Computer Security
Computer Security
Computer Security
2. RATIONALE
In today’s Digital Era, due to various threats, designing security in organization is an
important consideration. It is essential to understand basic security principles,
various threats to security and techniques to address these threats. The student will be
able to recognize potential threats to Computer Security and also able to implement
various computer security policies. This course will introduce basic cryptographic
techniques, fundamentals of computer/network security, Biometrics, Public Key
Infrastructure. It focuses on concepts and methods associated with planning
managing and auditing security at all levels including networks.
3. COMPETENCY
The aim of this course is to help the student to attain the following industry identified
competency through various teaching learning experiences:
Maintain system and network security of organization.
Relevant Approximate
Sr. Unit Practical Exercises
CO Hours
No. No. (Outcomes in Psychomotor Domain)
Required.
1. 1 Study of IT Act and Cyber Laws 1 02
2 02
Install and configure Antivirus software on system
2. 2
(any).
3. 2 Practice use of data recovery tools 2 04
Write a program to implement any 3 04
4. 3
Substitution/Transposition Technique.
Install any Cryptographic tool (For. Eg. Cryptool 3 02
5. 3
Software)
Perform various Encryption/Decryption 3 04
6. 3
techniques using Cryptographic Tool.
4 04
Install and Configure firewall settings on any
7. 4
operating system
Create and verify Digital Certificate using tool 4 04
8. 4
(e.g., Cryptool)
5 02
Trace the origin of email using any tool (e.g.,
9. 5
emailTrackerPro)
10. 5 Trace the path of web site using Tracert Utility 5 02
Micro-project 02
11. All All COs
(Refer point 11 for micro project list)
Total Hrs 32
7. THEORY COMPONENTS
2a. Explain how to construct 2.1 Identification and Authentication: User name & Password,
good/strong password) Guessing password, Password attacks-Piggybacking,
2b. Explain the given method Shoulder surfing, Dumpster diving
of Biometric. 2.2 Biometrics: finger prints, hand prints, Retina, patterns, voice
2c. Explain Authentication patterns, signature and writing patterns, keystrokes.
and Authorization with 2.3 Access controls: Definition, Authentication Mechanism,
example. principle Authentication, Authorization, Audit, Policies:
2d. Describe the features of DAC, MAC, RBAC
given access control policy. 2.4 Social Engineering.
3a. Define terms related to 3.1 Introduction: Plain Text and Cipher Text, Cryptography,
cryptography. Cryptanalysis, Cryptology, Encryption, Decryption.
3b. Encrypt/Decrypt the 3.2 Substitution techniques: Caesar’s cipher, mono alphabetic,
given text using different poly alphabetic, Vigenere cipher
substitution/transposition 3.3 Transposition techniques: Rail fence technique, simple
techniques. columnar, Vernam Cipher (One-Time Pad)
3c. Describe various 3.4 Steganography: Procedure, Hashing: Definition , Hashing
encryption algorithms Algorithms: MD-5, SHA
3d. Explain Hashing with 3.5 Symmetric and Asymmetric cryptography:
properties. Introduction to Symmetric encryption, DES (Data encryption
Standard) algorithm, Asymmetric key cryptography: Digital
Signature
Other than the classroom and laboratory learning, following are the suggested
student-related co-curricular activities which can be undertaken to accelerate
the attainment of the various outcomes in this course: Students should conduct
following activities in group and prepare reports of about 5 pages for each
activity, also collect/record physical evidences for their (student’s) portfolio
which will be useful for their placement interviews:
a. Prepare journal of practicals.
b. Use Cryptographic Tools and Utilities.
11. SUGGESTEDMICRO-PROJECTS
1. https://www.tutorialspoint.com//computer_security/computer_security_quick_
guide.htm
2. https://freevideolectures.com/course/3027/cryptography-and-network-security
3. https://www.tutorialspoint.com/ethical_hacking/ethical_hacking_process.htm
4. https://www.cybrary.it/
5. https://www.tutorialspoint.com/cryptography/index.htm
6. https://www.geeksforgeeks.org/ip-security-ipsec/
7. https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=48325&sec
tion=1
PSO1 PSO2
CO1 - 1
CO2 1 2
CO3 - 3
CO4 1 2
CO5 3 3
Sign: Sign:
Name: Name:
Smt. S.P. Ambavane Shri.U. V. Kokate
Smt. K. S. Sathawane Dr.S.B.Nikam
(Course Expert /s) (Head of Department)
(Department of Computer Engineering)
Sign: Sign:
Name: Name:
Shri.U. V. Kokate Shri A.S.Zanpure
Dr.S.B.Nikam (CDC Incharge )
(Programme Head)
(Department of Computer Engineering)