Preview

Syllabus

Powerful Essays
Open Document
Open Document
7373 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Syllabus
AC 19/3/2012 Item No. 4.83

UNIVERSITY OF MUMBAI

Syllabus for the T.Y. B. Sc. Sem. V & VI Program: T.Y.B.Sc. Subject: Information Technology

(with effect from the academic year 2012–2013)

Semester V
Paper 1: Network Security Paper 2: *ASP.NET with C# Paper 3: Software Testing Paper 4: *Advanced Java Paper 5: *Linux Administration

Semester VI
Paper 1: *Internet Technologies Paper 2: Digital Signals and Systems Paper 3: *Datawarehousing Paper 4: Elective: IPR and Cyber Laws Project Management GIS

Paper V: Project Report Paper VI: Project Viva-Voce

CLASS: B. Sc (Information technology) Paper I; SUBJECT: Network Security Periods per week Lecture 1 Period is 50 minutes TW/Tutorial/Practical Evaluation System Theory Examination TW/Tutorial/Practical

Semester – V 5 3 Hours 2 -Marks 60 40

Unit-I

Cryptography: Introduction: Some Simple Cryptosystems, The Shift Cipher, The Substitution Cipher, The Affine Cipher, The Vigenere Cipher, The Hill Cipher, The Permutation Cipher, Stream Ciphers, Cryptanalysis, Cryptanalysis of the Affine Cipher, Cryptanalysis of the Substitution Cipher, Cryptanalysis of the Vigenere Cipher, Cryptanalysis of the LFSR-based Stream Cipher. Shannon’s Theory, Perfect Secrecy, Entropy, Huffman Encodings and Entropy, Properties of Entropy, Spurious Keys and Unicity Distance The Data Encryption Standard, Description of DES, An Example of DES Encryption, The DES Controversy, DES in Practice, DES Modes of Operation, A Time-memory Trade-off, Differential Cryptanalysis, An Attack on a 3-round DES, An Attack on a 6-round DES. Introduction to Public-key Cryptography, More Number Theory, The Euclidean Algorithm, The Chinese Remainder Theorem, Other Useful Facts, The RSA Cryptosystem, Implementing RSA, Probabilistic Primality Testing, Attacks On RSA, The Decryption Exponent, Partial Information Concerning Plaintext Bits, The Rabin Cryptosystem, Factoring Algorithms, The p - 1 Method, Dixon’s Algorithm and the Quadratic Sieve,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Itt 255 IT255 Instructor Lab Manual LABORATORY Instructor Lab Manual IT255 Fundamentals of Information Systems Security Copyright © 2012 Jones & Bartlett Learning, LLC www.jblearning.com All Rights Reserved. Current Version Date: 12/06/2010 -1- IT255 Instructor Lab Manual LABORATORY ISS Curriculum Overview............................................................................................................................. 5 Ethics and Code of Conduct.......................................................................................................................... 6 ISS Mock IT Infrastructure ...........................................................................................................................…

    • 33056 Words
    • 133 Pages
    Satisfactory Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Palmer, M. (2003). Guide to Operating Systems Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 21, 2009, from University of Phoenix, CMGT440.…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

     Importance • Significant amount of supplemental information IS4799 Information Systems and Cybersecurity Capstone Project © ITT Educational Services, Inc. All rights reserved. Page 4 Key Concepts  Clarification • Additional information to clarify RFP contents…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Powerful Essays

    SAMPLE Security Policy

    • 3395 Words
    • 13 Pages

    References: Hausman, K., Weiss, M., & Barrett, D. (2011). Comptia security sy0-301. (3rd ed.). Pearson Education, Inc.…

    • 3395 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    ISS Information Systems Information NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 5…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Better Essays

    References: Conklin, W. A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of computer security: CompTIA Security+™ and beyond (3rd ed.). New York, NY: McGraw Hill.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Syllabus

    • 599 Words
    • 3 Pages

    Government 2306 is a study of the organization, functions, and administration of the several branches and bureaucracy of the Texas state and local government, including a study of the numerous Texas constitutions. The primary factors considered relate to the three branches of government -- judicial, executive, legislative -- current Texas Constitution, events that shaped the state, and current events. Emphasis will be placed on the interaction of these subsystems.…

    • 599 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In approaching preventative mechanisms that are effective against hacking, it is very important that both awareness and attitude is first changed, and then perceptions of information security and how to secure data must be allowed to…

    • 631 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Kak, A. (2012). Lecture notes on “computer and network security”. (Lecture Notes, Purdue University Retrieved from https://engineering.purdue.edu/kak/compsec/NewLectures/Lecture20.pdf…

    • 2890 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    syllabus

    • 1373 Words
    • 6 Pages

    Communication with instructor should be done through the class message system, not through the college e-mail address…

    • 1373 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Syllabus

    • 827 Words
    • 4 Pages

    American Psychological Association. Publication manual of the American Psychological Association (Current ed.). Washington, DC: Author.…

    • 827 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    The number one responsibility of the Information Assurance/Network Security Officer(s) is to maintain the best security posture for the network that is possible. This task also means that the confidentiality, availability and integrity of the system are maintained. One of the first steps towards this is to perform an assessment of the potential issues with all areas of the network. A preliminary security assessment will begin the task of identifying a list of vulnerabilities (weaknesses and flaws) that could possibly be exploited by a threat (Develop, n.d.).…

    • 1453 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: Comp TIA Security + and Beyond (third ed.). Boston, MA: McGraw-Hill Company.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    The best security policies would be program-framework and system-specific policies the reason for implementing a program-framework policy is to make sure that a system fits in the overall structure of the business and see if the implemented security program provide the company with an organization-wide direction. The system-specific policy will provide everyone with the purpose, scope, responsibilities, and compliance needed to achieve a secure system.…

    • 608 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Employing various tools and devices for determining the quality of IT project plans and systems leads to the use of the best practices. Best practices in IT project management summons for various elements and functions that are required and highly instrumental in ensuring the success and development of IT project plans. The best practices approach also requires the review of best practices in order to map out future trends that might are highly appropriate for future situations taking the organization one step ahead of its competitors. Some state that business practices don’t really mean anything anymore. Opinions state that these days it seems like anyone who can pick up a keyboard is issuing best practices. Plus, just because you wrote something doesn’t necessarily mean that it’s always the best of ideas. I think that some of the reasoning behind Arkansas’ ‘Best Practices’ is for the most part stemming from their avid experience. Project Management isn’t just about controlling schedules and costs. Before the execution of any project, an organization must be assured that the project is a wise investment of money and resources, and that it fits with other initiatives. IT departments must be able to deliver each project to the original specifications. Project Management also defines the business controls for delivering within scope. Leading companies launched and maintained successful IT projects by increasing growth and taking advantage of revenue opportunities, improving customer service, gaining strategic advantages over competitors, and becoming better aligned with business needs. Most agencies in Arkansas are required to submit a summation of their project management methodology. All projects are unique and take on different forms that present many degrees of uncertainty. It is important to have a defined formal structure for…

    • 912 Words
    • 4 Pages
    Powerful Essays

Related Topics