Lectures: Monday at 2:15 PM, Thursday at 2:15 PM
Tutorial/Discussion: Friday at 2:15 PM (CD Deshmukh, Room No. 307)
Mid-Semester Examination - 30%
End-Semester Examination - 50%
Quizzes - 10%
Assignments - 10%
Introduction to basic security services: Confidentiality, integrity, availability, nonrepudiation, privacy.
Anatomy of an Attack: Network Mapping using ICMP queries, TCP Pings, traceroutes, TCP and UDP port scanning, FTP bounce scanning, stack fingerprinting techniques, Vulnerability scanning, System and Network Penetration, Denial of Service.
Network Layer Protocols attacks and defense mechanisms: Hacking Exploits in ARP, IP4, IPv6, ICMP based DOS, ICMP covert Tunneling, Network Controls against flooding, Network Monitoring, SSL, IPSEC.
Transport Layer Protocols Attacks and Defense mechanisms: Covert TCP, TCP Synflooding DOS, TCP Sequence Number Prediction attacks, TCP session hijacking, UDP Hacking Exploits, Network security controls for defense mechanism, OS hardening, kernel parameter tuning, DDOS and DDOS Mitigation, Stateful firewall, application firewalls, HIDS, NIDS and IPS.
Application Layer Protocol Attacks and Defense mechanisms: DNS spoofing attacks, DNS cache poisoning attacks, organization activity finger print- ing using DNS, SMTP vulnerability and Hacking Exploits, Mails relays, SMTP Security and Controls, HTTP hacking, Buffer Overflow Attacks, SQL Injection, Cross Side Scripting HTTP security and controls.
Malware detection and prevention
Ross Anderson: Security Engineering, 2nd ed., Wiley. Available online: http://www.cl.cam.ac.uk/∼rja14/book.html.
C.P. Pfleeger, S.L. Pfleeger, J. Margulies: Security in Computing, 5th ed., Prentice Hall, 2015.
David Wheeler: Secure Programming HOWTO. Available online: https://dwheeler.com/secure-programs/.
Michal Zalewski: Browser Security Handbook, Michael Zalewski, Google. Available online: https://code.google.com/archive/p/browsersec/wikis/Main.wiki.
B. S. Schneier: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition, John Wiley and Sons, New York, 1995.
A. Menezes, P. C. Van Oorschot and S. A. Vanstone: Handbook of Applied Cryptography, CRC Press, Boca Raton, 1996.
05-January-2026: Confidentiality, integrity, availability
08-January-2026: Nonrepudiation, privacy
Reference: MIT LECTURE NOTES