Information Security

This module shall cover the transformation that IS age has witnessed in 20 years.In particular, IS before the year 2000 and after.Various stakeholders involved,strategies adopted,protocols developed shall be highlighted.Basic schemes and precautions to be followed to keep information safe shall also be explored.

Introduction To Cryptography

Introduction to Public and private crypto systems will be covered. RSA will be discussed in detailed. Data Secrecy and digital signature will also be discussed.

Role of Information Security in Banking and Financial Sectors

Transition from offline banking to online banking

* Technologies used
* How are information stored
* The role of network security
* Data security
* Limitations/pitfalls in the existing system

Cyber Crimes, Security and Forensics

Overview of cyber crimes such as Phishing, Spam etc. Challenges faced by law enforcement agency in forensics. User discipline, security policy to be adopted while performing online transactions shall be discussed. Introduction to cyber forensics: email tracing, tag/label tracing in a social network, etc.

Cyber bullying and online games

Various cyber bullying strategies followed by stalkers, trapping mechanisms adopted by online games shall be highlighted. Threats, Vulnerabilities, etc shall be discussed.

Intrusion in Cyber Space

Worms, viruses, bots and associated risks shall be explored in detail. Introduction to Malwares and its effect on cyber space shall be highlighted. Design issues in Anti-virus, Anti-Malware. Introduction to Ransomware and its post effects.

Designing Secure Campus Network

Secure protocols, data abstraction , data encapsulation – tunneling protocols – secure private – secure public network - security threats and vulnerabilities

IS in Image Processing ~ Research Challenges

Ownership authentication and data authentication using watermarking scheme shall be discussed in detail. Various types of watermarking such as visible, invisible, transform domain and reversible watermarking will be discussed. Various application domains will also be explored.

Secure Coding

Loop holes in the design of compiler , exceptions , memory reference , accessing kernel/system space , loop holes in the implementation of arrays , how are viruses/worms injected into the system – not so secure programs


Alternative strategies for secure access , various biometrics schemes used ,cryptographic algorithms and image processing techniques used

Security features in Wireless Networks

Introduction to 3g/4g/5g: how are information transmitted, encoding/decoding schemes, security protocols employed

Hardware Security and OS Security

Introduction to kernels and microkernels – kernel programming -developing a secure operating system

Design and development of a secure appliance

Experiences in designing and developing a secure tablet device - Features of secure tablet device - development of a complete secure stack on the device - details of engineering learnings in this entire development process

Sniffing and Spoofing -basic tools of Network Intruders

Some Common Internet Attacks (DOS, Man in the Middle, Replay) and Telecom Frauds, Solutions. Possibly one or two demonstrations. Simple scripting tools to sniff and spoof – ideal for classroom demonstrations.

Security Assessment, Analysis, Assurance and Disaster Management

Introduction, System Security Policy, Building a Security Policy, Security Requirements Specification, Threat Analysis, Vulnerability Identification and Assessment, Security Certification, Security Monitoring and Auditing. Making business disaster ready, Resources for Disaster Planning and Recovery