0% found this document useful (0 votes)
447 views

Information Security - Practical

This document outlines the course details for the 5th semester Diploma in Computer Engineering subject "Information Security–Practical" at Bhagwan Mahavir University. The practical course is worth 2 credits and involves various hands-on exercises in security topics over 4 hours per week, with internal and external practical exams contributing to the final marks. Some of the practical exercises include implementing encryption ciphers like Caesar cipher, Hill cipher, and RSA, as well as securing email and firewall configuration. Reference books and open source software for the course are also listed.

Uploaded by

Dhruv Sojitra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
447 views

Information Security - Practical

This document outlines the course details for the 5th semester Diploma in Computer Engineering subject "Information Security–Practical" at Bhagwan Mahavir University. The practical course is worth 2 credits and involves various hands-on exercises in security topics over 4 hours per week, with internal and external practical exams contributing to the final marks. Some of the practical exercises include implementing encryption ciphers like Caesar cipher, Hill cipher, and RSA, as well as securing email and firewall configuration. Reference books and open source software for the course are also listed.

Uploaded by

Dhruv Sojitra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Effective From

BHAGWAN MAHAVIR UNIVERSITY (2022-2023)

Diploma Engineering (Computer


Computer Engineering)

Semester: V
Subject Subject
Teaching Scheme (Hours)
Code Title
Practical Credits Practical Examination Total Marks
Information
Marks
1030106508 Security–
Internal External
Practical
4 2 20 30 50
Duration of Exam: 2:00 Hours
Detail Content:

Approx.
Sr.
Unit No. Practical Exercises/Experiments Hrs.
No.
Required

1 1 Execution of various net commands


commands. 2

Prepare a report on various security services, security attacks


2 1 4
and security mechanisms.

3 1 Prepare a report on OSI Security Architecture. 2

4 1 Draw diagram for CIA. 2

5 2 Configure firewall of (Winx XP/ Win 7/8/10). 2

6 2 Make a study of Malware. 2

7 3 Implement Caesar Cipher & solve various examples on it. 4

8 3 Implement Hill Cipher. 4

9 3 Implement Caesar Cipher on Encryption & Decryption.


Decryption 4

Implement Mono alphabetic Substitution on Encryption &


10 3 4
Decryption.

11 3 Implement Play Fair Substitution on Encryption & Decryption. 4

12 3 Implement for Vigenere Substitution on Encryption & 2

Registrar Dean
Dean- Academics Chairman - BOS
Effective From
BHAGWAN MAHAVIR UNIVERSITY (2022-2023)

Decryption.

Implement One Time Pad Substitution on Encryption &


13 3 2
Decryption
Decryption.

14 4 Prepare a report on block cipher modes of operation. 2

15 4 Prepare a report on DES. 2

16 5 Draw diagram of Public Key Infrastructure. 2

17 5 Prepare a report on Diffie


Diffie-Hellman Key Exchange. 2

18 5 Prepare a report on RSA. 2

19 6 Prepare a report on Digital Signatures. 2

20 6 Configure
onfigure your email account against various threats
threats. 2

List of Open Source Software/learning website:

1. Turbo C++/ Borland C++/ any other C++ compiler with integrated GUI Environment
2. http://www.cryptix.org/
3. http://www.cryptocd.org/
4. http://www.cryptopp.org/

Reference Books:

1. Security in Computing, Fourth Edition, by Charles P. Pfleeger, Pearson Education


2. Cryptography and Network Security Principal and Practices AtulKahate Tata
Tata-McGraw-Hill
Sixth reprint 2006
3. Cryptography And Network Security Principles And Practice, Fourth or Fifth FifthEdition,
William Stallings, Pearson
4. Cryptographyy and Network Security B A Forouzan TMH
5. Network Security private communication in a PUBLIC world By Charlie Kaufman, Radia
Perlman , Mike Speciner
6. Computer Security Basics By Debby Russell, G.T. Gangemi, Sr.(Oreilly)

*******************************************************************

Registrar Dean
Dean- Academics Chairman - BOS

You might also like