LINGAYAS INTITUE OF MANAGEMENT AND TECHNOLOGY

spongehousesSecurity

Nov 3, 2013 (3 years and 9 months ago)

83 views

LINGAYAS INTITUE OF MANAGEMENT AND TECHNOLOGY

MADALAVARIGUDAM, KRISHNA Dt.

Department of Computer Science & Engineering

Course Handout

INFORMATION SECURITY



1.

Course description:

In this cours
e, an introduction to Net
work security

is given.

Cryptography


is

introduced in
the first unit.
Introduction to
security attacks

and
security services

and
Tcp session
,

ARP Attacks are

given in the
second unit. And in the third unit

Conventional Encryption Principles
and
Convent
ional encryption algorithms
are
discussed. fourth and fifth units.
Public key cryptography principles and Pretty Good Privacy
are
discussed

Web
Security Requirements and Basic concepts of SNMP are discussed
in the sixth and seventh units. In the eight uni
t

Firewall Design principles,
Theory
are discussed.


2
.

Scope and Objective of the course:

This course provides the concepts related

network security

and F
irewalls

. Here,
Cryptography

give
s a clear idea to
the student
how to
Represents the s
ecurtiy
. The st
udy of
security

is fundamental to computer science and engineering.
A mastery of these areas is essential for us to develop
Organization

utilize computer resources in an effective manner.
A knowledge of design will certainly help
the student to create go
o
d Network
. The
Cryptography

is

required to
determine the quality of

Representation

network
. As computers become faster and faster, the need for programs that
can handle large amounts of input becomes more acute. The objective of this course is t
o teach s
tudents good
nework

skills simultaneously so th
at

they can develop such security

with the maximum amount of efficiency.


3. Text books:

1.

Network Security Essentials (Applications and Standards) by William

Stallings Pearson Education.

2

. Hack Proofi
ng your network by Ryan Russell, Dan Kaminsky, Rain Forest


Puppy, Joe Grand, David Ahmad, Hal Flynn Ido Dubrawsky, Steve


W.Manzuik and Ryan Permeh, wiley Dreamtech

4.
REFERENCES :


1. Fundamentals of Network Security by Eric Maiw
ald (Dreamtech press)


2. Network Security
-

Private Communication in a Public World by Charlie



Kaufman, Radia Perlman and Mike Speciner, Pearson/PHI.


3. Cryptography and network Security, Third edition, Stallings, PHI/Pearson



4. Principles of Information Security, Whitman, Thomson.


5. Network Security: The complete reference, Robert Bragg, Mark Rhodes,TMH


6. Introduction to Cryptography, Buchmann, Springer.


5
.
Course Plan:

Lec.
No.

Learning Objectives

Top
ics to be covered

References

1
-
7

Security Attacks

Interruption, Interception, Modification and Fabrication),
Security Services

(Confidentiality, Authentication, Integrity, Non
-
repudiation, access Control and Availability) and

Mechanisms, A model for Inter
network security, Internet
Standards and RFCs, Buffer overflow & format

string vulnerabilities, TCP session hijacking, ARP
attacks, route table modification, UDP hijacking, and

man
-
in
-
the
-
middle attacks.

ch1 of T1,

8
-
14

Conventional Encryption
Principles

Conventional Encryption Principles, Conventional
encryption algorithms, cipher block modes of

operation, location of encryption devices, key distribution
Approaches of Message Authentication,

Secure Hash Functions and HMAC.


ch2 of T1

15
-
21

Public key cr
yptography
principles

Public key cryptography principles, public key
cryptography algorithms, digital signatures, digital

ch
3 of T1


Certificates, Certificate Authority and key management
Kerberos, X.509 Directory Authentication

Service.
properties of regular sets


22
-
28

Email privacy:

Email privacy: Pretty Good Privacy (PGP) and S/MIME.

Ch4 of T1

29
-
34

IP Security Overview

IP Security Overview, IP Security Architecture,
Authentication Header, Encapsulating Security Payload,

Combining Security Association
s and Key Management.

Ch6

of T1

35
-
41

Web Security Requirements

Web Security Requirements, Secure Socket Layer (SSL)
and Transport Layer Security (TLS), Secure

Electronic Transaction (SET).
.

Ch
5

of T1

42
-
48


SNMP

Basic concepts of SNMP, SNMPv1 Community

facility
and SNMPv3.

Intruders, Viruses and related threats.
.

Ch7

of T1

49
-
55


Firewall

Firewall Design principles, Trusted Systems. Intrusion
Detection Systems.
.

Ch9

of T1


6.


Assignments:
Comprises of Reading and/or Home assignments. Details will be
announced in the class from time
to time and also will be uploaded in college website.


7.

Evaluation scheme
:

Consists of a series of Closed book and Open book tests after completion of every Unit in
addition to Descriptive and Online quiz exams as prescr
ibed by the JNTUK.


8.

Notices:

Concerning the course will be displayed on Department Notice Board.





INSTRUCTOR
-
IN
-
CHARGE