Information and Network Security
Information and Network Security
Information and Network Security
Information Security
Unit-1 Introduction to General security concepts, basic terminologies, issues, network and
security models. Symmetric and asymmetric cryptography, data encryption standard (DES),
international data encryption algorithm (IDEA), advanced encryption standard (AES), Key
management and Distribution, Random Number Generation, RSA Algorithm, Diffie Hellman
Key Exchange, Elliptic Curve Cryptography.
Unit-2 Message Authentication and Hash Functions: Authentication Requirements,
Authentication Functions, weak and strong authentication, Zero knowledge protocol, Message
Authentication Codes, Hash Functions, Security of Hash Functions and MACs, Hash and MAC
Algorithms, Message Digest Algorithm, Secure Hash Algorithm, Digital Signatures.
Network Security
Unit-3 Security standards and protocols, Kerberos protocol: public key infrastructure (PKI);
security protocols for different network layers, secure IP protocol (IPsec), Secure Socket Layer
(SSL) and transport layer security (TLS), Protocols for E-Commerce.
Unit-4 Web and Email Security Important security issues with the Web (both the server and
the client sides), building and maintaining secure web sites.
Risks and issues associated with the uses of electronic email, privacy, message integrity and
authenticity, technologies for secure email systems, PEM (Privacy Enhanced Email), S/MIME,
PGP secure mail protocol. Wireless network Security,802.11i, important security issues of
802.11 standard, Security in future wireless networks.
Unit-5 Security Systems and Management Issues, Security systems in the real world, firewalls,
security in software systems, main security features of some well-known systems and their
weaknesses. Security policies, management strategies and policies for enterprise information
security, management issues relevant to information security.
References:
Course Outcomes:
At the end of the course students should be able to:
CO1: Analyze the data vulnerabilities and hence be able to design a solution to secure the data.
CO2: Identify the security issues in the network and resolve it.
CO3: Evaluate and analyze various security mechanisms
CO4: Compare and Contrast different IEEE standards and network security issues