Semester 6Year 3 · EvenCore Subject★★★ Moderate
CS 602

Information Security

Study of cryptography, network security, authentication, encryption algorithms, and cyber security principles.

4Units
26Topics
4Credits
60hLecture hrs
100Max marks
Your Progress
0 / 26 topics
0% complete
Overview
🎯
Why it matters
Every data breach, every ransomware attack, every password leak — security failures cost billions. Understanding encryption, authentication, and security protocols is critical in our connected world.
💼
Placement relevance
Cybersecurity Engineer roles growing rapidly. Banks, fintech, defense sectors hire security specialists. Certifications (CEH, CISSP) add ₹8-15 LPA to salary. High demand, low supply.
🔗
Prerequisites for
Cybersecurity · Ethical Hacking · Blockchain · Cryptography · Penetration Testing · SOC Analyst roles
📚
Recommended books
Cryptography and Network Security by William Stallings · Computer Security: Principles and Practice by Stallings & Brown · The Web Application Hacker's Handbook by Stuttard & Pinto
Curriculum — 4 Units
U1
Unit 1 · 6 Topics · 0% complete
Cryptography Basics
Key Formulae
RSA:C = M^e mod n; M = C^d mod n
AES:128/192/256-bit keys, block cipher
Diffie-Hellman:Shared secret = (g^a mod p)^b mod p
Encryption/Decryption
Symmetric Key (DES, AES)
Asymmetric Key (RSA)
Hash Functions (MD5, SHA)
Digital Signatures
Key Exchange (Diffie-Hellman)
U2
Unit 2 · 7 Topics · 0% complete
Network Security
Key Formulae
CIA Triad:Confidentiality, Integrity, Availability
AAA:Authentication, Authorization, Accounting
Firewalls (Packet Filtering, Stateful)
IDS/IPS
VPN
SSL/TLS
IPSec
Network Attacks (Spoofing, Sniffing)
DoS/DDoS
U3
Unit 3 · 6 Topics · 0% complete
Authentication & Access Control
Key Formulae
Access Control:DAC (Discretionary), MAC (Mandatory), RBAC (Role-Based)
Kerberos:Ticket Granting Service (TGS) + Authentication Server (AS)
Password Security (Hashing, Salting)
Two-Factor Auth (2FA)
Biometrics
OAuth, SAML
Kerberos
Access Control Models (DAC, MAC, RBAC)
U4
Unit 4 · 7 Topics · 0% complete
Security Attacks & Defenses
Key Formulae
SQL Injection:' OR '1'='1 (bypass authentication)
XSS:<script>alert('XSS')</script> (inject malicious script)
Malware Types (Virus, Worm, Trojan)
Phishing, Social Engineering
SQL Injection
XSS (Cross-Site Scripting)
CSRF
Buffer Overflow
Security Auditing
Previous Year Questions
Unit 12023 · End Semester10 marks
Given p=11, q=13, e=7 for RSA. Encrypt message M=5. Show key generation (n, φ, d) and encryption step-by-step.
Unit 32022 · End Semester8 marks
Explain Kerberos authentication protocol with a diagram. What are the roles of AS, TGS, and tickets?
Unit 42022 · Mid Semester6 marks
What is SQL Injection? Give an example query and explain how to prevent it using prepared statements.
Exam Strategy
🔐
Crypto math is asked
RSA encryption/decryption with small numbers. Know modular arithmetic (a^b mod n). Euclid's algorithm for finding d. Show all steps.
🛡️
CIA Triad in every answer
Relate every security concept to Confidentiality, Integrity, or Availability. Firewalls maintain Integrity. Encryption ensures Confidentiality.
⚠️
Know attack types
SQL Injection, XSS, CSRF, Phishing — explain with examples and countermeasures. OWASP Top 10 is exam gold.
Related Subjects
Semester 4
Computer Networks
CS 403
Semester 7
Blockchain Technology
CS 704