The course will enable the students to
1. Understand the fundamentals of Networking, Cryptography and Security.
2. Understand how to deploy encryption techniques to secure data across the layers.
3. Understand the security mechanism of networks and transmission.
4. Acquire knowledge on standard algorithms used to provide confidentiality, integrity and authenticity.
Course |
Learning outcome (at course level) |
Learning and teaching strategies |
Assessm ent Strategi es | |
Course Code |
Course Title | |||
25CBDA 611 |
Networki ng and Informati on Security (Theory) | CO331. Analyse the need to create a Network. CO332. Evaluate different layers and protocols present in communicating devices. CO333. Analyse information security concepts and techniques, including cryptography. CO334. Assess security mechanisms at various layers. CO335. Analyse intrusion detection problems and their preventive measures. CO336.Contribute effectively in course-specific interaction | Approach in teach ing: Interactive Lectures, Discussion , Reading assignments,Demon stration.
Learning activities for the students: Self learning assignment s, Effective questions, Seminar presentation. | Class test, Semester end examinati ons, Quiz, Assignme nts, Prese ntation. |
Network Layer: (Logical Addressing). IP v4 – Address Space, Notations, Classful addressing, classless addressing and Sub-netting and IP Distribution, IP v6 – Structure and Address space.
Network Layer (Internet Protocol) . Need for Network layer, IPv4 – Datagram, Fragmentation, Checksum, Options, IPv6 – Advantages, Packet Format, Extension Headers, Transition from IPv4 to IPv6 – Dual Stack, Tunneling and Header Translation. Network Layer. Address Mapping, Error Reporting and Multicasting.
Routing Protocols and process delivery :Network Layer. Direct and Indirect Delivery, Forwarding Process and Techniques, Routing Table, Unicast Routing Protocols – Optimization, Intra and Inter domain Routing, Distance vector routing, Link state routing, Path vector routing. Process to process delivery- Client server paradigm, Multiplexing and Demultiplexing, connectionless versus connection oriented services, reliable versus unreliable, User Datagram Protocol- Ports , User Datagram, Checksum, UDP operation and its use, TCP- services, features and segment, TCP connection, Flow control, Error control and congestion control.
Information Security: Introduction, History of Information security, what is Security, Components of Information System. Network Security. Services, Mechanism and Attacks, The OSI security Architecture, Model of Network Security.
Cryptography. Concepts and Techniques, symmetric and asymmetric key cryptography, steganography, Symmetric key Ciphers. DES structure, DES Analysis, Security of DES, variants of DES
Cryptography: Block cipher modes of operation, AES structure, Analysis of AES, Key distribution Asymmetric Key Ciphers. Principles of public key cryptosystems, RSA algorithm, Analysis of RSA, Diffie-Hellman Key exchange.
Key distribution Asymmetric Key Ciphers. Principles of public key cryptosystems, RSA
algorithm, Analysis of RSA, Diffie-Hellman Key exchange.
Message Authentication and Hash Functions. Authentication requirements and functions, MAC and Hash Funtions, MAC Algorithms. Secure Hash Algorithm, Digital signatures, X.509, Kerberos.
Network & database Security and threats: Security requirements, Reliability and integrity, Sensitive data, Inference, multilevel database, proposals for multilevel security. Security in Network. Threats in Network, Network Security Controls, Intruders, Virus and Firewalls. Intruders, Intrusion detection, password management, Virus and related threats, Countermeasures, Firewall design principles, Types of firewalls, Secure E-Mail.
Administering Security. Security Planning, Risk Analysis, Organizational Security policies, Physical Security
SUGGESTED READINGS:
1. C K Shyamala, N Harini, Dr T R Padmanabhan, “Cryptography and Network Security”, Wiley India, 2st Edition.
2. Bernard Menezes, “Network Security and Cryptography” CENGAGE Learning
3. WM.Arthur Conklin, “Principles of Computer Security”, Greg White, TMH
4. Neal Krawetz “Introduction to Network Security”, CENGAGE Learning
5. Yang Xiao, Frank H Li, Hui Chen, “Handbook of Security of Networks”, World Scientific, 2011.
e RESOURCE
1. NOC: Introduction to Information Security I, IIT Madras: https://nptel.ac.in/courses/106106129
2.Tutorial point, data communications:
3.https.//www.tutorialspoint.com/data_communication_computer_network/index.htm
4. Link for Practice Cryptography--https.//cse29-iiith.vlabs.ac.in/
JOURNALS
1. Journal of Information Technology, Sage: https://journals.sagepub.com/home/jin
2. International Journal of Information Security, Springer: https://www.springer.com/journal/10207