Networking and Information Security

Paper Code: 
25CBDA611
Credits: 
06
Periods/week: 
06
Max. Marks: 
100.00
Objective: 

The course will enable the students to

1.   Understand the  fundamentals of Networking, Cryptography and  Security.

2.   Understand how  to deploy  encryption techniques to secure data across the  layers.

3.   Understand the  security mechanism of networks and  transmission.

4.   Acquire  knowledge on standard algorithms used to provide confidentiality, integrity and  authenticity.

 

Course Outcomes: 

 

Course

 

Learning outcome

(at course level)

 

Learning and teaching strategies

 

Assessm ent Strategi es

 

Course

Code

 

Course

Title

 

 

 

 

 

 

 

 

 

25CBDA

611

 

 

 

 

 

 

Networki ng and Informati on Security (Theory)

CO331. Analyse  the   need to create a Network.

CO332.    Evaluate     different layers   and   protocols   present in communicating devices. CO333.  Analyse   information security        concepts        and techniques,                   including cryptography.

CO334. Assess              security mechanisms at various layers. CO335.    Analyse      intrusion detection  problems  and   their preventive measures. CO336.Contribute   effectively in course-specific interaction

Approach in teach ing: Interactive Lectures, Discussion

, Reading

assignments,Demon stration.

 

Learning activities for

the students: Self learning assignment s,

Effective  questions, Seminar presentation.

Class test, Semester end examinati ons,  Quiz, Assignme nts,  Prese ntation.

 

18.00
Unit I: 

Network  Layer:  (Logical   Addressing).  IP   v4   –   Address   Space,  Notations,  Classful addressing, classless addressing and  Sub-netting and  IP Distribution, IP v6 – Structure and Address space.

Network    Layer    (Internet   Protocol)   .   Need    for   Network    layer,    IPv4    –   Datagram, Fragmentation,    Checksum,   Options,   IPv6    –   Advantages,   Packet   Format,   Extension Headers, Transition from  IPv4 to IPv6 – Dual Stack,  Tunneling and  Header Translation. Network  Layer.  Address Mapping, Error Reporting and  Multicasting.

 

18.00
Unit II: 

Routing Protocols and process delivery :Network Layer.  Direct  and  Indirect  Delivery, Forwarding   Process   and    Techniques,   Routing    Table,    Unicast    Routing    Protocols   – Optimization,  Intra and  Inter domain  Routing,  Distance  vector routing,  Link state routing, Path  vector routing. Process to  process delivery-  Client  server paradigm, Multiplexing  and Demultiplexing,   connectionless   versus   connection   oriented   services,   reliable    versus unreliable, User  Datagram Protocol-  Ports  , User  Datagram, Checksum, UDP operation and its  use, TCP- services,  features and  segment, TCP connection,  Flow control,  Error  control and  congestion control.

 

18.00
Unit III: 

Information Security: Introduction, History  of  Information  security, what   is  Security, Components  of  Information  System. Network  Security. Services,  Mechanism  and  Attacks, The  OSI security Architecture, Model of Network  Security.

Cryptography.  Concepts  and   Techniques,  symmetric and   asymmetric  key  cryptography, steganography, Symmetric  key  Ciphers.  DES  structure, DES  Analysis,   Security  of  DES, variants of DES

 

18.00
Unit IV: 

Cryptography: Block  cipher   modes of  operation,  AES structure,  Analysis  of  AES,  Key distribution Asymmetric Key Ciphers. Principles  of public key cryptosystems, RSA algorithm, Analysis of RSA, Diffie-Hellman  Key exchange.

Key  distribution   Asymmetric  Key  Ciphers.   Principles   of  public   key   cryptosystems,  RSA

algorithm, Analysis of RSA, Diffie-Hellman  Key exchange.

Message Authentication and  Hash  Functions. Authentication  requirements and  functions, MAC and   Hash   Funtions,  MAC Algorithms.  Secure  Hash   Algorithm,   Digital  signatures, X.509, Kerberos.

 

18.00
Unit V: 

 Network &  database  Security and threats:  Security  requirements,  Reliability  and integrity, Sensitive data, Inference, multilevel  database, proposals for multilevel  security. Security in Network. Threats in Network, Network  Security Controls,  Intruders, Virus and Firewalls.  Intruders, Intrusion detection, password management, Virus and  related threats, Countermeasures, Firewall design principles, Types  of firewalls,  Secure E-Mail.

Administering  Security.  Security Planning,  Risk  Analysis,  Organizational  Security policies, Physical  Security

ESSENTIAL READINGS: 
1.   Michael E. Whitman, Herbert J. Mattord, “Principles  of Information Security”,                   CENGAGE Learning, 4th  Edition.
 
2.   William Stallings, “Cryptography and  Network  Security”, Pearson Education, 5th            Edition.
 
3.   Forouzan and  Mukhopadhyay, “Cryptography and  Network  Security”, McGraw Hill,        3rdEdition.
 
4.   Charles  P. Pfleeger, ”Security  in Computing”, 4rd Edition,  PHI.
 
5.   Atul Kahate, “Cryptography and  Network  Security”, McGraw Hill, 2nd  Edition
 
REFERENCES: 

SUGGESTED READINGS:

1. C K Shyamala, N Harini,  Dr T R Padmanabhan,  “Cryptography and  Network Security”, Wiley India, 2st  Edition.

2. Bernard Menezes, “Network  Security and  Cryptography” CENGAGE Learning

3. WM.Arthur Conklin, “Principles  of Computer Security”, Greg  White,  TMH

4. Neal Krawetz  “Introduction to Network  Security”, CENGAGE Learning

5. Yang Xiao, Frank  H Li, Hui Chen,  “Handbook of Security of Networks”, World Scientific, 2011.

e RESOURCE

1. NOC: Introduction to Information Security I, IIT Madras: https://nptel.ac.in/courses/106106129

2.Tutorial  point,  data communications:

3.https.//www.tutorialspoint.com/data_communication_computer_network/index.htm

4.   Link for Practice Cryptography--https.//cse29-iiith.vlabs.ac.in/

JOURNALS

1.   Journal of Information Technology, Sage: https://journals.sagepub.com/home/jin

2.   International Journal of Information Security, Springer: https://www.springer.com/journal/10207

 

Academic Year: