This course is designed to help students to understand network security & various encryption techniques.
Learning Outcome | Learning and Teaching Strategies | Assessment Strategies |
---|---|---|
The students will: - CO81. Describe network security services and mechanisms CO82.Compare various cryptographic algorithms CO83. Interpret message authentication and hash functions CO84. Assess security at various layers. CO85. Analyze intrusion detection problem. | Approach in teaching: Interactive Lectures, Discussion, Tutorials, Reading assignments, Demonstration,
Learning activities for the students: Self-learning assignment, Effective questions, Simulation, Seminar presentation, Giving tasks. | Class test, Semester end examinations, Quiz, Solving problems in tutorials, Assignments, Presentation |
Information Security
Introduction, History of Information security, Components of Information System. Network Security: Services, Mechanism and Attacks, The OSI security Architecture, Model of Network Security.
Cryptography:
Concepts and Techniques, symmetric and asymmetric key cryptography, steganography, Symmetric key Ciphers: DES structure, DES Analysis, Security of DES, variants of DES, Block cipher modes of operation, AES structure, Analysis of AES, Key distribution Asymmetric key Ciphers: Principles of public key cryptosystems, RSA algorithm, Analysis of RSA, Diffie-Hellman Key exchange.
Message Authentication and Hash Functions
Authentication requirements and functions, MAC and Hash Functions, MAC Algorithms: Secure Hash Algorithm, Whirlpool, HMAC, Digital signatures, X.509, Kerberos. Digital Signatures-introductions and Algorithms for Digital signatures(DSA) and Digital Signature Standard(DSS).
Security at layers (Network, Transport, Application)
IPSecurity-IPv4 & IPv6,IPsec Architecture and operations, web- Secure Socket Layer(SSL), Transport Layer Security(TLS), Secure Electronic Transaction(SET), Pretty Good Privacy(PGP), S/MIME.
Firewall And Intrusion
Computer Intrusions: Introduction, Intrusion Detection System and its types, Password Management, Limitations and Challenges. Malicious Software-Viruses, Worms, Trojan, spyware, Bots.
Firewall Introduction, Characteristics and types, Benefits and limitations. Firewall architecture, Trusted Systems, Access Control.
Suggested Reference Books
E-Resources including links