronic Signature, Digital Certificate
i.[Section 43] Penalty and compensation for damage to computer etc. ii.[Section 65] Tampering with computer source documents
iii .[Section 66A] Punishment for sending offensive messages through communication service etc.
iv .[Section 66B] Punishment for dishonestly receiving stolen computer resource or communication device
v .[Section 66C] Punishment for identity theft
vi .[Section 66D] Punishment for cheating by impersonation by using computer resource vii.[Section 66E] Punishment for violation of privacy
viii .[Section 66F] Punishment for cyber terrorism
ix .[Section 67] Punishment for publishing or transmitting obscene material in electronic form
x .[Section 67A] Punishment for publishing or transmitting of material containing sexually explicit act, etc. in electronic form
xi .[Section 67B] Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc. in electronic form
xii .[Section 72] Breach of confidentiality and privacy.
Brief introduction of IT infrastructure in India, National agencies handling IT.