0% found this document useful (0 votes)
36 views5 pages

Cns Front Page

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views5 pages

Cns Front Page

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

(Approved by AICTE, New Delhi & Affiliated to Anna University)

No.60,Avadi – Vel Tech Road,Chennai-600 062.

IT8761 – SECURITY LABORATORY

NAME :

REGISTER NO :

ROLLNO :

BRANCH :

YEAR :

SEMESTER :
(Approved by AICTE, New Delhi & Affiliated to Anna University)
No.60, Avadi– Vel Tech Road, Chennai - 600 062.

BONAFIDE CERTIFICATE

Name:
Year: Semester: Branch:B.TECH -INFORMATION TECHNOLOGY
University Register……………………………….College Roll No:…………

Certified that this is the bonafide record of work done by the above student in
IT8761 SECURITY LABORATORY during the academic year 2022 -2023.

Signature of Course In charge Signature of Head of the Department

Submitted for the University Practical Examination held on.......................... at VELTECH


HIGHTECH Dr.RANGARAJAN Dr.SAKUNTHALA ENGINEERING COLLEGE, No.60,
AVADI– VEL TECH ROAD, AVADI,CHENNAI-600062.

Signature of Examiners

Internal Examiner:…………………… External Examiner:………………..……

Date:…………….……..
VEL TECH HIGH TECH DR.RANGARAJAN DR.SAKUNTHALA
ENGINEERING COLLEGE
INSTITUTION VISION
Pursuit of excellence in technical education to create civic responsibility with competency.

INSTITUTION MISSION
1. To impart the attributes of global engineers to face industrial challenges with social
relevance.
2. To indoctrinate as front runners through moral practices.
3. To attain the skills through lifelong learning.

DEPARTMENT VISION
To blend academic learning process and innovative ideas producing self-confident graduates
with skills and knowledge to compete in the changing world.

DEPARTMENT MISSION
M1: To provide strong basic knowledge in Computer Science and Engineering.
M2: To motivate the students to function as a team from their innovative ideas in collaboration
with the industries.

M3: To enable the students to lead and adapt to the growing environment.

PROGRAM EDUCATIONAL OBJECTIVES (PEOs)

PEO 1:Embark upon successful professional practice in Computer Science and Engineering,
displaying supportive and leadership roles.
PEO 2: Engage in professional projects requiring teamwork and making valuable contributions
todesign, development, and production in the practice of Computer Science and
Engineering or application areas.
PEO 3: Equip to adapt and grow with changes in technology and globalization, and to pursue
higher studies and research activities.
PEO 4: Becapable of productive employment in the field of Computer Science andEngineering
with competing technical expertise, good interpersonal skill.
PEO 5: Utilize their broad educational experience, ethics, and professionalism to make a
positiveimpact on their local and professional communities.

PROGRAME SPECIFIC OUTCOMES(PSOs)


By the time of graduation, the undergraduate Computer Science and Engineering students
can have the ability of
PROGRAMME SPECIFIC OUTCOMES (PSOs)
PSO’s
PSO1 Designing Computer/Electronic based components which would
servesocial environment.

PSO2 Applying the current and gained knowledge and modern techniquesnot
only in the Computers but in all related fields.
PROGRAM OUTCOMES:

1. Engineering knowledge: Apply the knowledge of mathematics, science,


engineering fundamentals, and an engineering specialization to the solution of
complex engineering problems.
2. Problem analysis: Identify, formulate, review research literature, and analyze
complex engineering problems reaching substantiated conclusions using first
principles of mathematics, natural sciences, and engineering sciences.
3. Design/development of solutions: Design solutions for complex engineering
problems and design system components or processes that meet the specified needs
with appropriate consideration for the public health and safety, and the cultural,
societal, and environmental considerations.
4. Conduct investigations of complex problems: Use research-based knowledge
and research methods including design of experiments, analysis and interpretation
of data, and synthesis of the information to provide valid conclusions.
5. Modern tool usage: Create, select, and apply appropriate techniques, resources,
and modern engineering and IT tools including prediction and modeling to
complex engineering activities with an understanding of the limitations.
6. The engineer and society: Apply reasoning informed by the contextual knowledge
to assess societal, health, safety, legal and cultural issues and the consequent
responsibilities relevant to the professional engineering practice.
7. Environment and sustainability: Understand the impact of the professional
engineering solutions in societal and environmental contexts, and demonstrate the
knowledge of, and need for sustainable development.
8. Ethics: Apply ethical principles and commit to professional ethics and
responsibilities and norms ofthe engineeringpractice.
9. Individual and team work: Function effectively as an individual, and as amember
or leader in diverse teams, and in multi-disciplinarysettings.
10. Communication: Communicate effectively on complex engineering activities
with the engineering community and with society at large, such as, being able to
comprehend and write effective reports and design documentation, make effective
presentations, and give and receive clearinstructions.
11. Project management and finance: Demonstrate knowledge and understanding
of the engineering and management principles and apply these to one’s own work,
as a member and leader in a team, to manage projects and in multidisciplinary
environments.
12. Life Long Learning: Recognize the need for, and have the preparation and ability
to engage in independent and life-long learning in the broadest context of
technological change.
INDEX

Page
S.No. Date Name of the Experiment Marks Signature
No
Perform encryption, decryption using the following
1a
substitution techniques
Ceaser cipher
1b Playfair cipher

Hill Cipher.
1c

1d Vigenere cipher
Perform encryption and decryption using following
2a transposition techniques Rail fence
Row & Column Transformation
2b
Apply DES algorithm for practical applications.
3
Apply AES algorithm for practical applications.
4
Implement RSA Algorithm using HTML and JavaScript
5
Implement the Diffie-Hellman Key Exchange algorithm
6
for a given problem.
Calculate the message digest of a text using the SHA-1
7
algorithm.
Implement the SIGNATURE SCHEME - Digital
8
Signature Standard.
Demonstrate intrusion detection system (ids) using any
9
tool eg. Snort or any other s/w.
Automated Attack and Penetration Tools Exploring N-
10
Stalker, a Vulnerability Assessment Tool
Defeating Malware - Building Trojans
11a
Defeating Malware - Rootkit Hunter
11b

You might also like