The course offers a broad overview of the fundamentals of information security covering topics such as error correction/detection, cryptography, steganography, malwares, This course also touches on the implications of security in Internet of Things (IoT).
At the end of the course, students should be able to:
Unit 1
Introduction: Security Concepts, Challenges, Security architecture, Security attacks, security services, security mechanisms.
Unit 2
Error detecting/correction: Block Codes, Generator Matrix, Parity Check Matrix, Minimum distance of a Code, Error detection and correction, Standard Array and syndrome decoding, Hamming Codes.
Unit 3
Cryptography: Encryption, Decryption, Substitution and Transposition, Confusion and diffusion, Symmetric and Asymmetric encryption, Stream and Block ciphers, DES, cryptanalysis.
Public-key cryptography, Diffie-Hellman key exchange, man-in-the-middle attack Digital signature, Steganography, Watermarking.
Unit 4
Malicious software’s: Types of malwares (viruses, worms, trojan horse, rootkits, bots), Memory exploits – Buffer overflow, Integer overflow.
Unit 5
Security in Internet-of-Things: Security implications, Mobile device security – threats and strategies.
Pfleeger, C.P., Pfleeger,S.L., & Margulies, J. (2015). Security in Computing. 5th edition. Prentice Hall.
Lin, S. & Costello, D. J. (2004). Error Control Coding: Fundamentals and applications. 2nd edition. Pearson Education.
Stallings, W. (2018). Cryptography and network security. 7th edition. Pearson Education.
Berlekamp, E. R. (1986). Algebraic Coding Theory. McGraw Hill Book Company
Stallings, W. (2018) Network security, essentials. 6th edition. Pearson Education.
Whitman M.E., & Mattord H.J. (2017). Principle of Information Security. 6th edition. Cengage Learning.
Use of ICT tools in conjunction with traditional class room teaching methods
Interactive sessions
Class discussions
Written tests, assignments, quizzes, presentations as announced by the instructor in the class
Security mechanisms, private and public key cryptography, malware detection, security in IoT.
Disclaimer: Details on this page are subject to change as per University of Delhi guidelines. For latest update in this regard please refer to the University of Delhi website here.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |