0% found this document useful (0 votes)
127 views

16CS2E56 Cyber Security Syllabus

This document outlines the course outcomes and topics covered in a cyber security course. The course aims to help students understand computer security concepts, illustrate authentication mechanisms, identify system and network vulnerabilities, and develop basic security enhancements. Key topics covered include computer security foundations, user authentication methods, database and data center security, malicious software, denial-of-service attacks, and firewalls and intrusion prevention. The course will utilize two primary textbooks and two reference books over 45 periods.

Uploaded by

krishnakumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
127 views

16CS2E56 Cyber Security Syllabus

This document outlines the course outcomes and topics covered in a cyber security course. The course aims to help students understand computer security concepts, illustrate authentication mechanisms, identify system and network vulnerabilities, and develop basic security enhancements. Key topics covered include computer security foundations, user authentication methods, database and data center security, malicious software, denial-of-service attacks, and firewalls and intrusion prevention. The course will utilize two primary textbooks and two reference books over 45 periods.

Uploaded by

krishnakumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

16CS2E56 CYBER SECURITY 3003

Course Outcomes:
CO1: Understand the concepts and foundations of computer security
CO2: Illustrate various authentication mechanisms.
CO3: Identify vulnerabilities of systems and networks.
CO4: Develop basic security enhancements in networking environments.

Overview 9
Computer Security Concepts - Threats, Attacks, and Assets - Security Functional Requirements -
Fundamental Security Design Principles - Attack Surfaces and Attack Trees- Computer Security
Strategy - Cryptographic Tools - Confidentiality with Symmetric Encryption - Message
Authentication and Hash Functions - Public-Key Encryption - Digital Signatures and Key
Management

User Authentication 9
Electronic User Authentication Principles - Password-Based Authentication - Token-Based
Authentication - Biometric Authentication -Remote User Authentication. Access Control -
Access Control Principles - Subjects, Objects, and Access Rights - Discretionary Access Control
- Example: UNIX File Access Control - Role-Based Access Control - Attribute-Based Access
Control - Identity, Credential, and Access Management

Database and Data Center Security 9


The Need for Database Security - Database Management Systems - Relational Databases - SQL
Injection Attacks - Database Access Control - Inference Database Encryption –Data Center
Security

Malicious Software 9
Types of Malicious Software (Malware) - Advanced Persistent Threat - Propagation—Infected
Content—Viruses - Propagation—Vulnerability Exploit—Worms - Propagation—Social
Engineering—Spam E-Mail, Trojans - Payload—System Corruption - Payload—Attack
Agent—Zombie, Bots - Payload—Information Theft—Keyloggers, Phishing, Spyware -
Payload—Stealthing—Backdoors, Rootkits

Denial-of-Service Attacks 9
Denial-of-Service Attacks- Flooding Attacks - Distributed Denial-of-Service Attacks -
Application-Based Bandwidth Attacks - Reflector and Amplifier Attacks - Defenses Against
Denial-of-Service Attacks - Responding to a Denial-of-Service Attack - Firewalls and
Intrusion Prevention Systems - The Need for Firewalls - Firewall Characteristics and Access
Policy - Types of Firewalls - Firewall Basing - Firewall Location and Configurations - Intrusion
Prevention Systems
Total Periods: 45
TEXT BOOKS:
1. William Stallings, Lawrie Brown, “Computer Security: Principles and Practice,Pearson; 4
edition, Global Edition, 2018.
2. Michael T. Goodrich and Roberto Tamassia, Introduction to Computer Security: Pearson
New International Edition, 2013.
REFERENCE BOOKS:
1. Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, Handbook of Applied
Cryptography, CRC Press, 2001
2. William Stallings, Network Security Essentials: Applications and Standards, Pearson, 6th
edition, 2017.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy