16CS2E56 Cyber Security Syllabus
16CS2E56 Cyber Security Syllabus
Course Outcomes:
CO1: Understand the concepts and foundations of computer security
CO2: Illustrate various authentication mechanisms.
CO3: Identify vulnerabilities of systems and networks.
CO4: Develop basic security enhancements in networking environments.
Overview 9
Computer Security Concepts - Threats, Attacks, and Assets - Security Functional Requirements -
Fundamental Security Design Principles - Attack Surfaces and Attack Trees- Computer Security
Strategy - Cryptographic Tools - Confidentiality with Symmetric Encryption - Message
Authentication and Hash Functions - Public-Key Encryption - Digital Signatures and Key
Management
User Authentication 9
Electronic User Authentication Principles - Password-Based Authentication - Token-Based
Authentication - Biometric Authentication -Remote User Authentication. Access Control -
Access Control Principles - Subjects, Objects, and Access Rights - Discretionary Access Control
- Example: UNIX File Access Control - Role-Based Access Control - Attribute-Based Access
Control - Identity, Credential, and Access Management
Malicious Software 9
Types of Malicious Software (Malware) - Advanced Persistent Threat - Propagation—Infected
Content—Viruses - Propagation—Vulnerability Exploit—Worms - Propagation—Social
Engineering—Spam E-Mail, Trojans - Payload—System Corruption - Payload—Attack
Agent—Zombie, Bots - Payload—Information Theft—Keyloggers, Phishing, Spyware -
Payload—Stealthing—Backdoors, Rootkits
Denial-of-Service Attacks 9
Denial-of-Service Attacks- Flooding Attacks - Distributed Denial-of-Service Attacks -
Application-Based Bandwidth Attacks - Reflector and Amplifier Attacks - Defenses Against
Denial-of-Service Attacks - Responding to a Denial-of-Service Attack - Firewalls and
Intrusion Prevention Systems - The Need for Firewalls - Firewall Characteristics and Access
Policy - Types of Firewalls - Firewall Basing - Firewall Location and Configurations - Intrusion
Prevention Systems
Total Periods: 45
TEXT BOOKS:
1. William Stallings, Lawrie Brown, “Computer Security: Principles and Practice,Pearson; 4
edition, Global Edition, 2018.
2. Michael T. Goodrich and Roberto Tamassia, Introduction to Computer Security: Pearson
New International Edition, 2013.
REFERENCE BOOKS:
1. Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, Handbook of Applied
Cryptography, CRC Press, 2001
2. William Stallings, Network Security Essentials: Applications and Standards, Pearson, 6th
edition, 2017.