The course will enable the students to
Course Outcome (at course level) | Learning and teaching strategies | Assessment Strategies |
---|---|---|
The students will: CO193. Describe network security services and mechanisms CO194. Compare various cryptographic algorithms CO195. Interpret message authentication and hash functions CO196. Assess security at various layers. CO197. Analyze intrusion detection problem. | Interactive Lectures, Discussion, Tutorials, reading assignments, Demonstrations, G-suite. Self- learning assignments, Effective questions, Simulation, Seminar presentation | Class test, Semester end examinations, Quiz, Solving problems in tutorials, Assignments, Presentation, Individual and group projects |
Information Security: Introduction, History of Information security, what is Security, Components of Information System. Network Security: Services, Mechanism and Attacks, The OSI security Architecture, Model of Network Security.
Cryptography: Concepts and Techniques, symmetric and asymmetric key cryptography, steganography, Symmetric key Ciphers: DES structure, DES Analysis, Security of DES, variants of DES, Block cipher modes of operation, AES structure, Analysis of AES, Key distribution Asymmetric Key Ciphers: Principles of public key cryptosystems, RSA algorithm, Analysis of RSA, Diffie-Hellman Key exchange.
Message Authentication and Hash Functions: Authentication requirements and functions, MAC and Hash Funtions, MAC Algorithms: Secure Hash Algorithm, Whirlpool, HMAC, Digital signatures, X.509, Kerberos.
Security at layers (Network, Transport, Application):IPSec, Secure Socket Layer(SSL), Transport Layer Security(TLS), Secure Electronic Transaction(SET), Pretty Good Privacy(PGP), S/MIME.
Intruders, Virus and Firewalls: Intruders, Intrusion detection, password management, Virus and related threats, Countermeasures, Firewall design principles, Types of firewalls.