Information and Network Security

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

(INFORMATION AND NETWORK SECURITY)

Information and network security


At the end of the course, students will be able to:
CO1: Identify network security threats and determine efforts to counter them
CO2: Design security mechanisms for relevant security services.
CO3: Address issues in internet security and the relevant protocols.
CO4: Determine firewall requirements, and configure a firewall

Information Security
Unit-1 Introduction to General security concepts, basic terminologies, issues, network and
security models. Symmetric and asymmetric cryptography, data encryption standard (DES),
international data encryption algorithm (IDEA), advanced encryption standard (AES), Key
management and Distribution, Random Number Generation, RSA Algorithm, Diffie Hellman
Key Exchange, Elliptic Curve Cryptography.
Unit-2 Message Authentication and Hash Functions: Authentication Requirements,
Authentication Functions, weak and strong authentication, Zero knowledge protocol, Message
Authentication Codes, Hash Functions, Security of Hash Functions and MACs, Hash and MAC
Algorithms, Message Digest Algorithm, Secure Hash Algorithm, Digital Signatures.

Network Security
Unit-3 Security standards and protocols, Kerberos protocol: public key infrastructure (PKI);
security protocols for different network layers, secure IP protocol (IPsec), Secure Socket Layer
(SSL) and transport layer security (TLS), Protocols for E-Commerce.
Unit-4 Web and Email Security Important security issues with the Web (both the server and
the client sides), building and maintaining secure web sites.
Risks and issues associated with the uses of electronic email, privacy, message integrity and
authenticity, technologies for secure email systems, PEM (Privacy Enhanced Email), S/MIME,
PGP secure mail protocol. Wireless network Security,802.11i, important security issues of
802.11 standard, Security in future wireless networks.
Unit-5 Security Systems and Management Issues, Security systems in the real world, firewalls,
security in software systems, main security features of some well-known systems and their
weaknesses. Security policies, management strategies and policies for enterprise information
security, management issues relevant to information security.

References:

1. Cryptography and Network Security by Behrouz A. Forouzan, TATA McGraw hill.


2. Charlie Kaufman, Radia Perlman, Mike Specincer: Network Security – private
communication in a public world, second edition, Prentice Hall.
3. Newman, Robert C: Enterprise Security, Prentice Hall.
4. Cryptography and Network Security, William Stalling, Prentice hall

Course Outcomes:
At the end of the course students should be able to:
CO1: Analyze the data vulnerabilities and hence be able to design a solution to secure the data.
CO2: Identify the security issues in the network and resolve it.
CO3: Evaluate and analyze various security mechanisms
CO4: Compare and Contrast different IEEE standards and network security issues

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy