Teaching Scheme

advertisement
Computer Security
Topic 1
Name: Introduction to Computer Security and Security Trends
Knowledge
Category
Example/s of category
Teaching methodology
FACT
Security
Use appropriate example of security
(security guards in college gate)
CONCEPT
Assets
Show any peripheral devices of
Computer or Network( Hard disk)
Viruses
Corrupted Files in pen drive
Terrorists
News, Videos of terrorist attack like
26/11 attack
Malware
Use any appropriate examplemalicious code transfer through
mobile while sharing the data
(Bluetooth)among people
Use any appropriate
Confidentiality,
Integrity, Availability, example – email
Accountability
Risk
PRINCIPLE
PROCEDUR
E
Application
and
Use any appropriate example –
person having large amount of cash
in travelling
Security Attacks
CIA Model
Use example of Hacker trying to
attack on any email account
Use any appropriate PPT
Risk Analysis
Use any appropriate PPT or Video
Steps in Attack
Online application
Learning Resources:
Books:
PPT
Online Shopping
Banking
and
Online
Lecture
No.
1
Topic/ Subtopic to be covered

Why focus on Security?–
“Principals of Computer Security CompTIASecurity+andBeyndo” by Wm. Arthur
Conklinchapter 1 Page No 1
E.g The Secureness of precious materials being stolen like gold, money,
Mark sheet of student etc.)

Definition of Computer Security
“Computer Security” by Dieter Gollman Chapter 2, Page No 18

Why security is important (Need of security)
“Cryptography and Network Security” by AtulKahate Chapter 1, Page no 1
Eg. Confidential information of defense save on computer of govt dept

Basics of computer security – C, I, A Model
Confidentiality - “Computer Security” by Dieter Gollman Chapter 2, Page No 20
Integrity - “Computer Security” by Dieter Gollman Chapter 2, Page No 21
Availability - “Computer Security” by Dieter Gollman Chapter 2, Page No 22
Accountability - “Computer Security” by Dieter Gollman Chapter 2, Page No 23
Non-repudiation - “Computer Security” by Dieter Gollman Chapter 2, Page No 23
* Draw pyramid model of CIA
Web Site - http://it.med.miami.edu/x904.xml
*Note- Conclude the lecture with Block keywords & definitions and suitable
diagram
2

Examples of Application where security is important
Eg: Bank where locker facility is provided
Challenges in security – which are different barriers in security
Eg: person tries different ways to crack the password of Computer

Models of security
3

Define Risk
“Computer Security” by Dieter Gollman Chapter 1, Page No 13
4

What is Assets, Vulnerability and threats
“Computer Security” by Dieter Gollman Chapter 1, Page No 10,11
(Harddisk is assest )

Formula for calculation of Risk
“Computer Security” by Dieter Gollman Chapter 1, Page No 10
PPTs - www.cs.uiuc.edu/class/sp07/cs498ia/slides/CS46106.RiskAnalysis.ppt

What Quantitative & Qualitative Risk Analysis
“Computer Security” by Dieter Gollman Chapter 1, Page No 13

Counter measures to mitigate the risk
“Computer Security” by Dieter Gollman Chapter 1, Page No 14
Web Site – http://www.digitalthreat.net/2009/06/threat-vs-vulnerability-vs-risk/
5


What is Threat- Definition

What is different categories of Threats
Definition of Virus and Worms – Differentiate between them

“Principles of Computer Security: Comp TIA Security+ and Beyond” by Wm.
Arthur Conklin Chapter 1 Page no 7
“Cryptography and Network Security” by AtulKahate Chapter 1 Page no 16, 18

Different types of Viruses – Life Cycle of Viruses (Draw
Diagram)
“Cryptography and Network Security” by AtulKahate Chapter 1 Page no 16 to 18

Define Intruders & Insiders – Differentiate between them (Give
real life example or any movie example)
“Principles of Computer Security:Comp TIA Security+ and Beyond” by Wm. Arthur
Conklin Chapter 1 Page no 7,8
Web Sites –
 http://www.f-secure.com/en/web/labs_global/threat-types
 http://support.kaspersky.com/viruses/general/614
 http://peterhgregory.wordpress.com/2009/03/14/security-basics-definitionsof-threat-attack-and-vulnerability/
6

Who is Criminal
purpose(any movie example)
Organization
–
what is
their
“Principles of Computer Security:Comp TIA Security+ and Beyond” by Wm. Arthur
Conklin Chapter 1 Page no 9

Who is Terrorists – what is their aim/goals(any movie example)
“Principles of Computer Security:Comp TIA Security+ and Beyond” by Wm. Arthur
Conklin Chapter 1 Page no 9


Information Warfare
Why there is need of Information Warfare
“Principles of Computer Security:Comp TIA Security+ and Beyond” by Wm. Arthur
Conklin Chapter 1 Page no 9

Avenues of Attacks (Example of any Criminal Activity)
“Principles of Computer Security:Comp TIA Security+ and Beyond” by Wm. Arthur
Conklin Chapter 1 Page no 11

Steps in Attack – How attack can happen in any organization
like Bank robbery
“Principles of Computer Security:Comp TIA Security+ and Beyond” by Wm. Arthur
Conklin Chapter 1 Page no 12
7

What is Attack – Definition of attack

Active and Passive Attack – Differentiate between them,
Classification of passive and active attacks
“Cryptography and Network Security” by Atul Kahate Chapter 1 Page no 12 to 15

Denial of Service Attack (DOS & DDOS)
“Principles of Computer Security:Comp TIA Security+ and Beyond” by Wm. Arthur
Conklin Chapter 15 Page no 400
Web Site - http://www.slideshare.net/chintanjpatel/unit-1-33882940

8
Backdoor, Trapdoors
“Principles of Computer Security:Comp TIA Security+ and Beyond” by Wm. Arthur
Conklin Chapter 15 Page no 403

Sniffing
“Principles of Computer Security:Comp TIA Security+ and Beyond” by Wm. Arthur
Conklin Chapter 15 Page no 404

Spoofing
“Principles of Computer Security:Comp TIA Security+ and Beyond” by Wm. Arthur
Conklin Chapter 15 Page no 405, 406

Encryption Attack
“Principles of Computer Security:Comp TIA Security+ and Beyond” by Wm. Arthur
Conklin Chapter 15 Page no 410
9
Web Site –
 https://www.parkbank.com/about/security/computer-security
 http://vickyvikramaditya1.blogspot.in/2011/08/sniffing-and-spoofing.html
PPT –

https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web
&cd=4&cad=rja&uact=8&sqi=2&ved=0CD8QFjAD&url=http%3A%2F%2
Fwww.pcs.cnu.edu%2F~dgame%2Fcs446Gen%2Ftopics%2FSniffing%2FS
niffing.PPT&ei=5WKhU7a2E4OiugTag4CACQ&usg=AFQjCNE2f2hwh4v
f1vWecSJh8I8D47Wy0g&bvm=bv.69137298,d.c2E

Man-in-middle attack
“Principles of Computer Security:Comp TIA Security+ and Beyond” by Wm. Arthur
Conklin Chapter 15 Page no 408


Replay Attack
TCP/IP Hacking
“Principles of Computer Security:Comp TIA Security+ and Beyond” by Wm. Arthur
Conklin Chapter 15 Page no 409
Web Site –

http://careerride.com/Networking-replay-attacks.aspx
PPT –
10

https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web
&cd=14&cad=rja&uact=8&ved=0CF0QFjAN&url=http%3A%2F%2Fcsc.c
olumbusstate.edu%2Fsummers%2Fnotes%2Fcs557%2F3mf%2FReplayAttacks.ppt&ei=S2OhU9T8GdGdugTCyoLQBw&usg=AFQjCNG0tQwkX
Uxg0-6LnH-_ZzDNqSHlzw&bvm=bv.69137298,d.c2E

Definition of Malware
“Principles of Computer Security:Comp TIA Security+ and Beyond” by Wm. Arthur
Conklin Chapter 15 Page no 415


Various categories of Malwares
What is Virus and Logic Bombs
“Principles of Computer Security:Comp TIA Security+ and Beyond” by Wm. Arthur
Conklin Chapter 15 Page no 418
Web site –
 http://www.malwaretruth.com/the-list-of-malware-types/
 http://www.kaspersky.co.in/internet-security-center/threats/malwareclassifications
Topic 2
Name: Authentication and Operational Security Objectives
Knowledge Category
Example/s of category
Teaching methodology
FACT
People
Use appropriate example
of people- Internet Users
Password
Show appropriate
example- create
password to authenticate
user for PC or laptop or
password for enrollment
of admission
Use appropriate
example-(Iris) retina scan
in Adhar Card Office
Example-Login screen
Biometrics
CONCEPT
Managing Password
Example-Cash
withdrawal at ATM
Role of People
Example-Changing PIN
of ATM
User Use appropriate PPT's
PRINCIPLE
Choosing a password
APPLICATION
Individual
Responsibilities
Thumb Reader
Use Appropriate example
of
Biometric
like
Attendance System using
Thumb
Learning Resources:
Books:
Title: 1) “Cryptography and Network Security” by Atul Kahate Publisher – Tata
McGraw Hill
2) “Computer Security” by Dieter Gollman Publisher – Wiley India
3) “Principles of Computer Security + and Beyond” by Wm. Arthur Conkin
Publisher - Tata McGraw Hill
Teaching Aids: Black Board, PPTS, Transparencies, Reference Book, Notes.
PPTs: Preferably prepare PPTs containing https://depts.washington.edu/...security/your_role_information_secur.ppt
 http://www.slideshare.net/vidita123/biometrics-final-ppt
Lecture
No.
1
Topic/ Subtopic to be covered



Introduction to operational Security
Understand meaning - role of people
What is password?
“Principles of Computer Security Security + and Beyond” by Wm. Arthur Conklin Dwayne
Chapter 3 “Operational and Organizational Security
*Note- Conclude the lecture with Block keywords & definitions and suitable
diagram

Introduction to terms -identification, Authentication &
operational Security

To understand role of people in security
Cryptography & Network Security by AtulKahateChapter-7pg.nos 271-73
2
3
4

User Name & Password
Computer Security by Dieter Gollman Chapter-3, Pg.Nos.36

How to choose & manage password?
Computer Security by Dieter Gollman Chapter-3, Pg.Nos.37,38, 39

To understand what are threats while creating passwords.

Introduction to terms -identification, Authentication
Principles of Computer Security Security + and Beyond” by Wm. Arthur Conklin
Dwayne Chapter 11 Pg.nos-262

Describe different areas where security comes into picture.
Cryptography & Network Security by AtulKahateChapte1 Page No.1 to 3


5
Discuss role of people in security
Password Selection
Principles of Computer Security Security + and Beyond” by Wm. Arthur Conklin
Dwayne Chapter 4 Pg.No-72

Piggybacking
Principles of Computer Security Security + and Beyond” by Wm. Arthur Conklin
Dwayne Chapter 4 Pg.No-73

Shoulder Surfing
Principles of Computer Security Security + and Beyond” by Wm. Arthur Conklin
Dwayne Chapter 4 Pg.No-70

Dumpster Diving
Principles of Computer Security Security + and Beyond” by Wm. Arthur Conklin
Dwayne Chapter 4 Pg.No-74
6

Installing Unauthorized Software/Hardware
Principles of Computer Security Security + and Beyond” by Wm. Arthur Conklin
Dwayne Chapter 4 Pg.Nos-74,75

Access By Non-employee
Principles of Computer Security Security + and Beyond” by Wm. Arthur Conklin
Dwayne Chapter 4 Pg.No-75

Security Awareness
Principles of Computer Security Security + and Beyond” by Wm. Arthur Conklin
Dwayne Chapter 4 Pg.No-76

Individual User Responsibilities
Principles of Computer Security Security + and Beyond” by Wm. Arthur Conklin
Dwayne Chapter 4 Pg.Nos-77
Examples of role of people using suitable techniques.

 http://www.slideshare.net/Clarice_Wilson/atm-frauds-and-solutions
7

Define Access Control
Principles of Computer Security Security + and Beyond” by Wm. Arthur Conklin
Dwayne Chapter 11 Pg.no-268

Discuss their principles & policies
Principles of Computer Security Security + and Beyond” by Wm. Arthur Conklin
Dwayne Chapter 11 Pg.no-269
" Types of Access controls
Principles of Computer Security Security + and Beyond” by Wm. Arthur Conklin
Dwayne Chapter 11 Pg.nos-269,270
8
9



Introduction to Biometrics
Types of Biometrics
10







Types of Biometrics & example
Finger prints
Hand print
Retina Patterns
Voice Patterns
Signature &Writing Patterns
Keystrokes
Computer Security Principles & Practices " by William Stalling, Lawrie Brown
Chapter-3 " pg.nos.92 to 97
PPT:

http://www.slideshare.net/vidita123/biometrics-final-ppt
Topic 3
Name: Cryptography
Knowledge Category
Example/s of category
Teaching methodology
FACT
Plaintext
Use example of
Plaintext–Human
language
(message:“welcometo
third year diploma”)
Show any message is
Codified by using. KEY
Key
Cipher Text
CONCEPT
Cryptography,
Cryptanalysis,
Cryptology
Encryption
Decryption
Private Key
Alphabet A Codified by
key “3” to Alphabet
“C”
Show example of
codified message like
“ABC” is code to
“CDE”
Use appropriate example
to show the converting of
plaintext to cipher text
and vice-versa.
Show example of
encoding plaintext to
Cipher text:
Eg.”Computer”
to”
retupmoc”
Show example of
decoding Cipher text to
Plaintext
Eg.“retupmoc” to
“Computer”
Show example of key
which need to be kept
secret:
Eg. door key of own
house or password of
Lecture
No.
1
Topic/ Subtopic to be covered

Introduction to Cryptography
“Computer Security” by Dieter Gollman Chapter 11, Page No 186
“Principles of Computer Security + and Beyond” by Wm. Arthur”
chapter -5 ,Page No- 83

Definition of Cryptography, Cryptanalysis and Cryptology
“Cryptography and Network Security” by AtulKahateChapter2, Page No 38-39
 Identify and describe the types of cryptography
“Principles of Computer Security + and Beyond” by Wm. Arthur”
chapter -5 ,Page No- 84

What is Plain text and Cipher Text?
Plain text and cipher Text - “Cryptography and Network Security” by
AtulKahateChapter2, Page No 40-41”
Website http://en.wikipedia.org/wiki/Cryptography
 http://www.apprendre-en-ligne.net/crypto/bibliotheque/PDF/Kwang.pdf
 http://cs.stanford.edu/people/eroberts/cs181/projects/dvd- css/cryptography.htm
PPT –

http://www.sce.uhcl.edu/yang/teaching/csci5931netSecuritySpr05/nsech
02a.ppt

2
What is Substitution Technique?
Cryptography and Network Security” by AtulKahate Chapter 2, Page No 41

State different type of substitution technique
Cryptography and Network Security” by AtulKahate Chapter 2, Page No 42

Define Caesar’ciper? Explain with example ?
Cryptography and Network Security” by AtulKahate Chapter 2, Page No 41-43

Working principle of mono alphabetic substitution technique
Cryptography and Network Security” by AtulKahate Chapter 2, Page No 44-46

How Poly alphabetic technique is different from mono
alphabetic
Cryptography and Network Security” by AtulKahate Chapter 2, Page No 47

Drawback of Substitution technique
Cryptography and Network Security” by AtulKahate Chapter 2, Page No 48-54
Website http://www.cimt.plymouth.ac.uk/resources/codes/codes_u1_text.pdf
PPTs sce.uhcl.edu/yang/public/Modules/.../Substitution%20Ciphers.ppt

3
What is Transposition Technique?
Cryptography and Network Security” by AtulKahate Chapter 2, Page No 54

Working principle of rail fence technique with example
Cryptography and Network Security” by AtulKahate Chapter 2, Page No 54-55

Working principle of Simple Columnar with example
Cryptography and Network Security” by AtulKahate Chapter 2, Page No 54-58

What is Stenography? State its advantage and disadvantages
Cryptography and Network Security” by AtulKahate Chapter 2, Page No 73-74
“Principles of Computer Security + and Beyond” by Wm. Arthur”
Chapter -5 Cryptography, page 101-103
Websitehttp://www.cs.man.ac.uk/~banach/COMP61411.Info/CourseSlides/Wk1.2.Classical
.pdf
PPTs -www.eecis.udel.edu/~mills/teaching/eleg867b/crypto_slides/ch02.ppt
4

Define Encryption? Show a block diagram of encryption
Cryptography and Network Security” by AtulKahate Chapter 2, Page No 59

Define Decryption? Show a block diagram of Decryption
Cryptography and Network Security” by AtulKahate Chapter 2, Page No 59-62

State the sketch of Symmetric key cryptography and problem of Key
Distribution
Cryptography and Network Security” by AtulKahate Chapter 2, Page No 62-71
Website:
 http://www4.ncsu.edu/~kksivara/sfwr4c03/lectures/lecture9.pdf
PPTs - cs.ecust.edu.cn/~yhq/course_files/security/topic2.ppt
5

Name the algorithm uses for Symmetric key cryptography
Cryptography and Network Security” by AtulKahate Chapter 2, Page No 100
“Principles of Computer Security + and Beyond” by Wm. Arthur”
Chapter -5 Cryptography, page 91-94

Conceptual working of DES along with diagram
Cryptography and Network Security” by AtulKahate Chapter 2, Page No 101
Computer Security” by Dieter GollmanChapter -11,Page No-199-202”

Processing step in DES
Cryptography and Network Security” by AtulKahate Chapter 2, Page No 102-103
Website:
 http://cs.ucsb.edu/~koc/cs178/docx/w04x-des.pdf
PPTs - islab.csie.ncku.edu.tw/course/slide/ch_06.ppt
6

Details of each step in DES Algorithm along with block diagram
a) What is happening the Initial permutation (IP)
Cryptography and Network Security” by AtulKahate Chapter 3, Page No -102-103
b) Details of one Round in DES
Cryptography and Network Security” by AtulKahate Chapter 3, Page No -103
i.
Step 1- Key transformation
Cryptography and Network Security” by AtulKahate Chapter 3, Page No -104
ii.
Step2- Expansion permutation
Cryptography and Network Security” by AtulKahate Chapter 3, Page No -104-105
iii. Step3- S- Box Substitution
Cryptography and Network Security” by AtulKahate Chapter 3, Page No -105-108
iv.
Step 4-P- Box substitution
Cryptography and Network Security” by AtulKahate Chapter 3, Page No -108-109
v.
Step 5- XOR and swap
Cryptography and Network Security” by AtulKahate Chapter 3, Page No -109-110
c)Variation of DES
Cryptography and Network Security” by AtulKahate Chapter 3, Page No -111
Website http://cs.ucsb.edu/~koc/cs178/docx/w04x-des.pdf
 https://www.google.co.in/search?q=des%20algorithm&tbm=isch&ei=LGW
mU8m1MtaD8gWpnYKwAQ#facrc=_&imgdii=_&imgrc=GRgKBo8qM0i
ufM%253A%3BXIxHOqkYyDZ7mM%3Bhttp%253A%252F%252Fi1.ytim
g.com%252Fvi%252FiayDUAGu9Ec%252Fhqdefault.jpg%3Bhttp%253A
%252F%252Fwww.youtube.com%252Fwatch%253Fv%253DiayDUAGu9E
c%3B480%3B360
PPTs -islab.csie.ncku.edu.tw/course/slide/ch_06.ppt
7
i.
“What is Asymmetric key cryptography?
“Cryptography and Network Security” by AtulKahate Chapter 4,Page No-154-156

Compare Symmetric key cryptography and Asymmetric key
cryptography
“Cryptography and Network Security” by AtulKahate Chapter 4,Page No-161

Introduction to Digital Signature
“ Cryptography and Network Security” by AtulKahate Chapter 4,Page No-165-166
“Principles of Computer Security + and Beyond” by Wm. Arthur”
Chapter -5 Cryptography, page 106-107,126,130
“Computer Security” by Dieter GollmanChapter -11,Page No-194-195
Website http://www.icg.isy.liu.se/courses/tsit03/forelasningar/cryptolecture08.pdf
 http://technet.microsoft.com/en-us/library/cc962021.aspx
PPTs -http://www.slideshare.net/rohitbhatta/introduction-to-digital-signatures

8
Basis of Digital signature
Cryptography and Network Security” by AtulKahate Chapter 4,Page No-166-167
Computer Security” by Dieter GollmanChapter -11,Page No-194-195”
 Basis for Hashing Concept
Principles of Computer Security + and Beyond” by Wm. Arthur” Chapter 5
page 87-89
Computer Security” by Dieter Gollman Chapter -11,Page No-192-194”
http://technet.microsoft.com/en-us/library/cc962016.aspx

Message digest
Principles of Computer Security + and Beyond” by Wm. Arthur” Chapter -5
page 90
Cryptography and Network Security” by AtulKahate Chapter 4,Page No-167-196
Web Site –
 http://www.cs.iit.edu/~cs549/lectures/CNS-5.pdf
 http://www.cs.uiuc.edu/class/fa07/cs498mmp/slides/TFC-F07-Lect15.pdf
 https://www.entrust.com/wp-content/uploads/2013/05/cryptointro.pdf

http://technet.microsoft.com/en-us/library/cc962033.aspx
Topic 4
Name: Computer Security Technology and Intrusion Detection
Knowledge Category
Example/s of category
Teaching methodology
FACT
Attack
Use appropriate example
to show how attacker
attack on Computer
security –Eg- attack on
particular personal
computer to obtained
bank account number .
Show Attacker try to
enter from weak entry
point or bypass the
security level
Eg: illegal accessing
particular bank account
to transfer money
Intrusion
Eg-Theft try to enter
through window or door
Standard Protocols
CONCEPT
Firewall
Virtual
Network
Kerberos
appropriate exampleEgFile transfer –FTP
Use appropriate example
to
show
firewall
mechanismEg Compound wall for
Building, Barrier on
Road sides.
Restricted access to
particular website in
College
Use appropriate example
to private communication
Private over public network
E.g.: Walky Talky in
Army for communicating
between soldiers.
Use appropriate ppt to
show
Lecture
no
1
Topic/ Subtopic to be covered

Introduction to Firewall
“Computer Security” by Dieter Gollman Chapter 13, Page No 247
“Cryptography and Network Security” by AtulKahateChapter 13 ,Page No:435-436

Definition of Firewall
“Computer Security” by Dieter Gollman Chapter 13, Page No 247

Need for Firewall in Computer security and network
“Cryptography and Network Security” by AtulKahateChapter 13 ,Page No:436

Characteristics of Good Firewall
“Cryptography and Network Security” by AtulKahateChapter 13 ,Page No:437

Types of Firewall and Firewall polices
“Cryptography and Network Security” by AtulKahateChapter 13 ,Page No:437
“Computer Security” by Dieter Gollman Chapter 13, Page No 248, 249

Limitation and problem in Firewall
“Computer Security” by Dieter Gollman Chapter 13, Page No 250
“Cryptography and Network Security” by AtulKahateChapter 13 ,Page No:452
Website http://www.dis.uniroma1.it/~alberto/didattica/cns-slides/firewalls.pdf
 http://www.cs.iit.edu/~cs549/slides/chapter-14.pdf
PPT  www.cs.kau.se/cs/education/courses/dvgc03/p4/Firewalls.ppt
2

Working of packet filtering in firewall
“Computer Security” by Dieter Gollman Chapter 13, Page No 248
“Cryptography and Network Security” by AtulKahateChapter 13 ,Page No:438

Working of Application gateway
“Computer Security” by Dieter Gollman Chapter 13, Page No 249
“Cryptography and Network Security” by AtulKahateChapter 13 ,Page No:441

Working of Circuit level gateways
“Computer Security” by Dieter Gollman Chapter 13, Page No 249
“Cryptography and Network Security” by AtulKahateChapter 13 ,Page No:442

Implementation of Firewall and Firewall configuration
“Cryptography and Network Security” by AtulKahateChapter 13 ,Page No:448-451
Website:
 http://www.interpole.net/interpole/products/firewall/interwall/details
3
i.
Introduction to VPN
“Cryptography and Network Security” by AtulKahateChapter 13 ,Page No:469
“Principles of ComputerCompTIA Security +and beyond” by WM.ArthurConklin,Page
No 283

VPN Architecture
“Cryptography and Network Security” by AtulKahateChapter 13 ,Page No:470-472

Types of VPN
“Cryptography and Network Security” by AtulKahateChapter 13 ,Page No:472
Website http://ptgmedia.pearsoncmg.com/images/1587051796/samplechapter/1587051796c
ontent.pdf
PPT www.csun.edu/~vcact00f/311/termProjects/.../VPNpresentation.ppt
4

Introduction
to
Kerberos
Computer Security” by Dieter Gollman Chapter 12, Page No 219-221

Relation of Kerberos with Authentication
“Principles of ComputerCompTIA Security +and beyond” by WM.Arthur Conklin
i.Chapter 11Page No- 263-264
5

How does Kerberos work
“Principles of Computer CompTIA Security +and beyond” by WM.Arthur Conklin
Chapter 11 Page No -263-264
“Cryptography and Network Security” by AtulKahateChapter 7Page No-372-377
“Cryptography and Network Security” by William Stallings Chapter 14 Page No 412-413
Website:
 http://cs.brown.edu/cgc/net.secbook/se01/handouts/Ch09-Kerberos.pdf
 http://www.cs.kent.edu/~farrell/grid06/lectures/KERBEROS.pdf
 http://technet.microsoft.com/en-us/library/cc780469(v=ws.10).aspx
 https://www.google.co.in/search?q=kerberos+authentication&espv=2&source=lnm
s&tbm=isch&sa=X&ei=BOimU6HJCNCQuASPr4C4BQ&ved=0CAYQ_AUoAQ
&biw=1024&bih=634#facrc=_&imgdii=_&imgrc=IuJfsiiiaao9WM%253A%3BRh
0gI3z74Tb68M%3Bhttp%253A%252F%252Fwww.zeroshell.org%252Fkerberos%
252Fimage%252Fkrbmsg.gif%3Bhttp%253A%252F%252Fwww.zeroshell.org%2
52Fkerberos%252FKerberos-operation%252F%3B638%3B532
6

State different types of Security topology
“Principles of Computer CompTIA Security +and beyond” by WM.Arthur Conklin
Chapter 9 Page No206-207
 What are Security Zones
“Principles of Computer CompTIA Security +and beyond” by WM.Arthur Conklin
Chapter 9 Page No218--221
 How the DMZ work
“Principles of Computer CompTIA Security +and beyond” by WM.Arthur Conklin
Chapter 9 Page No219
“Cryptography and Network Security” by AtulKahate chapter13 Page no-451-452

Working of VLAN
“Principles of Computer CompTIA Security +and beyond” by WM.Arthur Conklin
Chapter 9 Page No222
Website
https://www.google.co.in/
search?q=Security+zone&espv=2&source=lnms&tbm=isch&sa=X&ei=oeimU6v
MMdeeugTzloJA&ved=0CAYQ_AUoAQ&biw=1024&bih=634#facrc=_&imgdii
=_&imgrc=mJa95BMkxqnx_M%253A%3BI06ak8wtCiM2M%3Bhttp%253A%252F%252Fi.msdn.microsoft.com%252Fdynimg%252F
IC11169.gif%3Bhttp%253A%252F%252Fmsdn.microsoft.com%252Fenus%252Flibrary%252Fcc507438(v%253Dvs.85).aspx%3B451%3B399

http://www.cse.wustl.edu/
~jain/cis788-97/ftp/virtual_lans/
PPT-www.cc.gatech.edu/classes/AY2014/cs4270.../4270-vlan-tutorial.ppt
7

What Intruders? state its three types
“Cryptography and Network Security” by AtulKahatechapter 13 Page No 472-473
“Computer Security” by Dieter Gollman. Chapter 13 Page No-251

Basic of Intrusion detection System
“Cryptography and Network Security” by AtulKahatechapter 13 Page No 473-474
“Computer Security” by Dieter Gollman. Chapter 13 Page No-252

Types of IDS
“Cryptography and Network Security” by AtulKahatechapter 13 Page No 474-475
“Computer Security” by Dieter Gollman. Chapter 13 Page No-253
 Three Logical Component of IDS
“Principles of Computer CompTIA Security +and beyond” by WM.Arthur Conklin
Chapter 13 Page No 321

Honey pots
“Cryptography and Network Security” by AtulKahatechapter 13 Page No 475
“Computer Security” by Dieter GollmanChapter 13 Page No 254
Websites http://www.ee.tamu.edu/~reddy/ee689_04/pres_sumitha_james.pdf
PPT -www.cs.utexas.edu/users/ygz/395T-01F/reading/arun.ppt
8
 What is Host based IDS ?Show its Components
“Computer Security” by Dieter GollmanChapter 13 Page No.253
“Principles of Computer CompTIA Security +and beyond” by WM.Arthur Conklin
.Chapter 13 Page No-323
Cryptography and Network Security” by AtulKahatechapter 13 Page No 474—475

What is Network Based IDS? Show its Components
Computer Security” by Dieter GollmanChapter 13 Page No.253
“Principles of Computer CompTIA Security +and beyond” by WM.Arthur Conklin
.Chapter 13Page No -323
Cryptography and Network Security” by AtulKahatechapter 13 Page No 475
State Advantage of NIDS and Disadvantage of NIDS
“Principles of Computer CompTIA Security +and beyond” by WM.Arthur Conklin
.Chapter 13Page No -32
PPT - www.cs.northwestern.edu/~ychen/classes/msit458-f11/ids.ppt
9

Why Email security standard is required ?
Cryptography and Network Security” by AtulKahate chapter 6 Page No- 307-308
 Working Principle of SMTP along its diagram
Cryptography and Network Security” by AtulKahate chapter 6 Page No- 308-310
 What is PEM?
Cryptography and Network Security” by AtulKahate chapter 6 Page No- 310-311
 State Four Operation in PEM ?
Cryptography and Network Security” by AtulKahate chapter 6 Page No- 311-312
 Describe each Step in PEM Operation in detail
Cryptography and Network Security” by AtulKahate chapter 6 Page No- 311-314
Website:
 http://www.hydtechwriter.com/what-is-simple-mail-transfer-protocol-smtp/
PPT- www.cs.huji.ac.il/~sans/students_lectures/PEM.ppt
10

Describe PGP
Cryptography and Network Security” by AtulKahate chapter 6 Internet Security
Protocol Page No- 314-315
“Principles of Computer CompTIA Security +and beyond” by WM.Arthur Conklin
. Chapter 16Page No 433

How PGP Works
Cryptography and Network Security” by AtulKahate chapter 6 Internet Security
Protocol Page No- 314-315
“Principles of Computer CompTIA Security +and beyond” by WM.Arthur Conklin
. Chapter 16Page No 433

State step wise Operation in PGP
Cryptography and Network Security” by AtulKahate chapter 6 Internet Security
Protocal Page No- 315-316

What is S/MIME ?Describe working principle of S/MIME
Cryptography and Network Security” by AtulKahate chapter 6 Internet Security
Protocal Page No- 322-326
11

Introduction of IP Security
Cryptography and Network Security” by AtulKahate chapter9 Page No-452-453
“Computer Security” by Dieter Gollman Chapter 13 Page No -239

Overview of IPSecalong with its Application and advantage
Cryptography and Network Security” by AtulKahatechapter9 Page No-454-455
“Cryptography and Network Security “by William Stalling Chapter 16 PageNo-485486
 2 types IPsec Protocol
Cryptography and Network Security” by AtulKahatechapter9 Page No-455-457
“Cryptography and Network Security “by William Stalling Chapter 16 PageNo-486487

Draw the format of AH Header in IPSec
Cryptography and Network Security” by AtulKahatechapter9 Page No-459-463
“Computer Security” by Dieter Gollman Chapter 13 Page No -239
“Cryptography and Network Security “by William Stalling Chapter 16 PageNo-494496

Draw the format of ESP in IPSec
Cryptography and Network Security” by AtulKahatechapter9 Page No-464-465
“Computer Security” by Dieter Gollman Chapter 13 Page No -239
“Cryptography and Network Security “by William Stalling Chapter 16 PageNo-498500
Website:
 http://securityweekly.com/presentations/IPSEC.pdf
 http://technet.microsoft.com/en-us/library/cc776369(v=ws.10).aspx
https://sc1.checkpoint.com/documents/R76/CP_R76_VPN_AdminGuide/13847.ht
m
 http://www.isaserver.org/articles-tutorials/articles/IPSec_Passthrough.html
12

What is Security Association
“Principles of Computer CompTIA Security +and beyond” by WM.Arthur Conklin
Chapter11 Page No:284-285
 What is IPSec Configuration
“Principles of Computer CompTIA Security +and beyond” by WM.Arthur Conklin
Chapter11 Page no-285-286

Describe the Tranport and Tunnel Modes of AH Header in IPSec
Cryptography and Network Security” by AtulKahatechapter9 Page No-463

Describe the Transport and Tunnel Modes of ESP in IPSec
Cryptography and Network Security” by AtulKahatechapter9 Page No-464-466
Website:
 http://www.isaserver.org/articles-tutorials/articles/IPSec_Passthrough.html
 http://www.deepsh.it/networking/IPSec.html
 https://techlib.barracuda.com/display/bngv52/how+to+create+an+ipsec+vpn+tunne
l+between+the+barracuda+ng+firewall+and+a+pfsense+firewall
 http://flylib.com/books/en/3.190.1.135/1/
 https://training.apnic.net/docs/eSEC03_IPSec_Basics.pdf
PPT-www.cs.northwestern.edu/~ychen/classes/mitp-458/ipsec.pp
Topic 5
Name: IT Act and Cyber Law
Knowledge Category
Example/s of category
Teaching methodology
FACT
File
Use appropriate example
of any Software File like
DOC, PPT or EXE file
Act
Use appropriate example
of any Government
Ragging Act 2009 or
any related IT Act or
IPC Act, Copyright Act
Crime
Use appropriate example
of Crime For example –
Internet Fraud, any
Criminal Activity or
Hacking Computer
System
Law
CONCEPT
Cyber Crime
Hacking & Cracking
Piracy
Investigation
Use appropriate example
of Indian Government
Law like Murder Law
etc
Use any appropriate PPT
Use any appropriate
example of Hacking like
Facebook hacking etc.
Use any appropriate
example like Software
Piracy, CD Piracy etc
Use any appropriate
Lecture
No.
1
Topic/ Subtopic to be covered








PPTs 



What is Data Recovery
What is Computer File - Reasons of Data lost
Procedure to recover Deleted file from FAT & NTFS Partition
What is Partitioning in Computer System – Types of Partitions
Reasons of Partition damage
Formatted Partition Recovery Procedure (FAT / NFTS)
Data Recovery Categories & different Tools available
Procedure of Data Recovery & Ethics
http://www.aboutpartition.com/types-of-hard-drive-partitions/
http://www.recuperationdedonneesperdues.com/data-recovery
http://www.robertuniverse.com/introduction-to-data-recovery/
http://psonlinehelp.equallogic.com/V4.2/Content/AdminNewBook/AdminN
ew_recover.htm
 http://transparen.com/data-protection-group/data-recovery-ethics
2

What is Cyber Crime
“Information Security and Cyber Laws” by Saurabh Sharma Chapter 8
Page no 181

Different Types of Cyber Crime
“Information Security and Cyber Laws” by Saurabh Sharma Chapter 8
Page no 182

What is Hacking & Cracking – Types of Hackers

Virus & its attacks

Define terms – Pornography, Software Piracy
“Information Security and Cyber Laws” by Saurabh Sharma Chapter 7
Page no 174
PPTs –
 http://www.slideshare.net/aemankhan/cybercrimeppt-27376284
 https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=7
&cad=rja&uact=8&sqi=2&ved=0CEIQFjAG&url=http%3A%2F%2Fwww.
cyberseminar.cdit.org%2Fpdf%2F09_02_09%2Floknath.ppt&ei=kceiU_aJ9OHuATko4BA&usg=AFQjCNGmpx90JfvtJWuJde2U7XfLaVF7Zg&bv
m=bv.69411363,d.c2E
3
4

Intellectual Property – Copyright & Industrial Property
“Information Security and Cyber Laws” by Saurabh Sharma Chapter 7
Page no 166
http://www.wipo.int/export/sites/www/freepublications/en/intproperty/450/
wipo_pub_450.pd

Which are different types of legal Systems & its laws

Define term – Mail Bombs, Bug Exploits

Cyber Crime Investigation – its procedure
PPTs –
 http://www.slideshare.net/mahmoodttc/intellectual-property-ppt-final
 http://www.slideshare.net/tabrezahmad/cybercrime-investigation
 http://www.scribd.com/doc/94789254/Ppt-on-Investigation-Method-ofCyber-Crime

Need of Cyber Law & What is Cyber Law
“Information Security and Cyber Laws” by Saurabh Sharma Chapter 8
Page no 184 & 187

IT Act 2000- Objectives, Scope, Provisions, Advantages &
disadvantages
“Information Security and Cyber Laws” by Saurabh Sharma Chapter 8
Page no 185

IT Act 2008 – Modification in IT Act 2000, Characteristics
PPTs http://www.slideshare.net/YogendraWagh/it-act-ppt-1111
 http://www.powershow.com/view1/268863ZDc1Z/Information_Technology_Act_2000_v_s_2008_powerpoint_ppt_pre
sentation
 http://www.slideshare.net/Arnab_Roy_Chowdhury/cyber-law-15036761
Topic 6
Name: Application and Web Security
Knowledge Category
Example/s of category
Teaching methodology
FACT
Standard Protocols
Demonstrate with
SSL,TLS
suitable Chart
Web security threats
CONCEPT
Hotfix
Patch
Upgrades
Small section of code
designed to fix problems
Ex- Any work done on
Windows 2000 is
targeted at the next
service pack and
hotfixes are built against
the existing available
base.
Lecture
No.
1
Topic/ Subtopic to be covered



What is application hardening ?
What is Patches?
What is Web security?
“Principles of Computer Security CompTIA Security +and beyond” by WM.Arthur
Conklin Chapter-14 pg.nos-373 to 378
2




How web server works?
What is active Directory?
Web security threats
Web security approaches
3

Working of SSL,TLS
i. "Cryptography & Security" by C.K.ShyamalaN.HariniDr T R Padmanabhan
Chapter-11 Pg. nos358 to391
ii. AtulKahate Cryptography & Network Security Chapter-6. Pg.nos-218 to
231
PPT4
 www.smsvaranasi.com/KMC/kmc_ppt/islc/SET.ppt
 Working of SET
i. "Cryptography & Security" by C.K.ShyamalaN.HariniDr T R
Padmanabhan Chapter-11 Pg. nos391 to 415
ii. "Cryptography & Network Security "by AtulKahate
Security Protocols" Pg.nos 231 to 251
PPT  euclid.barry.edu/~zuniga/courses/cs477/SET.ppt
Chapter-6. "Internet
Information Security
Topic 1
Name: Introduction security & Model
Knowledge Category
Example/s of category
FACT
Security
CONCEPT
PRINCIPLE
Teaching methodology
Use appropriate example
of security – security
guards outside office
Ex: Students data that is
Data
details through which
you can easily find out
any student.
Three
pillars
of Use any appropriate PPT
and example – email
information security
Confidentiality,
Integrity, Availability
Information security CIA
principles
Learning Resources:
Books:
 “Principles of Information Security” By Whitman Publisher - Cengage india
 “Information System Security” by Godbole Nina Publisher - John Wiley
 “Information Security Principles and Practices” by Mark Merkov & Jim
Breithaupt Publisher – Pearson
 “Information Security & Cyber Laws” by Saurabh Sharma Publisher Vikas Publishing House
Teaching Aids:
Black board, Chalk, Transparencies, Power point presentation slides(PPTs),
Reference books, notes, LCD projector/OHP Projector
PPTs- PPT with Sample: Preferably prepare PPTs containing(Keyword in Google search:- “ppt for event classification in information
security” Select “ 2nd Link”)
 www.oic-ci.gc.ca/eng/DownloadHandler.ashx?...security.ppt

Websites https://www.cs.duke.edu/courses/summer04/cps001/.../Lecture15.ppt
Lecture
No.
Topic/ Subtopic to be covered
1
2




Define Security – Example of Security Guard
Define Information – Example like Student / Employee Data
What is the need of information? – Area where information is used
Why information is important? – what are the advantages of Information in day to
day life
“Principles of Information Security” By Nina Godbole Chapter -5
Note – Summarize the key points & definitions of Topic
 Example of application where information is important

Example: Governments, commercial businesses, and individuals
are all storing information electronically - compact, instantaneous transfer,
easy access

Ability to use information more efficiently has resulted in a rapid
increase in the value of information
 Define Information Security
“Principles of Information Security” By Nina Godbole
Chapter -1 Page No 1 to 5
PPT 3
4
5
6
7
8
iii. https://www.cs.duke.edu/courses/summer04/cps001/.../Lecture15.ppt
 How information is classified?
 Which criteria is required for classification of Information – List various criteria
“Principles of Information Security” By Nina Godbole
Chapter -5 Page No 76 to 80
 What is the need of security
 Why information security is important?
“Principles of Information Security” By Nina Godbole
Chapter -1 Page No 2,3
 Basic principles of information security – Show Pyramidal Model of CIA
 Confidentiality- Authorized user should able to access information
 Integrity- Authorized user should able to modify information
 Availability- whether authorized users or host should be available
 Which are pillars of Information security?
 Demonstrate with diagram
“Principles of Information Security” By Nina Godbole
Chapter -5 Page No 73 to 75
 What is data obfuscation? Example for data obfuscation
“Principles of Information Security” By Nina Godbole
Chapter -5 Page No 81, 82
 Event classification
“Principles of Information Security” By Nina Godbole
Chapter -5 Page No 83 to8 5
PPT iv. www.oic-ci.gc.ca/eng/DownloadHandler.ashx?...security.ppt
Topic 2 Name: Information Security Architecture and Model
Knowledge Category
Example/s of category
Teaching methodology
FACT
Information
Use example like Data
Security
CONCEPT
Management
Use appropriate example
of Management –
College management
system etc.
Standards
User appropriate
examples like ISO
standard
Guidelines
Policy
PROCEDURE
User appropriate
examples like
Guidelines of writing
paper, experiments etc.
User appropriate
examples like Password
Selection Policy
Confidentiality Model
User appropriate
examples like belief in
relationship
User appropriate PPTs &
Integrity Model
examples
Trust
PRINCIPLE
Use appropriate example
of security – security
guards
Evaluation Criteria – User appropriate PPTs &
TCSEC
examples Department of
Defense (India/U.S.)
Learning Resources::
Books:
 “Information System Security” by Godbole Nina Publisher - John Wiley
 “Information Security Principles and Practices” by Mark Merkow & Jim
Breithaupt Publisher – Pearson
Teaching Aids:
Black board, Chalk, Transparencies, Power point presentation slides(PPTs),
Reference books, notes, LCD projector/OHP Projector
Lecture
No.
Topic/ Subtopic to be covered
1

What is Information Security, Why Information Security
(Revision)

Definition of Risk Management
o Use suitable example like organization, College etc.

Components of Risk Management
o Diagram of Components & explain each component
Web Site –
 http://demop.com/articles/what-is-information-security.pdf
 http://www.investopedia.com/terms/r/riskmanagement.asp
 http://www.whatisriskmanagement.net/
 https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&
cad=rja&uact=8&ved=0CBsQFjAA&url=http%3A%2F%2Fwww.specialoly
mpics.bc.ca%2Fsites%2Fdefault%2Ffiles%2FSanctioning%2520%2520Risk%2520Management.doc&ei=MFOlU4WRO9CVuATUtoDoCw&
usg=AFQjCNF6CfirRE9Si7HfgGcz0KoL2HLzuA&bvm=bv.69411363,d.c2
E
PPts –
 https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=8&
cad=rja&uact=8&sqi=2&ved=0CDoQFjAH&url=http%3A%2F%2Fwww.ju
st.edu.jo%2F~tawalbeh%2Faabfs%2Fiss6753%2Fpresentations%2FRMP.ppt
&ei=ZlOlU8SkE9CKuATpzYDoCg&usg=AFQjCNHFQFBF90DQB0kiin7e
EJr1zoDvHA&bvm=bv.69411363,d.c2E

How to Identify Risk

Calculation of Risk – Show formula for calculation of Risk

Quantitative & Qualitative Risk Analysis – Give comparison with
example
“Information System Security” by Nina Godbole Chapter No 6, Page no 92,93
“Computer Security” by Dieter Gollman Chapter 2, Page No 26
 “Information System Security” By Nina Godbole

What is Security Policy – Types of Policies
“Information System Security” by Nina Godbole Chapter No 4, Page no 57, 58

What is Guidelines & Standards –
o Give example like Guidelines for Online exam etc.
o Give example like ISO etc.
“Information System Security” by Nina Godbole Chapter No 4, Page no -61
Web Site –
 http://www.pearsonitcertification.com/articles/article.aspx?p=418007&seqN
um=5
2
3
4
5

Trusted Computing Base (TCB)- Definition, Features & Elements
“Information Security Principles and Practices” by Mark Merkow & Jim
Breithaupt” Chapter No 5, Page No -118

What is Ring of Trust – Use diagram
“Information Security Principles and Practices” by Mark Merkow & Jim
Breithaupt” Chapter No 5, Page No -119

Ring of Trust for Stand-alone systems & for Network
environment
o Use diagram
“Information Security Principles and Practices” by Mark Merkow & Jim
Breithaupt” Chapter No 5, Page No -120, 121
Web Site –
 http://searchsecurity.techtarget.com/definition/trusted-computing-base
 http://link.springer.com/chapter/10.1007/978-3-642-04831-9_10#page-1
PPTs –
 https://wiki.engr.illinois.edu/download/attachments/183272958/trustelements-and-examples.pdf?version=1&modificationDate=1318426648000


What is Protection mechanisms
o Use example like Antivirus, CCTV cameras etc.

Different Protection Mechanisms in TCB– Prepare Chart
“Information Security Principles and Practices” by Mark Merkow & Jim
Breithaupt” Chapter No 5, Page No -121 to 123
 Process Isolation  Principles of least privilege
 Hardware Segmentation
 Layering
 Abstraction
 Data Hiding

6
7
Information Storage – Prepare the Chart & display
 Primary & Secondary Storage
 Real & Virtual Memory
 Random Memory
 Sequential Storage
 Volatile Memory

Closed & Open System

Multitasking, Multiprogramming & Multiprocessing
System

Finite State Machine
Web Site –
 http://www.cl.cam.ac.uk/~rja14/policy11/node22.html#SECTION000490000
00000000000

PPTs  https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=7&
cad=rja&uact=8&ved=0CEAQFjAG&url=http%3A%2F%2Fwww.aast.edu
%2Fpheed%2Fstaffadminview%2Fpdf_retreive.php%3Furl%3D373_23865_
CR415_2011_1__1_1_merkow_ppt_05.ppt%26stafftype%3Dstaffcourses&e
i=gFilU6PwJtiXuAT99oLQCQ&usg=AFQjCNGWq3ilHnruRPVVKLYpuqxTUWGRA&bvm=bv.69411363,d.c2E
 System Security Assurance Concepts
ii. Functional & Assurance Requirement
iii. Goals of Security Testing
iv. Formal Security Testing Models
“Principles of Information Security” By Nina Godbole Chapter -5 Page No 83 to8 5
8



What is Trusted Computer Security Evaluation Criteria (TCSEC)
“Information Security Principles and Practices” by Mark Merkow & Jim
Breithaupt” Chapter No 5, Page No -125
Purpose of TCSEC
Classes of Divisions of TCSEC
 Prepare Chart for use of Divisions and Classes
“Information Security Principles and Practices” by Mark Merkow & Jim
Breithaupt” Chapter No 5, Page No -126, 127
c) Division D
d) Division C –
Class C1 & Class C2
9
e) Division B –
Class B1,Class B2, Class B3
f) Division A –
Class A1
“Information Security Principles and Practices” by Mark Merkow & Jim Breithaupt
Chapter No 5 Page No -127, 128, 129
Web Site –
 http://www.cse.psu.edu/~tjaeger/cse443-s12/docs/ch12.pdf
 http://www.boran.com/security/tcsec.html
10

What is Information Technology Security Evaluation Criteria (ITSEC)
“Information Security Principles and Practices” by Mark Merkow & Jim
Breithaupt” Chapter No 5, Page No -129
 Comparison of ITSEC & TCSEC
“Information Security Principles and Practices” by Mark Merkow & Jim
Breithaupt” Chapter No 5, Page No -130
 ITSEC Purposes & Assurance Classes – E0 to E6
o Prepare chart for description of E0 to E6
Web Site –
 http://www.iwar.org.uk/comsec/resources/standards/itsec.htm
 http://www.newstaff.com/criteria/itsec/levels/index.html
 http://www.cse.dcu.ie/essiscope/sm2/beyond/itsec.html
11

What is Confidentiality & Integrity Model – Different Models
“Information Security Principles and Practices” by Mark Merkow & Jim
Breithaupt” Chapter No 5, Page No -141, 142
 Bell-LaPadula Model
 Biba Integrity Model
“Information Security Principles and Practices” by Mark Merkow & Jim Breithaupt
Chapter No 5
12
Web Sites –
 http://www.digitalthreat.net/2010/05/information-security-models-forconfidentiality-and-integrity/
PPTs  https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=8&
cad=rja&uact=8&ved=0CEUQFjAH&url=http%3A%2F%2Fwww.cs.gsu.ed
u%2F~cscyqz%2Fcourses%2Faos%2Fslides09%2Fch8.3-Fall09XiaoChen.ppt&ei=01ylU80n1J66BM6TgLgD&usg=AFQjCNF75f57UF6r4d
CxBVAEZVSPZEJHzw&bvm=bv.69411363,d.c2E
 https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=10
&cad=rja&uact=8&ved=0CFEQFjAJ&url=http%3A%2F%2Fwww.etcs.ipfw
.edu%2F~steffen%2FITT%2FOld-PP%2FChapter%25205Network%2520SecurityITT.ppt&ei=01ylU80n1J66BM6TgLgD&usg=AFQjCNFsMY6g2X8tr2dPvo
mZbaIldMrVvg&bvm=bv.69411363,d.c2E
 Advanced Models- Definition and Use
“Information Security Principles and Practices” by Mark Merkow & Jim
Breithaupt” Chapter No 5, Page No -142
vi. Clark &Wilson Model
vii. Noninterference Model
viii.
State Machine Model
ix. Access Matrix Model
x. Information Flow Model
Web Sites –

http://www.commondork.com/2010/05/16/bell-la-padula-biba-andclark-wilson-security-models/

