Information Security and Cyber Laws

Course ID
CSGE 401
Level
Undergraduate
Program
B.Sc. CS (Hons.)
Semester
Fourth
Credits
6.0
Paper Type
Generic Elective
Method
Lecture & Practical

Unique Paper Code: Update Awaited

This course introduces the students to the concepts of information security and different type of attacks in the cyber space. The course also introduces countermeasures to mitigate attacks and different existing cyber laws.

Learning Outcomes:

At the end of the course, students should be able to:

  • Learn, structure, mechanics and evolution of various crime threats
  • Learn to protect information systems from external attacks by developing skills in enterprise security, wireless security and computer forensics.
  • Analyse the risks involved while sharing their information in cyber space and numerous related solutions like sending protected and digitally signed documents.
  • Insights of ethical hacking and usage of password cracking tools.
  • Get an overview of different ciphers used for encryption and decryption.

Course Contents

Unit 1
Unit 2
Unit 3
Unit 4
Unit 5
Unit 6

Unit 1

Definitions :Protection, Security, risk, threat, vulnerability, exploit, attack, confidentiality, integrity, availability, non-repudiation, authentication, authorization, codes, plain text, encryption, decryption, cipher text, key, ciphers, Symmetric and asymmetric cryptography, Public key , private key ,Crypt analysis,, Cyber forensics. Substitution cipher (Caesar), Transposition cipher (Rail-Fence).

Unit 2

Risk analysis, process, key principles of conventional computer security, security policies, data protection, access control, internal vs external threat, security assurance, passwords, access control, computer forensics and incident response.

Unit 3

CYBER ATTACKS (definitions and examples): Denial-of-service attacks, Man-in-the- middle attack, Phishing, spoofing and spam attacks, Drive-by attack, Password attack, SQL injection attack, Cross-site scripting attack, Eavesdropping attack, Birthday attack, Malware attacks, Social Engineering attacks.

Unit 4

Brief Introduction of handling the attacks described in UNIT 3. Firewalls, logging and intrusion detection systems, e-mail security, security issues in operating systems, ethics of hacking and cracking..

Unit 5

Definitions: Digital Signature and Electronic Signature, Digital Certificate
i.[Section 43] Penalty and compensation for damage to computer etc. ii.[Section 65] Tampering with computer source documents
iii .[Section 66A] Punishment for sending offensive messages through communication service etc.
iv .[Section 66B] Punishment for dishonestly receiving stolen computer resource or communication device
v .[Section 66C] Punishment for identity theft
vi .[Section 66D] Punishment for cheating by impersonation by using computer resource vii.[Section 66E] Punishment for violation of privacy
viii .[Section 66F] Punishment for cyber terrorism
ix .[Section 67] Punishment for publishing or transmitting obscene material in electronic form
x .[Section 67A] Punishment for publishing or transmitting of material containing sexually explicit act, etc. in electronic form
xi .[Section 67B] Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc. in electronic form
xii .[Section 72] Breach of confidentiality and privacy.

Unit 6

Brief introduction of IT infrastructure in India, National agencies handling IT.

Practicals

Lab List 1

  1. Demonstrate the use of Network tools: ping, ipconfig, ifconfig, tracert, arp, netstat, whois.
  2. Use of Password cracking tools : John the Ripper, Ophcrack. Verify the strength of passwords using these tools.
  3. Perform encryption and decryption of Caesar cipher. Write a script for performing these operations.
  4. Perform encryption and decryption of a Rail fence cipher. Write a script for performing these operations.
  5. Use nmap/zenmap to analyse a remote machine.
  6. Use Burp proxy to capture and modify the message.
  7. Demonstrate sending of a protected word document.
  8. Demonstrate sending of a digitally signed document.
  9. Demonstrate sending of a protected worksheet.
  10. Demonstrate use of steganography tools.

Lab List 2

  1. Demonstrate use of gpg utility for signing and encrypting purposes.

Additional Information

Text Books


Merkow, M., & Breithaupt, J.(2005) Information Security Principles and Practices. 5th edition. Prentice Hall.
Snyder, G.F. (2010). Network Security, Cengage Learning.
Whitman, M. E. & Mattord, H. J. (2017) Principles of Information Security. 6th edition. Cengage Learning.

Additional Resources


Basta, A., & Halton, W., (2010) Computer Security: Concepts, Issues and Implementation, Cengage Learning India.
Anderson, R. (2008) Security engineering: A guide to building dependable Distributed Systems. 2nd edition. John Wiley & Sons.

Web Resources


https://blog.netwrix.com/2018/05/15/top-10-most-common-types-of-cyber-attacks/
https://www.ibef.org/industry/infrastructure-sector-india.aspx

Teaching Learning Process


Use of ICT tools in conjunction with traditional class room teaching methods
Interactive sessions
Class discussions

Assessment Methods

Written tests, assignments, quizzes, presentations as announced by the instructor in the class

Keywords

Information security, cyber laws, risk analysis, attacks.

Disclaimer: Details on this page are subject to change as per University of Delhi guidelines. For latest update in this regard please refer to the University of Delhi website here.

judi slot online Capsa Susun Bandar Ceme Online Terpercaya agen ion casino ionclub Slot Online idn poker sbobet casino slot online https://run3-game.net/