D Y Patil International University, Akurdi, Pune
Search results: 1867
- Teacher: Dr. Vijay Shah
- Teacher: Dr. Sanjay Kumar
- Teacher: Dr. Sanjay Kumar

Industry 4.0 is the subset of the fourth industrial revolution that concerns industry. The fourth industrial revolution encompasses areas which are not normally classified as an industry, such as smart cities, for instance.
Although the terms "Industry 4.0" and "fourth industrial revolution" are often used interchangeably, "Industry 4.0" factories have machines which are augmented with wireless connectivity and sensors, connected to a system that can visualize the entire production line and make decisions on its own.
In essence, Industry 4.0 is the trend towards
automation and data exchange in manufacturing technologies and processes which include cyber-physical systems
(CPS), the internet of things (IoT), industrial internet of things (IIOT), cloud computing, cognitive computing and
artificial intelligence.
- Teacher: Mr. Ashwin Agarwal
- Teacher: Mrs. Heena Bhatia
- Teacher: Rashmi Dharwadkar
- Teacher: Dr Richa Purohit
Name of the Course: Information Security
- Course Instructor:
- Name: Dr. Sunanda Mulik
Office Number: 452
Phone: 9112702866
Email: sunanda.mulik@dypiu.ac.in
Office hours:
Location: 4th Floor, Office no 452
- Teaching Assistant:
Name: --
Contact:
Office Hours: Time slots
Location
- Level (who can take this course?):
- Credit: 4-0-0-6
- Evaluation: Theory + Practical
- Breakup of evaluation: % wise
ESE (Theory)- 50 %
Practical-20
Mid Term-15%
Assignments-15%
- Maximum Number of Students: 21
Course Objectives:
Students will be able to understand-
1. To provide the ability to examine and analyze real-life security cases.
2. To provide a thorough introduction to the different concepts of information security practices.
3. To impart knowledge of different mechanisms for encryption, digital signature, MAC, and hash functions.
4. To make students understand how to apply these principles for securing data over the internet.
Course
Prerequisites:
Nil
Course Syllabus:
Sr. No |
Content |
Date |
1 |
To make students understand how to apply these principles for securing data over the internet. |
|
2 |
Aspects of security: Attacks, services and mechanisms, Taxonomy |
|
3 |
Generic types of attack Network Security Model |
|
4 |
Stream ciphers, Block ciphers. Design considerations for stream ciphers, Cryptanalysis of stream ciphers |
|
5 |
Conventional Cryptographic Techniques |
|
6 |
Combined encryption and encoding. |
|
7 |
Block Ciphers – DES and variant, modes of use of DES |
|
8 |
Public key cryptography, characteristics |
|
9 |
Applications, and schemes |
|
10 |
RSA: Use, working, Key generation, and distribution |
|
11 |
Key distribution in asymmetric encryption, Diffie Hellman Key Exchange |
|
12 |
set up , examples |
|
13 |
Introduction to Message Authentication & e-mail |
|
14 |
MAC and its Usage |
|
15 |
Hash function- MD-5, SHA-512, working of SHA I, |
|
16 |
compression function, HMAC structure |
|
17 |
Digital Signatures: Properties requirements, standards, verification process |
|
18 |
Public Key distribution: Digital Certificates, Certificate Authority, X.509 Authentication service, |
|
19 |
certificate format, certificate renewal, revocation, delta revocation |
|
20 |
Email privacy, cryptographic algorithms and secrets, certificates |
|
21 |
SMTP |
|
22 |
PGP (Pretty Good Privacy), operations, authentication and confidentiality , and services, |
|
23 |
compression and segmentation service |
|
24 |
MIME : headers , contents, techniques |
|
25 |
Introduction to IPSec, Benefits, Types of modes, |
|
26 |
AH protocol , ESP protocol, security Association and database. |
|
27 |
Web security requirements |
|
28 |
Network security approaches |
|
29 |
Data Compression Technique |
|
30 |
IP Security: Architecture, Authentication Leader, Encapsulating security Payload – Key Management |
|
31 |
Web Security: SSL, TLS, SET |
|
32 |
SSL-Change-cipher_spec Protocol, Alert Protocol, Handshake Protocol |
|
33 |
Phases and handshake procedure of TLS |
|
34 |
SET – working, business requirement, duel signature |
|
35 |
Firewalls Design principle, techniques, established systems, types, Packet filter router, |
|
36 |
attacks and countermeasures, application level firewall, circuit level gateway, |
|
Laboratory
Sr. No |
Content |
Date |
1 |
Write a script to perform email analysis.
|
|
2 |
Generate hash value of a file using script.
|
|
3 |
Programmatically illustrate the symmetric substitution encryption technique.
|
|
4 |
Write a script to generate RSA key pair. |
|
5 |
Network Analysis |
|
- Course Outcome:
On completion of the course the student should be able to:
Define the terms used in information security such as attacks, virus, firewall, encryption, digital signature etc.
Explain different types of encryption techniques.
Apply their knowledge of securing e-mails, sending secured data over network.
List the alternative solutions for data and information security from different active and passive attacks.
- Text Book:
W. Stallings, Network Security Essentials (Applications and Standards), 7th ed., Pearson Education.
- Reference Book:
W. Stallings, Cryptography and network Security, 5rd ed., Pearson Education.
R. Bragg, M. Rhodes, Network Security: The complete reference, 3rd ed., TMH
Buchmann,
Introduction to Cryptography, Springer
- Study Materials:
Uploaded from time to time
- Teacher: Anupurba Das
- Teacher: Dr Sunanda R Mulik
- Teacher: Dr. Rahul Sharma
- Teacher: Ms Hetal Thaker
- Teacher: Prachi Chhajed
- Teacher: Dr Sarika Jadhav
- Teacher: Dr Richa Purohit
- Teacher: Ms. Prachi Soniminde

