👈
Course Outcomes(CO's):
CO1: Summarize encryption algorithms to achieve data confidentiality. (Understand-L2)
CO2: Apply Secure hash functions for attaining data integrity. (Apply-L3)
CO3: Illustrate the email security mechanisms to achieve authentication. (Understand- L2)
CO4: Demonstrate the techniques of web security. (Understand-L2)
CO5: Examine the threats and remedial measures for system security. (Apply-L3)
Syllabus:
UNIT I
Introduction: Security Attacks (Interruption, Interception, Modification and Fabrication), Security Services (Confidentiality, Authentication, Integrity, Non-repudiation, Access Control and Availability) and Mechanisms. A Model for Internetwork security, Conventional Encryption Principles, Conventional Encryption Algorithms (DES, Triple DES and AES), Cipher Block Modes of Operations (CBC, CFB only), Stream Ciphers and RC4, Location of Encryption Devices, Key Distribution.
UNIT II
Public -Key Cryptography: Approaches of Message Authentication, MD5, Secure Hash Functions (SHA-512) and HMAC Algorithm, Public Key Cryptography principles, Public Key Cryptography Algorithms, Digital Signatures, Public Key Infrastructure, Digital Certificates, Certificate Authority, Key Management, X.509 certificate.
UNIT III
Email Privacy: Pretty Good Privacy (PGP), PGP and S/MIME, IP Security Overview, IP Security Architecture, Authentication Header, Encapsulating Security Payload, Combining Security Associations, Internet Key Exchange, cryptographic Suites.
UNIT IV
Web Security: Web Security Requirements, Secure Socket Layer (SSL) and Transport Layer Security (TLS), Secure Electronic Transaction (SET) and HTTPs.
UNIT V
Intruders: Intruder Behavior Patterns, Intrusion Techniques, Statistical Anomaly Detection, Rule-Based Intrusion Detection, Honeypot, Malicious Software: Backdoor, Logic Bomb, Trojan Horses, Mobile Code, Viruses: The Nature of Viruses, Viruses Classification, Antivirus Approaches, Distributed Denial of Service Attacks, DDoS Countermeasures Firewall Design principles, Trust Management System, Introduction to digital forensics.
Text Books:
1.William Stallings, “Network Security Essentials (Applications and Standards)”, Pearson Education, 1999.
2.William Stallings, “Cryptography and Network Security”, PHI/Pearson, fourth edition, 2000.
References:
1. Whitman, “Principles of Information Security”, Thomson,PHI, 2000
2. Robert Bragg, Mark Rhodes, Network Security: The complete reference, TMH
3. Buchmann, Introduction to Cryptography,Springer, 2010.
4. Jeetendra pande, Ajay, “Digital Foresnsics’, ISBN: 978-93-84813-94-9
5. https://www.mat.unical.it/ianni/storage/Intro-2013.ppt
6. http://www.inf.ufsc.br/~bosco.sobral/ensino/ine5680/material-cripto-seg/2014
7. http://www.williamstallings.com/netsec/netsec4e.html
👉 Unit-1
👉 Unit-2