Lecture1 Intro (Part-I)
Lecture1 Intro (Part-I)
Lecture1 Intro (Part-I)
• Research Interests
• Cryptography, Password-based Cryptosystems, Biometric Security, Information
Security, Blockchain Technology…
• Google scholar link: https://scholar.google.co.in/citations?user=nqSP0nIAAAAJ&hl=en
Spring Semester 2024: Timetable
Lecture Time: 9:30 – 10:55 AM (Monday & Wednesday)
Credits: 3
Contact Hours (L:T:P): 3:0:0
• Relative Grading
• Cryptography Basics: Stream Ciphers and Block Ciphers, Public Key Cryptography,
Hash Functions
Online
- work/ school
- Play games
- Buy goods from merchants
- track activities with sensors on our wrists.
- Connect IoTs
Online
- work/ school
- Play games
- Buy goods from merchants
- track activities with sensors on our wrists.
- Connect IoTs
Poses Major
Access of information on a click!!! Security Risks…
Authorized Access
Biometric
Authentication
Alternate
approach to
Fingerprint…
Secure?
Liveness
detection – Face
Recognition?
Blink your
Eyes…
Personal Identifying Information!
Database Breach!
Many Challenges…
Cryptography
Security
Cryptography
Learning Outcomes
• Recognize threats to Confidentiality, Integrity, and Availability of Information
systems and how security evolves around the CIA principle
• Understand and explain the basic computer security terminologies
• To use the security solutions correctly
• Find and apply documentation of security-related problems and tools
• Think of the countermeasures to identified threats and argue their effectiveness
• Compare different security mechanisms
Information Security
The term ‘information security’ means protecting
information and information systems from
unauthorized access, use, disclosure, disruption,
modification, or destruction in order to provide
confidentiality, integrity and availability