Tuesday, July 10, 2012

IT9404-SECURITY LABORATORY-ANNA UNIVERSITY SYLLABUS IT


IT9404-SECURITY LABORATORY-ANNA UNIVERSITY SYLLABUS IT


IT9404                             SECURITY LABORATORY                                       LT P C
0 0 3  2

1. Write programs to implement the following number theory concept

·               Prime and Relatively Prime Numbers
·               Arithmetic Modulo 8 and Multiplication Modulo 8
·               Fermats Theorem and Eulers Totient Function

2.   Write programs to implement the following cryptography algorithms

·               Playfair cipher and Hill cipher
·               Simplified DES algorithm
·               RSA algorithm

3.   Write programs to implement the following hash algorithms

·               MD5
·               SHA-1

4.   Write programs to implement the following Authentication

·               Digital Signature and Digital Certificate
·               Kerberos System
·               X.509

5.   Write programs to implement the following Trusted OS issues

·               Write a program to implement a set of rules combining the secrecy controls of the Bell-La Padula with integrity controls of the Biba model.
·               Write a program to implement UNIX operating system structure files by using a tree. Each file is at a leaf of the tree, and the unique path from the root of the leaf identifies the file. Each interior node is sub directory, which specifies the
names of the paths leading form that node. A user can block access through a
node by restricting access to the sub directory. Device a method that uses this structure to implement discretionary access policy.

6.   Write a program to implement the following database security issues.

·               Cryptography in databases.
·               Access Control list.
·               Two phase locking technique.

7.   Write a program to implement Hacking windows.

·                      BIOS Passwords.
·                      Windows login password
·                      Internet explorer users
·                      Changing windows visuals
·                      Accessing restricted drives.

TOTAL: 45 PERIODS
CLICK HERE FOR ALL SUBJECTS

7/10/2012 01:15:00 PM

0 comments:

Post a Comment

Related Posts Plugin for WordPress, Blogger...