Master Information Security and IPR
Course Objectives:
- To understand the broad set of technical and social aspects of information security.
- To understand the fundamentals of cryptography to preserve Privacy and Authentication services for information security.
- To understand the fundamentals of Smartphone security, Banking Credit Card and UPI Security.
- To understand the various Cyber Security laws and Initiatives in India.
- To acquaint the learners with the essential knowledge of Intellectual Property Rights.
- For B.Tech. (Common for CSE, CSE with Specialization in Data Science)
Detailed Course Roadmap
Unit 1: Fundamentals of Information Security and Cryptography
Introduction to Information Security
- Principles of Information Security (CIA Triad: Confidentiality, Integrity, Availability)
- Basic Security Components (Hardware, Software, Policies, People)
- Information Security Threats (Malware, Phishing, DoS, Insider Threats, etc.)
- Security Policies and Procedures
Cryptography Fundamentals
- Cryptosystem Components
- Types of Cryptography (Symmetric, Asymmetric, Hash Functions)
- Cryptographic Principles (Confusion, Diffusion, Kerckhoffs's Principle)
- Digital Signatures (Concept, Applications)
Encryption Algorithms
- DES (Data Encryption Standard) - Structure, Rounds, Strengths/Weaknesses
- Breaking DES (Brute Force, Differential Cryptanalysis)
- RSA Algorithm (Key Generation, Encryption/Decryption, Security)
- PGP (Pretty Good Privacy) - Architecture and Applications
Key Management
- Diffie-Hellman Key Exchange Protocol
- Needham-Schroeder Protocol
- Public Key Infrastructure (PKI) Components and Functioning
- Digital Certificates and Certificate Authorities
Unit 2: Authentication, Mobile Security, and Financial Security
Authentication and Hashing Protocols
- Password-based Techniques (Salting, Hashing, Storage Methods)
- Kerberos Protocol (Authentication Process, Ticket Granting)
- Realms in Kerberos Protocol
- Hashing Algorithms (MD5, SHA-1) - Structure and Vulnerabilities
Malicious Code and Countermeasures
- Types of Malicious Software (Viruses, Worms, Trojans, Ransomware)
- Life Cycle of a Virus (Dormant, Propagation, Triggering, Execution)
- Countermeasures (Antivirus, Firewalls, IDS/IPS)
- Computer Virus Detection and Prevention Techniques
Mobile Phone Security
- Authentication, Authorization and Accounting in GSM
- Security Mechanisms in CDMA Communication
- Mobile Device Security Challenges
- Biometric Authentication in Smartphones
Online Banking, Credit Card and UPI Security
- Online Banking Security Mechanisms (2FA, OTP, Behavioral Analysis)
- Mobile Banking Security Protocols
- Security of Debit and Credit Cards (EMV Chip, CVV, Tokenization)
- UPI Security Architecture and Fraud Prevention
Unit 3: Cyber Security Landscape and Legal Aspects
Cyber Security Initiatives in India
- Cyber Security Exercises and Drills
- National Cyber Security Policy
- Cyber Swachhta Kendra
- Indian Computer Emergency Response Team (CERT-In)
Cyber Security Threat Landscape and Techniques
- Current Cyber Security Threat Landscape
- Emerging Cyber Security Threats (AI-based attacks, IoT vulnerabilities)
- Cyber Security Techniques (Encryption, Access Control, Monitoring)
- Firewalls (Types: Packet-filtering, Stateful, Proxy, Next-Gen)
- Firewall Configurations (Screened subnet, Multi-homed, DMZ)
- Incident Handling and Response
- Cyber Security Assurance Frameworks
IT Security Act and Miscellaneous Topics
- Information Technology Act (2000 and amendments)
- Types of Hackers and Attackers (White Hat, Black Hat, Script Kiddies)
- Web Application Security (OWASP Top 10, SQL Injection, XSS)
- Digital Infrastructure Security
- Defensive Programming Techniques
Unit 4: Intellectual Property Rights
Introduction to IPR
- Nature of Intellectual Property
- Types of IP: Patents, Designs, Trademarks, Copyright
- The IPR Toolkit for Professionals
Copyright
- Copyright Fundamentals
- Copyright Infringement Cases
- Law of Copyrights in India
- Digital Rights Management (DRM)
Patents
- Process of Patenting and Development
- Patent Searching Process
- Ownership Rights and Transfer
- Patent Act of India
- Software Patents Controversy
Trade Secrets and Designs
- Trade Secret Laws
- Trade Secret Litigation
- Design Process Protection
- Design Act in India
Cyber Laws and Digital Content Protection
- Legal Framework for Digital Content
- Plagiarism Detection
- Digital Watermarking
- Case Studies in IPR Violations
Course Outcomes
After completion of this course, students will be able to:
- Differentiate various information security threats and their countermeasures.
- Design authentication mechanisms for different applications.
- Understand the fundamentals of Smartphone security, Banking, Credit Card and UPI Security.
- Analyze various cyber security threats, cybercrime patterns and objectives of IT security Act.
- Apply knowledge of Intellectual Property and its protection through various laws and regulations.
Textbooks and References
Type | Details |
---|---|
Textbooks |
|
Reference Books |
|
Suggested Course Tutorial Activities
- Implement basic cryptographic algorithms (DES, RSA) in programming languages
- Analyze case studies of major security breaches
- Conduct vulnerability assessment of sample web applications
- Perform patent searches for given technology domains
- Simulate cyber attack scenarios and defense mechanisms
- Analyze real-world IPR dispute cases
- Develop security policies for different organizational scenarios