.
DEPARTMENT OF ARTIFICAL INTELLIGENCE AND DATA SCIENCE
ACADEMIC YEAR 2025-2026 (ODD SEMSTER)
ASSIGNMENT I-EVALUATION FORM
(MODE: WRITTEN | SEMINAR)
Branch | Year | Semester : AI&DS |III|V
Course Code | Name : CW3551 DATA AND INFORMATION SECURITY
Maximum Marks : 20
Rubrics 1. Presentation & Neatness 10 marks
2. References 5 marks
3. Timely Submission 5marks
General Instructions Group Size: 5 students per group (Total: 11 groups).
Topic: Topics are strictly based on Unit I and Unit II of the
syllabus.
Length: Minimum: 8 full A4-sized pages Maximum: 10
[Link] below 8 pages will face mark deductions.
[Link] Register No. Student Name Question 1 2 3 Total
1. Analyze the Critical Characteristics of
2. Information and How They Impact
3. Modern Cybersecurity
4.
5.
6. Examine the NSTISSC Security Model
7. and Its Application in Current Information
8. Systems
9.
10.
11. Discuss the Security SDLC Phases and
12. Their Role in Designing Secure Systems
13.
14.
15.
16. Evaluate the Balance Between Security
17. and Access in Enterprise Information
18. Systems
19.
20.
21. Explain the Need for Information Security
22. in Today’s Digital Business Environment
23.
24.
25.
26. Classify and Analyze Different Types of
27. Threats and Attacks in Information
28. Systems
DEPARTMENT OF ARTIFICAL INTELLIGENCE AND DATA SCIENCE
Academic Year: 2025-2026 Odd Semester
29.
30.
31. Explore the Legal, Ethical, and
32. Professional Issues in Information
33. Security
34.
35.
36. Explain the Role of Security Policies:
37. Confidentiality, Integrity, and Hybrid
38. Policies with Examples
39.
40.
41. Design and Justify a Basic Access Control
42. Policy Using Access Control Matrix
43. Model
44.
45.
46. Explain the Components of an
47. Information System and How to Secure
48. Each Component
49.
50.
51. Develop a Comparative Study on Security
52. Policy Types and Their Implementation in
53. Real-World Scenarios
54.
55.
Course Instructor Principal
Dr. R. Deepalakshmi Dr. S. Durairaj
HoD-AIDS
DEPARTMENT OF ARTIFICAL INTELLIGENCE AND DATA SCIENCE
Academic Year: 2025-2026 Odd Semester
.
DEPARTMENT OF ARTIFICAL INTELLIGENCE AND DATA SCIENCE
ACADEMIC YEAR 2025-2026 (ODD SEMSTER)
ASSIGNMENT II-EVALUATION FORM
(MODE: WRITTEN | SEMINAR)
Branch | Year | Semester : AI&DS |III|V
Course Code | Name : CW3551 DATA AND INFORMATION SECURITY
Maximum Marks : 20
Rubrics 1. Presentation & Neatness 10 marks
2. References 5 marks
3. Timely Submission 5marks
General Instructions Group Size: 5 students per group (Total: 11 groups).
Topic: Topics are strictly based on Unit I and Unit II of the
syllabus.
Length: Minimum: 8 full A4-sized pages Maximum: 10
[Link] below 8 pages will face mark deductions.
[Link] Reg No. Student Name Question 1 2 3 Total
1. Digital Signatures: Definition and Importance
2. Types of Digital Signature Schemes
3. DSS vs RSA: A Comparative Study
4. Role of Hash Functions in Digital Signatures
5. Vulnerabilities in Digital Signature Systems
6. Digital Signature Process: Signing and Verification
7. Fundamentals of Authentication in Security
8. Authentication Protocols in Network Security
9. Nonce and Timestamp in Authentication
10. Mutual Authentication and Its Use Cases
11. Kerberos Authentication System
12. Advantages and Disadvantages of Kerberos
13. Comparison of Ticket-Based Authentication
Systems
14. X.509 Directory Services: Features and
Architecture
15. Certificate Revocation and Trust in X.509
16. Challenges in Managing Digital Certificates
17. Integrity and Non-repudiation via Digital
Signatures
18. One-Way vs Two-Way Authentication
19. Architecture of Email Systems
20. Working of PGP (Pretty Good Privacy)
21. PGP: Confidentiality and Authentication
Mechanisms
22. Key Management in PGP
23. Limitations of PGP in Enterprises
24. Overview of S/MIME and Comparison with PGP
DEPARTMENT OF ARTIFICAL INTELLIGENCE AND DATA SCIENCE
Academic Year: 2025-2026 Odd Semester
25. Trust Models in S/MIME
26. Operational Workflow of S/MIME vs PGP
27. Introduction to IP Security (IPSec)
28. IPSec Architecture Overview
29. AH vs ESP in IPSec
30. Transport vs Tunnel Mode in IPSec
31. Security Association (SA) in IPSec
32. Key Management Techniques in IPSec
33. Deployment Challenges of IPSec
34. Application-Layer vs Network-Layer Security
35. End-to-End Protection Using IPSec
36. IPSec and VPN Implementation
37. Requirements for Web Security
38. Secure Socket Layer (SSL): Objectives and
Functionality
39. SSL Handshake Protocol
40. SSL vs TLS: Security Comparison
41. SSL Communication Layers
42. Client-Server Communication Security Using SSL
43. Role of Digital Certificates in SSL
44. TLS and Its Improvements Over SSL
45. Preventing MITM Attacks with TLS
46. Secure Electronic Transaction (SET): Introduction
47. SET Protocol Entities
48. SET Transaction Flow
49. SET vs SSL for E-Commerce Security
50. Limitations of SET in Modern Systems
51. Digital Signature Verification in SET
52. SET in Mobile Payment Systems
53. Session Hijacking and SSL/TLS Defense
54. Web Security Vulnerabilities Despite SSL/TLS
55. Multi-Layered Web Security Strategies
Course Instructor Principal
Dr. R. Deepalakshmi Dr. S. Durairaj
HoD-AIDS
DEPARTMENT OF ARTIFICAL INTELLIGENCE AND DATA SCIENCE
Academic Year: 2025-2026 Odd Semester