Latest update Android YouTube

Information Security and IPR | Complete Tutorial Series

Master Information Security and IPR

Course Objectives:

  1. To understand the broad set of technical and social aspects of information security.
  2. To understand the fundamentals of cryptography to preserve Privacy and Authentication services for information security.
  3. To understand the fundamentals of Smartphone security, Banking Credit Card and UPI Security.
  4. To understand the various Cyber Security laws and Initiatives in India.
  5. To acquaint the learners with the essential knowledge of Intellectual Property Rights.
  6. For B.Tech. (Common for CSE, CSE with Specialization in Data Science)

Detailed Course Roadmap

Unit 1: Fundamentals of Information Security and Cryptography

Introduction to Information Security

  • Principles of Information Security (CIA Triad: Confidentiality, Integrity, Availability)
  • Basic Security Components (Hardware, Software, Policies, People)
  • Information Security Threats (Malware, Phishing, DoS, Insider Threats, etc.)
  • Security Policies and Procedures

Cryptography Fundamentals

  • Cryptosystem Components
  • Types of Cryptography (Symmetric, Asymmetric, Hash Functions)
  • Cryptographic Principles (Confusion, Diffusion, Kerckhoffs's Principle)
  • Digital Signatures (Concept, Applications)

Encryption Algorithms

  • DES (Data Encryption Standard) - Structure, Rounds, Strengths/Weaknesses
  • Breaking DES (Brute Force, Differential Cryptanalysis)
  • RSA Algorithm (Key Generation, Encryption/Decryption, Security)
  • PGP (Pretty Good Privacy) - Architecture and Applications

Key Management

  • Diffie-Hellman Key Exchange Protocol
  • Needham-Schroeder Protocol
  • Public Key Infrastructure (PKI) Components and Functioning
  • Digital Certificates and Certificate Authorities

Unit 2: Authentication, Mobile Security, and Financial Security

Authentication and Hashing Protocols

  • Password-based Techniques (Salting, Hashing, Storage Methods)
  • Kerberos Protocol (Authentication Process, Ticket Granting)
  • Realms in Kerberos Protocol
  • Hashing Algorithms (MD5, SHA-1) - Structure and Vulnerabilities

Malicious Code and Countermeasures

  • Types of Malicious Software (Viruses, Worms, Trojans, Ransomware)
  • Life Cycle of a Virus (Dormant, Propagation, Triggering, Execution)
  • Countermeasures (Antivirus, Firewalls, IDS/IPS)
  • Computer Virus Detection and Prevention Techniques

Mobile Phone Security

  • Authentication, Authorization and Accounting in GSM
  • Security Mechanisms in CDMA Communication
  • Mobile Device Security Challenges
  • Biometric Authentication in Smartphones

Online Banking, Credit Card and UPI Security

  • Online Banking Security Mechanisms (2FA, OTP, Behavioral Analysis)
  • Mobile Banking Security Protocols
  • Security of Debit and Credit Cards (EMV Chip, CVV, Tokenization)
  • UPI Security Architecture and Fraud Prevention

Unit 3: Cyber Security Landscape and Legal Aspects

Cyber Security Initiatives in India

  • Cyber Security Exercises and Drills
  • National Cyber Security Policy
  • Cyber Swachhta Kendra
  • Indian Computer Emergency Response Team (CERT-In)

Cyber Security Threat Landscape and Techniques

  • Current Cyber Security Threat Landscape
  • Emerging Cyber Security Threats (AI-based attacks, IoT vulnerabilities)
  • Cyber Security Techniques (Encryption, Access Control, Monitoring)
  • Firewalls (Types: Packet-filtering, Stateful, Proxy, Next-Gen)
  • Firewall Configurations (Screened subnet, Multi-homed, DMZ)
  • Incident Handling and Response
  • Cyber Security Assurance Frameworks

IT Security Act and Miscellaneous Topics

  • Information Technology Act (2000 and amendments)
  • Types of Hackers and Attackers (White Hat, Black Hat, Script Kiddies)
  • Web Application Security (OWASP Top 10, SQL Injection, XSS)
  • Digital Infrastructure Security
  • Defensive Programming Techniques

Unit 4: Intellectual Property Rights

Introduction to IPR

  • Nature of Intellectual Property
  • Types of IP: Patents, Designs, Trademarks, Copyright
  • The IPR Toolkit for Professionals

Copyright

  • Copyright Fundamentals
  • Copyright Infringement Cases
  • Law of Copyrights in India
  • Digital Rights Management (DRM)

Patents

  • Process of Patenting and Development
  • Patent Searching Process
  • Ownership Rights and Transfer
  • Patent Act of India
  • Software Patents Controversy

Trade Secrets and Designs

  • Trade Secret Laws
  • Trade Secret Litigation
  • Design Process Protection
  • Design Act in India

Cyber Laws and Digital Content Protection

  • Legal Framework for Digital Content
  • Plagiarism Detection
  • Digital Watermarking
  • Case Studies in IPR Violations

Course Outcomes

After completion of this course, students will be able to:

  1. Differentiate various information security threats and their countermeasures.
  2. Design authentication mechanisms for different applications.
  3. Understand the fundamentals of Smartphone security, Banking, Credit Card and UPI Security.
  4. Analyze various cyber security threats, cybercrime patterns and objectives of IT security Act.
  5. Apply knowledge of Intellectual Property and its protection through various laws and regulations.

Textbooks and References

Type Details
Textbooks
  1. William Stallings, "Cryptography and Network Security Principles and Practices" Seventh Edition, Pearson
  2. Wm. Arthur Conklin, Greg White, "Principles of Computer Security", Fourth Edition, McGraw Hill, 2016
  3. Deborah E. Bouchoux, "Intellectual Property: The Law of Trademarks, Copyrights, Patents, and Trade Secrets", Cengage Learning, 2013
Reference Books
  1. Raghu Santanam, M. Sethumadhavan, "Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives", Information Science Reference
  2. Pfleeger, Charles P. and Shari L. Pfleeger, "Security in Computing", 4th Edition, Prentice Hall, 2008
  3. Various cybersecurity ebooks from https://www.newhorizons.com/promotions/cybersecurity-ebooks

Suggested Course Tutorial Activities

  • Implement basic cryptographic algorithms (DES, RSA) in programming languages
  • Analyze case studies of major security breaches
  • Conduct vulnerability assessment of sample web applications
  • Perform patent searches for given technology domains
  • Simulate cyber attack scenarios and defense mechanisms
  • Analyze real-world IPR dispute cases
  • Develop security policies for different organizational scenarios

إرسال تعليق

Feel free to ask your query...
Cookie Consent
We serve cookies on this site to analyze traffic, remember your preferences, and optimize your experience.
Oops!
It seems there is something wrong with your internet connection. Please connect to the internet and start browsing again.
AdBlock Detected!
We have detected that you are using adblocking plugin in your browser.
The revenue we earn by the advertisements is used to manage this website, we request you to whitelist our website in your adblocking plugin.
Site is Blocked
Sorry! This site is not available in your country.