Course Code: Introduction to Cyber Security L T P C
Version No. XXX Date of Approval: 3 0 0 3
Prerequisite/Exposure Cryptographic Fundamentals
Co-requisites
Course Objectives
1. To learn the concepts of number theory, cryptographic techniques.
2. To understand integrity and authentication process.
3. To familiarize various cyber threats, attacks, vulnerabilities and defensive
mechanisms.
4. To know about security policies and practices.
Course Outcomes
At the end of the course, student will be able to
1. Know the fundamental mathematical concepts related to security.
2. Understand and implement the cryptographic techniques and know the real time
applications of various cryptographic techniques.
3. Comprehend the authenticated process and integrity, and its implementation.
4. Know fundamentals of cybercrimes and the cyber offenses.
5. Understand the cyber threats, attacks and vulnerabilities and its defensive
mechanism.
6. Design suitable security policies.
Course Description:
This course provides knowledge on the various cyber threats and attacks. To learn
the cyber security policies and crime laws.
Text Books:
1. Cryptography and Network security, William Stallings, Pearson Education, 7th Edition,
2016.
2. Cyber Security, Understanding cyber crimes, computer forensics and legal perspectives,
Nina Godbole, Sunit Belapure, Wiley Publications, Reprint 2016.
3. Writing Information Security Policies, Scott Barman, New Riders Publications, 2002.
Reference Books:
1. Cybersecurity for Dummies, Brian Underdahl, Wiley, 2011
2. Cryptography and Network security, Behrouz A. Forouzan , Debdeep Mukhopadhyay,
Mcgraw Hill Education, 2 nd Edition, 2011.
Course Content
Unit I: Introduction 9 lecture hours
Finite Fields and Number Theory: Modular arithmetic – Euclidian Algorithm – Primality
Testing – Fermat’s and Euler’s theorem –Chinese Reminder theorem – Discrete Logarithms
Unit II: Cryptographic Techniques 9 lecture hours
Symmetric key cryptographic techniques: Introduction to Stream cipher – Block cipher:
DES – AES- IDEA. Asymmetric key cryptographic techniques: principles – RSA – ElGamal -
Elliptic Curve cryptography – Key distribution and Key exchange protocols.
Unit III: Authentication and Cybercrimes 9 lecture hours
Hash functions – Secure Hash Algorithm (SHA) Message Authentication – Message
Authentication Code (MAC) – Digital Signature Algorithm: RSA & ElGamal based
Classification of cybercrimes – planning of attacks – social engineering: Human based –
Computer based – Cyberstalking – Cybercafe and Cybercrimes
Unit IV: Cyber Threats, Attacks and Prevention: 9 lecture hours
Phishing – Password cracking – Keyloggers and Spywares – DoS and DDoS attacks – SQL
Injection. Identity Theft (ID) : Types of identity theft – Techniques of ID theft.
Unit V: Cybersecurity Policies and Practices 9 lecture hours
What security policies are – determining the policy needs – writing security policies –
Internet and email security policies – Compliance and Enforcement of policies- Review
Mode of Evaluation: Class Quiz, Assignment, CAT -1, CAT – 2 and ETE.
Theory
Components Internal (50) SEE
Assignment (5)
Quiz (15)
Cat-2 Semester End
Marks Cat-1 (15)
(15) Exam (50)
Total Marks 100
Relationship between the Course Outcomes (COs) and Program Outcomes (POs):
Mapping between Cos and Pos
Sl. No. Course Outcomes (COs) Mapped Program Outcomes
Know the fundamental mathematical
1 PO1,PO9,PO10,PO12,PSO3,
concepts related to security
Understand and implement the
cryptographic techniques and know the
2 PO1,PO4,PO9,PSO13,PSO1
real time applications of various
cryptographic techniques
3 Comprehend the authenticated process and PO1,PO2,PO,PO10,PSO2,PSO3
integrity, and its implementation
4 Know fundamentals of cybercrimes and the PO1,PO2,PO4,PO9,PSO2
cyber offenses
Understand the cyber threats, attacks and
5 vulnerabilities and its defensive PO1,PO2,PO4,PO6,PO10,PO12,PSO1
mechanism.
6 Design suitable security policies PO1,PO2,PO3,PO4,PO6,PSO1,PSO3