http://crypto.stanford.edu/~ninghui/courses/Fall03/papers/landwehr_s
urvey.pdf
Topic 3
Name: Cryptography
Knowledge Category
Example/s of category
Teaching methodology
FACT
Plaintext
Use example of
Plaintext–Human
language understandable
by
Sender and receiver.
Key
(message:“welcome to
third year diploma”)
Cipher Text
Show any message is
Codified by replacing
or reposting. KEY is “3”
Alphabet A Codified by
key “3” to Alphabet
“C”
Show example of
codified message like
MOUSE is code to
“UEMOS”
CONCEPT
Cryptography,
Cryptanalysis
Use appropriate example
to show the converting of
plaintext to cipher text
and vice-versa –
“In war times message is
cryptograph and sent in
order to protect from
enemy.”
Encryption
Decryption
Private Key
Public Key
Show example of
encoding plaintext to
Cipher text:
Eg.
”Computer”
to”
retupmoc”
Show example of
decoding Cipher text to
Plaintext
Eg.“retupmoc”
to
“Computer”
Show example of key
which need to be kept
secret:
Lecture
No.
Topic/ Subtopic to be covered
1
 Introduction to Data Encryption Technique
“Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No
11
 What is Cryptography? – Draw diagram
“Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No1314
 What is Cryptanalysis?
“Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No
14-15
 Application of Cryptography
“Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No
14-15
Website 


http://en.wikipedia.org/wiki/Cryptography
http://www.apprendre-en-ligne.net/crypto/bibliotheque/PDF/Kwang.pdf
http://cs.stanford.edu/people/eroberts/cs181/projects/dvd- css/cryptography.htm

Classical Encryption Technique used by Sender and Recipient
2
“Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No 11

State 2 types of Encryption Methods?
“Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No 12
iii. Give various components of Symmetric Encryption And Decryption
Process – Use Diagram
“Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No
12-13
Website:
 http://www.apprendre-en-ligne.net/crypto/bibliotheque/PDF/Kwang.pdf
PPT –
1.
https://www.cs.purdue.edu/homes/ninghui/.../526_Fall12_topic02.ppt
3
iv. Define Substitution Cipher
“Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No 15
v. Working principle of Caesar cipher
“Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No
15-16
Ex: message “MOUSE”
CODED MSG: UEMOS
vi. State advantage and disadvantages of Caesar Cipher
“Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No 16
vii. Working principle of Monoalphabetic cipher
“Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No
16-17
Website
 http://www.math.uic.edu/CryptoClubProject/CCpacket.pdf
PPT –

https://www.cs.usfca.edu/~brooks/S03classes/cs486/lectures/lecture-3.ppt
4
1. Working principal of Playfair cipher – Show example
“Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No 17-19
2. Hill cipher – Show example
“Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No 19-21
Website http://www.ling.ohio-state.edu/~cbrew/2008/spring/playfair.pdf
PPT https://www.uop.edu.jo/material/1843212812010.ppt
5
a) Define Transposition cipher. State its 2 types
“Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No 26-27
b) How Row transposition cipher works – Use example
“Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No 2627
Website 6
 http://courses.cs.tamu.edu/pooch/665_spring2008/Australian-sec-2006/less05.html
a) Working principle of One Time Pad – Give example & Solve it
“Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No 24
PPT
https://www.cs.usfca.edu/~brooks/S03classes/cs486/lectures/lecture-3.ppt
7
b) What is Stegnography? – Flow diagram
“Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No 28

Uses of Stegnography
“Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No 28

Stegnography and security
“Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No 28
Website8
 http://arxiv.org/ftp/arxiv/papers/0912/0912.2319.pdf
 Introduction to Digital Signatures,
“Cryptography and Information Security” by V.K.Pachghare Chapter 10 page no -204

Implementation of Digital Signature
o Use Flow diagram for explanation
“Cryptography and Information Security” by V.K.Pachghare Chapter 10 page no -206
 Association of Digital signature and Encryption
“Cryptography and Information Security” by V.K.Pachghare Chapter 10 page no -206
Website http://www.youdzone.com/signature.html
 http://www.infosec.gov.hk/english/itpro/public_main.html
9

What are Digital Signature Algorithm
“Cryptography and Information Security” by V.K.Pachghare Chapter 10 page no 208

Working Principle of Various Digital Signature Algorithm
“Cryptography and Information Security” by V.K.Pachghare Chapter 10 page no 209-212
Websitea) http://www.cs.haifa.ac.il/~orrd/IntroToCrypto/online/fips_186-3.pdf
10

Authentication Protocols – List different Protocols
“Cryptography and Information Security” by V.K.Pachghare Chapter 10 page no 214
11

What is Digital Signature Standards
“Cryptography and Information Security” by V.K.Pachghare Chapter 10 page no 213
Website12
 http://www.cs.haifa.ac.il/~orrd/IntroToCrypto/online/fips_186-3.pdf
 http://courses.cs.tamu.edu/pooch/665_spring2008/Australian-sec-2006/less19.html
 Give Application Digital Signature Standards
“Cryptography and Information Security” by V.K.Pachghare Chapter 10 page no 213-214
Website http://www.cs.haifa.ac.il/~orrd/IntroToCrypto/online/fips_186-3.pdf
Topic 4 Name: Data Recovery and Cyber Security
Knowledge Category
Example/s of category
Teaching methodology
FACT
File
Use appropriate example
of any Software File like
DOC, PPT or EXE file
Act
Use appropriate example
of any Government
Ragging Act 2009 or
any related IT Act or
IPC Act, Copyright Act
Crime
Use appropriate example
of Crime For example –
Internet Fraud, any
Criminal Activity or
Hacking Computer
System
Law
CONCEPT
Cyber Crime
Hacking & Cracking
Piracy
Investigation
PROCEDURE
Use any appropriate
example of Hacking like
Facebook hacking etc.
Use any appropriate
example like Software
Piracy, CD Piracy etc
Use any appropriate
example of
investigation bureau
Cyber Law
Use any appropriate PPT
or example like IT Act
1961 etc.
Use any appropriate PPT
IT Act 2000, 2008
Use any appropriate PPT
Data Recovery Tools
Use
IT Act
PRINCIPLE
Use appropriate example
of Indian Government
Law like Murder Law
etc
Use any appropriate PPT
any
appropriate
Freely available tool like
-
Lecture
No.
1
Topic/ Subtopic to be covered






PPTs 



2




What is Data Recovery
What is Computer File - Reasons of Data lost
Procedure to recover Deleted file from FAT & NTFS Partition
What is Partitioning in Computer System – Types of Partitions
Reasons of Partition damage
o List out the reasons
Formatted Partition Recovery Procedure (FAT / NFTS)
http://www.aboutpartition.com/types-of-hard-drive-partitions/
http://www.recuperationdedonneesperdues.com/data-recovery
http://www.robertuniverse.com/introduction-to-data-recovery/
http://psonlinehelp.equallogic.com/V4.2/Content/AdminNewBook/AdminNe
w_recover.htm
Data Recovery Categories
Different Tools available for Windows etc.
– List of various freely available tools on Internet
Procedure of Data Recovery
– Give step wise example
Data Recovery Ethics
Website a)
http://pcsupport.about.com/od/filerecovery/tp/free-file-recoveryprograms.htm
b)
http://transparen.com/data-protection-group/data-recovery-ethics
3

What is Cyber Crime
“Information Security and Cyber Laws” by Saurabh Sharma Chapter 8 Page
no 181

Different Types of Cyber Crime
o Use tree diagram for Types of Cyber Crime
“Information Security and Cyber Laws” by Saurabh Sharma Chapter 8 Page
no 182
PPTs –
 http://www.slideshare.net/aemankhan/cybercrimeppt-27376284
 https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=7&
cad=rja&uact=8&sqi=2&ved=0CEIQFjAG&url=http%3A%2F%2Fwww.cy
berseminar.cdit.org%2Fpdf%2F09_02_09%2Floknath.ppt&ei=kceiU_aJ9OHuATko4BA&usg=AFQjCNGmpx90JfvtJWuJde2U7XfLaVF7Zg&bvm
=bv.69411363,d.c2E
4



What is Hacking & Cracking – Types of Hackers
Virus & its attacks – List types of attacks like Dos, DDos…
Define terms – Pornography, Software Piracy
o Use example like CD Piracy etc.
“Information Security and Cyber Laws” by Saurabh Sharma Chapter 7 Page
no 174
Website –
a) http://www.legalservicesindia.com/articles/cyhac.htm
b) http://evestigate.com/cyber-crime-hacker-terms-to-know/
5

What is Intellectual Property

Copyright,

Patents

Industrial Design Rights

Trademark – Use example like logo of MSBTE etc.

