Information Security (COMP-SEM VI) | V.S. BAGAD, I. A. Dhotre, DR.SWATI NIKAM | Technical Publications

Authors Name V.S. BAGAD, I. A. Dhotre, DR.SWATI NIKAM
ISBN 13 9789355850393
Publisher Technical Publishers
Edition 3rd
Pages
Language English
Publishing Year 2024

Email on info@pragationline.com if e-book is not found.

Estimated Delivery Time

Within Pune (1 to 2 days),
Within Maharashtra (2 to 5 days),
Outside Maharashtra (3 to 6 days) and
J&K, Ladakh and North East (5 to 8 days).

Print version 395 336
15% OFF
  • Print Version: The estimated delivery date of the print version is approximately 3 to 5 working days from the date of placing the order

  • For any queries write to info@pragationline.com

Add to Cart Go to Library Add to Cart Buy Now
download-app-scan
download-app

Description
SPPU TEXT /Computer /TE- SEM VI / Elective – II
Unit I        Introduction to Information Security

Foundations of Security, Computer Security Concepts, The OSI Security Architecture, Security attacks, Security services, Security mechanism, A Model for Network Security. (Chapter – 1)

Unit II      Symmetric Key Cryptography

Classical Encryption Techniques : Stream Ciphers, Substitution Techniques : Caesar Cipher, Mono alphabetic Ciphers, Play fair Cipher, Hill Cipher, Poly alphabetic Ciphers, Transposition Techniques, Block Ciphers and Data Encryption standards, 3DES, Advanced Encryption standard. (Chapter – 2)

Unit III     Asymmetric Key Cryptography

Number theory : Prime number, Fermat and Euler theorems, Testing for primality, Chinese reminder theorem, discrete logarithm, Public Key Cryptography and RSA, Key Management, Diffie-Hellman key exchange, El Gamal algorithm, Elliptic Curve Cryptography. (Chapter – 3)

Unit IV     Data Integrity Algorithms And Web Security

Cryptographic Hash Functions : Applications of Cryptographic Hash Functions, Two Simple Hash Functions, Requirements and Security, Hash Functions Based on Cipher Block Chaining, Secure Hash Algorithm (SHA), SHA-3, MD4, MD5. Message Authentication Codes : Message Authentication Requirements, Message Authentication Functions, Requirements for Message Authentication Codes, Security of MACs.  Digital Signatures :  Digital Signatures, Schemes, Digital Signature standard, PKI X.509 Certificate.

Web Security issues, HTTPS, SSH, Email security : PGP, S/MIME, IP Security : IPSec. (Chapter – 4)

Unit V      Network and System Security

The OSI Security architecture, Access Control, Flooding attacks, DOS, Distributed DOS attacks Intrusion detection, Host based and network based Honeypot, Firewall and Intrusion prevention system, Need of firewall, Firewall characteristics and access policy, Types of Firewall, DMZ networks, Intrusion prevention system : Host based, Network based, Hybrid.

Operating system Security, Application Security, Security maintenance, Multilevel Security, Multilevel Security for role based access control, Concepts of trusted system, Trusted computing. (Chapter – 5)

Unit VI     Cyber Security and Tools

Introduction, Cybercrime and Information Security, Classification of Cybercrimes, The legal perspectives-Indian perspective, Global perspective, Categories of Cybercrime, Social Engineering, Cyber stalking, Proxy servers and Anonymizers, Phishing, Password Cracking, Key-loggers and Spywares, The Indian IT Act-Challenges, Amendments, Challenges to Indian Law and Cybercrime Scenario in India, Indian IT Act. (Chapter – 6)

Reviews (0)

Reviews

There are no reviews yet.

Be the first to review “Information Security (COMP-SEM VI) | V.S. BAGAD, I. A. Dhotre, DR.SWATI NIKAM | Technical Publications”

0
    0
    Your Cart
    Your cart is emptyReturn to Shop
      Calculate Shipping
      Apply Coupon
      Information Security (COMP-SEM VI) | V.S. BAGAD, I. A. Dhotre, DR.SWATI NIKAM | Technical Publications