This module shall cover the transformation that IS age has witnessed in 20 years.In particular, IS before the year 2000 and after.Various stakeholders involved,strategies adopted,protocols developed shall be highlighted.Basic schemes and precautions to be followed to keep information safe shall also be explored.
Introduction to Public and private crypto systems will be covered. RSA will be discussed in detailed. Data Secrecy and digital signature will also be discussed.
Transition from offline banking to online banking
* Technologies used
* How are information stored
* The role of network security
* Data security
* Limitations/pitfalls in the existing system
Overview of cyber crimes such as Phishing, Spam etc. Challenges faced by law enforcement agency in forensics. User discipline, security policy to be adopted while performing online transactions shall be discussed. Introduction to cyber forensics: email tracing, tag/label tracing in a social network, etc.
Various cyber bullying strategies followed by stalkers, trapping mechanisms adopted by online games shall be highlighted. Threats, Vulnerabilities, etc shall be discussed.
Worms, viruses, bots and associated risks shall be explored in detail. Introduction to Malwares and its effect on cyber space shall be highlighted. Design issues in Anti-virus, Anti-Malware. Introduction to Ransomware and its post effects.
Secure protocols, data abstraction , data encapsulation – tunneling protocols – secure private – secure public network - security threats and vulnerabilities
Ownership authentication and data authentication using watermarking scheme shall be discussed in detail. Various types of watermarking such as visible, invisible, transform domain and reversible watermarking will be discussed. Various application domains will also be explored.
Loop holes in the design of compiler , exceptions , memory reference , accessing kernel/system space , loop holes in the implementation of arrays , how are viruses/worms injected into the system – not so secure programs
Alternative strategies for secure access , various biometrics schemes used ,cryptographic algorithms and image processing techniques used
Introduction to 3g/4g/5g: how are information transmitted, encoding/decoding schemes, security protocols employed
Introduction to kernels and microkernels – kernel programming -developing a secure operating system
Experiences in designing and developing a secure tablet device - Features of secure tablet device - development of a complete secure stack on the device - details of engineering learnings in this entire development process
Some Common Internet Attacks (DOS, Man in the Middle, Replay) and Telecom Frauds, Solutions. Possibly one or two demonstrations. Simple scripting tools to sniff and spoof – ideal for classroom demonstrations.
Introduction, System Security Policy, Building a Security Policy, Security Requirements Specification, Threat Analysis, Vulnerability Identification and Assessment, Security Certification, Security Monitoring and Auditing. Making business disaster ready, Resources for Disaster Planning and Recovery