What is Industrial Property
“Information Security and Cyber Laws” by Saurabh Sharma Chapter 7 Page
no 166

Define term – Mail Bombs, Bug Exploits
Website –
a)
http://www.wipo.int/export/sites/www/freepublications/en/intproperty/450/
wipo_pub_450.pdf
6
7
PPTs –
 http://www.slideshare.net/mahmoodttc/intellectual-property-ppt-final

Which are different types of legal Systems & its laws

Cyber Crime Investigation – its procedure
Website  http://www.slideshare.net/tabrezahmad/cybercrime-investigation
 http://www.scribd.com/doc/94789254/Ppt-on-Investigation-Method-ofCyber-Crime

Need of Cyber Law
“Cyber Crimes and related Laws” by Saurabh Sharma Chapter 8 Page no
184 & 187

What is Cyber Laws – Definition of Cyber Law
“Cyber Crimes and related Laws” by Saurabh Sharma Chapter 8 Page no
184
PPTs http://www.slideshare.net/Arnab_Roy_Chowdhury/cyber-law-15036761
8

IT Act 2000- Objectives, Scope, Provisions, Advantages &
disadvantages
“Information Security and Cyber Laws” by Saurabh Sharma Chapter 8 Page no 185

o List out the Chapters
IT Act 2008 – Modification in IT Act 2000, Characteristics
o List out the Chapters
PPT –
 http://www.slideshare.net/YogendraWagh/it-act-ppt-1111
 http://www.powershow.com/view1/268863ZDc1Z/Information_Technology_Act_2000_v_s_2008_powerpoint_ppt_pre
sentation
Topic 5 Name: Access, Physical Control and Compliance Standards
Knowledge Category
Example/s of category
FACT
Identification
CONCEPT
Use any physical mark
of identification
example like Green
color eyes .
Use appropriate example
Biometrics
of Biometrics – Thumb
impression used in
attendance system of
Physical access control
college.
Use example of Door
Security system or
Digital Locker –Thumb
impression is used to
open lock etc.
Compliance Standards Acting according to
certain accepted
standard .Eg like ISO
standard
Authorization
Authentication
Framework
PRINCIPLE
Teaching methodology
Kerberos Model
Specifying access rights
to particular resources
Eg: human
resources staff is
normally authorized to
access employee
records. It includes
formalized as access
control rules in a
computer system.
Accepting proof of
identity given by a
credible person
examples like College
ID card or Employee
ID, Passport
Structure of Computer
System
Use example of
Software frameworks
include support
programs, compilers,
code libraries, tool sets,
and API
User appropriate PPTs &
Lecture
No.
Topic/ Subtopic to be covered
1

What is Identification? – Use example like Photo ID card
“Information Security Principles and Practices” by Mark Merkov & Jim
Breithaupt Chapter 10 Page No 234

Define Authorization? State its features
“Principles of Information Security” by By Michael E. Whitman , Herbert J.
Mattord Chapter 6 Page no 249

What is Authentication?
“Information Security Principles and Practices” by Mark Merkov & Jim
Breithaupt Chapter 10 Page No 234

State features of Biometrics? – Use example like Thumb Reader etc.
“Information Security Principles and Practices” by Mark Merkov & Jim
Breithaupt Chapter 10 Page No 241

Give various element involved in Biometrics System – Show diagram
“Information Security Principles and Practices” by Mark Merkov & Jim
Breithaupt Chapter 10 Page No 241

How Single Sign- on works? – Use diagram
“Information Security Principles and Practices” by Mark Merkov & Jim
Breithaupt Chapter 10 Page No 242
Website –
 http://www.cyberciti.biz/faq/authentication-vs-authorization/
 http://www.cse.iitk.ac.in/users/biometrics/pages/what_is_biom_more.h
 http://www.biometrics.gov/

PPT –
 www.cse.fau.edu/~security/public/BiometricsPresentation.ppt
 https://www.owasp.org/.../OWASPSanAntonio_2006_08_SingleSignO
n.
2

Describe Kerberos Model?
o Use various servers used in Kerberos
o Draw diagram
“Information Security Principles and Practices” by Mark Merkov & Jim
Breithaupt Chapter 10 Page No 243

Show relation of Kerberos with Authentication
Ex: Student is allowed to enter in Library hall by checking College ID and entering
name in Register and Verify by Librarian or any other suitable examples
“Information Security Principles and Practices” by Mark Merkov & Jim
Breithaupt Chapter 10 Page No 243

How Remote Access works?
“Information Security Principles and Practices” by Mark Merkov & Jim
Breithaupt Chapter 10 Page No 247

Remote user access and Authentication
“Information Security Principles and Practices” by Mark Merkov & Jim
Breithaupt Chapter 10 Page No 247
Website:
a) http://technet.microsoft.com/en-us/library/cc780469(v=ws.10).aspx
b) http://www.google.co.in/imgres?imgurl=&imgrefurl=http%3A%2F%2Fwww.codep
roject.com%2FArticles%2F27554%2FAuthentication-in-web-services-using-C-andKerbero&h=0&w=0&tbnid=qv2CJmNFmv7QYM&zoom=1&tbnh=186&tbnw=27
0&docid=IGaJwLDTXe1FmM&tbm=isch&ei=GeoU_3TCZKgugS8r4LwCQ&ved=0CAIQsCUoAA
c) https://software.intel.com/sites/manageability/AMT_Implementation_and_Referenc
e_Guide/default.htm?turl=WordDocuments%2Fintroductiontokerberosauthenticatio
n.htm
PPT:
a) www.obscure.org/~jafitz/250_p1/Kerberos.ppt
b) www.isi.edu/~annc/classes/grid/lectures/sivaLecture.ppt
3
 What is Physical access control?
Ex: Use example of Door Security system or Digital Locker –Thumb impression is
used to open lock etc
“Principles of Information Security” by By Michael E. Whitman , Herbert J.
Mattord Chapter 9 Page no 400
a) What are threat invoked in Physical access
“Information Security Principles and Practices” by Mark Merkov & Jim
Breithaupt Chapter 8 Page No 195.
a) Need for Physical Security
“Information System Security” by Nina Godbole Chapter 7 Page No 101
Website –
 http://www.cdn.com/securitysystemPhysical.aspx
4
b) What is Physical Security – example like wall, security dogs, safety doors etc.
“Information System Security” by Nina Godbole Chapter 7 Page No 102
c) How to provide physical security
“Information Security Principles and Practices” by Mark Merkov & Jim
Breithaupt Chapter 8 Page No 197, 198
Website –
 http://www.cdn.com/securitysystemPhysical.aspx
5

Define Compliance in general term

What is Compliance Standard

Implementing and Information Security Management System
(ISMS)
“Information System Security” by Nina Godbole Chapter 4 Page No 64 and
Chapter 23Page No 424
Website:
 www.oxforddictionaries.com/definition/english/compliance

http://www.immusec.com/en/implementation-information-securitymanagement-system

https://www.aiche.org/ccps/topics/elements-process-safety/commitmentprocess-safety/compliance-standards/introduction
6

ISO 27001“Information System Security” by Nina Godbole Chapter 22 Page No
400

ISO 20000
“Information System Security” by Nina Godbole Chapter26 Page No
470
BS25999



PCI DSS
“Information System Security” by Nina Godbole
Website





www.iso.org/iso/home/standards/management-standards/iso27001.htm
www.iso27001security.com
http://www.standards.org/standards/listing/iso_20000
https://www.pcisecuritystandards.org/security_standards/
http://www.securityassessment.com/files/presentations/PCI_DSS_Presentation_0107.pdf
 https://www.set.or.th/.../BCM%20with%20PWC%2027%20April%20v3.
PPT
7

www.ermantaskin.com/bcm/BS25999_ERMAN_TASKIN.ppt
How ITIL frameworks help the IT organization?
“Information System Security” by Nina Godbole Chapter26 Page No 470
Website http://www.itil-officialsite.com/AboutITIL/WhatisITIL.aspx
 http://www.best-management-practice.com/gempdf/itil_the_basics.pdf
PPT a) https://www.ok.gov/OSF/documents/ITILOverview.ppt
b) www.chakarov.com/powerpoints/itilv3overview.ppt
8

How COBIT framework works in IT organization
“Information System Security” by Nina Godbole Chapter 22 Page No 400 and
Chapter 25 Page No 449
Website:
a) http://www.isaca.org/cobit/documents/cobit-5-introduction.pdf
b) http://www.counterpoint.co.za/pages/cobit.htm
c) http://www.isaca.org/COBIT/Documents/COBIT5-Ver2-FrameWork.pdf
ppt:
a) www.isaca.org/cobit/documents/cobit5-introduction.ppt
b) https://www.vpit.ualberta.ca/frameworks/ppt/cobit_introduction.pp
Download