- Teacher: Kshiitiz Anand
- Teacher: Anil Narasipuram

Aim(s) - The aim of learning information architecture as a module for design students is to equip them with the knowledge and skills necessary to create effective and user-centered information structures in various design contexts.
Objective(s) -
To understand the role of information architecture in design and its importance in organizing and structuring information for effective communication and user experience.
To develop user-centered design skills by conducting user research, understanding user needs, and incorporating usability principles into information architecture design.
To learn various techniques for organizing and classifying information, including hierarchical structures, faceted classification, metadata, and other methods that facilitate efficient information retrieval and navigation.
To apply fundamental design principles such as layout, typography, color, and composition to create visually appealing and readable information architectures.
To develop skills in content strategy and information design, including creating content hierarchies, meaningful taxonomies, and structuring content for different contexts and devices.
Detailed Syllabus
Session No. | Topic & Sub-Topic | Duration (hrs.) |
Information, data, complexity, uncertainty | 5 | |
Information systems, mapping information systems | 5 | |
Information processing, information ecology, principles of cognitive psychology, memory, cognitive load | 5 | |
Information Architecture, taxonomies and hierarchies of information | 10 | |
Grouping and classifying content, naming and labeling content, structures, information priority | 10 | |
5 different IA models - Hierarchical trees, Nested lists, Hub-and-Spoke, Bento Box, Filtered view, choosing and combining models | 10 | |
Navigation Design, primary, secondary, global and local navigation. | 5 | |
Building a sitemap for a website/app | 5 | |
Testing and validating IA | 5 | |
Total hrs. | 60 hrs. |
(Please add the number of rows as required to the Table above)
`Prerequisite/s-
Understanding of Design Principles: Familiarize yourself with fundamental design principles such as layout, typography, color theory, and composition. This knowledge will provide a solid basis for creating effective information structures.
Knowledge of User Experience (UX) Design: Gain an understanding of UX design principles, including user research, wireframing, prototyping, and usability testing. UX design is closely related to information architecture and helps ensure that the information structures you create are user-centered and intuitive.
Information Organization and Classification: Learn about different methods of organizing and classifying information, such as hierarchical structures, faceted classification, and metadata. Understanding these concepts will help you design effective information architectures that enable users to find and navigate information easily.
Content Strategy and Information Design: Explore the principles of content strategy and information design. This involves understanding how to structure and present information in a clear, coherent, and meaningful way.
User Research Techniques: Familiarize yourself with user research methods, such as interviews, surveys, and usability testing. User research helps you gain insights into user needs, behaviors, and preferences, which are crucial for designing information architectures that meet user requirements.
Data Visualization: Develop skills in data visualization to effectively present complex information in a visual and understandable format. This can involve learning about chart types, data storytelling, and information graphics.
Collaboration and Communication Skills: Information architecture often involves working with cross-functional teams and stakeholders. Enhance your collaboration and communication skills to effectively convey your ideas, understand user requirements, and work in a team environment.
Mode of submission : Soft Copies
- Teacher: Mr Krishna Kumar

- Teacher: Ms Sri Gayathri Vedula
- Teacher: Mr Krishna Kumar
- Teacher: Ms.Nikita Pagar
- Teacher: Dr Swapnil Waghmare
- Teacher: Dr. Maheshwari Biradar
- Teacher: Mr. Yash Sanjay More
- Teacher: Dr. Rahul Sharma
- Teacher: Dr Swapnil Waghmare
- Teacher: Ms. Neha Dubey
- Teacher: Dr Ananya Mehta
- Teacher: Ms. Pragati Pallavi