CO1: Classify security vulnerabilities involved in data communication over Internet and

After completion of the course the students will be able to:

Outcome

CO2: Make use of modern block ciphers to secure data transmission and storage

make use of classical algorithms to address the vulnerabilities.

CO3; Analyze challenges involved in key distribution and select approache that can be

CO4: Analyze strengths of public key algorithms and explore applications in exchange,

adopted

CO5: Appreciate application of algorithms for ensuring access control, authentication,

authentication and hashing of messages.

CO6: Appraise risks related to wireless, web, cloud security and measures to be adopted to

secured transmission of data at different layers. Secure organizational network.

Software Verification Validation and Testing