Unit - I Security Basics Information Security Concepts, Security Threats and Vulnerabilities, Security Architectures and Operational Models, Types of Security attacks, Goals of Security Malicious code, Intrusion detection system (IDS) : Need, Types, Limitations and Challenges, Security and privacy. (Chapter - 1) Unit - II Symmetric and Asymmetric Key Cryptography Introduction, Classical Encryption Techniques, Block Ciphers and Data Encryption standards, Advanced Encryption standard, Public Key Cryptography and RSA, Chinese Remainder Theorem, Diffie-Hellman, Elgamal Curve Arithmetic, Elliptic Curve Arithmetic, Elliptic Curve Cryptography. (Chapter - 2) Unit - III Data Integrity Algorithms and Security Requirements Cryptographic Hash Functions, Requirements and Security, SHA-1, SHA-3, Digital Signatures, X.509 Certificate, Kerberos, IP Security : Architecture Protocols IPv4, IPv6, AH EPS, ISAKMP, Web Security : SSL, HTTPS, Mail Security : PGP, S/MIME. (Chapter - 3) Unit - IV Legal, Ethical and Professional Issues in Information Security, Risk Management Overview, Risk identification, Risk Assessment, Risk Control Strategies, Quantitative vs. Qualitative Risk Control Practices. Risk Management. Laws and Ethics in Information Security, Codes of Ethics, Protecting programs and data. (Chapter - 4) Unit - V Introduction to Cyber Laws Introduction, definition and origin, Cybercrime and information security, Classification of Cybercrimes, The legal perspectives - Indian perspective, Global perspective, Categories of Cybercrime, Types of Attacks, a Social Engineering, Cyber stalking, Cloud Computing and Cybercrime. (Chapter - 5) Unit - VI Tools and Methods used in Cybercrime Introduction, Proxy servers and Anonymizers, Phishing, Password Cracking, Key-loggers and Spywares, Types of Virus, Worms, Dos and DDoS, SQL injection, Cybercrime and Legal perpectives, Cyber laws - Indian context, The Indian IT Act-Challenges, Amendments, Challenges to Indian Law and cybercrime Scenario in India, Indian IT Act and Digital Signatures. study of any two network security scanners : Nmap, Metasploit, OpenVAS, Aircrack, Snort, Wireshark, Nikito, Samurai, Safe 3 etc. (Chapter - 6)