Networking and Information Security (Theory)

Paper Code: 
24CBDA611
Credits: 
06
Periods/week: 
06
Max. Marks: 
100.00
Objective: 

The course will enable the students to

  1. Understand the fundamentals of Networking, Cryptography and Security.

  2. Understand how to deploy encryption techniques to secure data across the layers.

  3. Understand the security mechanism of networks and transmission.

  4. Acquire knowledge on standard algorithms used to provide confidentiality, integrity and authenticity.

Course Outcomes: 

 

Course

Course Outcomes

Learning and teaching strategies

Assessment Strategies

Course Code

Course Title

24CBDA 611

Networking and Information Security

 (Theory)

CO331. Analyse the need to create a Network.

CO332. Evaluate different layers and protocols present in communicating devices.

CO333. Analyse information security concepts and techniques, including cryptography.

CO334. Assess security mechanisms at various layers.

CO335. Analyse intrusion detection problems and their preventive measures.

CO336.Contribute effectively in course-specific interaction

Approach in teaching: Interactive Lectures, Discussion, Reading assignments, Demonstration.

 

Learning activities for the students: Self learning assignments, Effective questions, Seminar presentation.

Class test, Semester end examinations, Quiz, Assignments, Presentation.

 

18.00
Unit I: 
Network Layer:

(Logical Addressing). IP v4 – Address Space, Notations, Classful addressing, classless addressing and Sub-netting and IP Distribution, IP v6 – Structure and Address space.

Network Layer (Internet Protocol) . Need for Network layer, IPv4 – Datagram, Fragmentation, Checksum, Options, IPv6 – Advantages, Packet Format, Extension Headers, Transition from IPv4 to IPv6 – Dual Stack, Tunneling and Header Translation.

Network Layer. Address Mapping, Error Reporting and Multicasting.

 
18.00
Unit II: 
Routing Protocols and process delivery :

Network Layer. Direct and Indirect Delivery, Forwarding Process and Techniques, Routing Table, Unicast Routing Protocols – Optimization, Intra and Inter domain Routing, Distance vector routing, Link state routing, Path vector routing. Process to process delivery- Client server paradigm, Multiplexing and Demultiplexing, connectionless versus connection oriented services, reliable versus unreliable, User Datagram Protocol- Ports , User Datagram, Checksum, UDP operation and its use, TCP- services, features and segment, TCP connection, Flow control, Error control and congestion control.

 
18.00
Unit III: 
Information Security:

Introduction, History of Information security, what is Security, Components of Information System. Network Security. Services, Mechanism and Attacks, The OSI security Architecture, Model of Network Security.

Cryptography. Concepts and Techniques, symmetric and asymmetric key cryptography, steganography, Symmetric key Ciphers. DES structure, DES Analysis, Security of DES, variants of DES

 
18.00
Unit IV: 
Cryptography:

Block cipher modes of operation, AES structure, Analysis of AES, Key distribution Asymmetric Key Ciphers. Principles of public key cryptosystems, RSA algorithm, Analysis of RSA, Diffie-Hellman Key exchange.

Key distribution Asymmetric Key Ciphers. Principles of public key cryptosystems, RSA algorithm, Analysis of RSA, Diffie-Hellman Key exchange.

Message Authentication and Hash Functions. Authentication requirements and functions, MAC and Hash Funtions, MAC Algorithms. Secure Hash Algorithm, Digital signatures, X.509, Kerberos.

 
18.00
Unit V: 
Network & database Security and threats:

Security requirements, Reliability and integrity, Sensitive data, Inference, multilevel database, proposals for multilevel security. 

Security in Network. Threats in Network, Network Security Controls, Intruders, Virus and Firewalls. Intruders, Intrusion detection, password management, Virus and related threats, Countermeasures, Firewall design principles, Types of firewalls, Secure E-Mail.

Administering Security. Security Planning, Risk Analysis, Organizational Security policies, Physical Security

 
ESSENTIAL READINGS: 

SUGGESTED TEXT BOOKS

  1. Michael E. Whitman, Herbert J. Mattord, “Principles of Information Security”, CENGAGE Learning, 4th Edition.

  2. William Stallings, “Cryptography and Network Security”, Pearson Education, 5th Edition.

  3. Forouzan and Mukhopadhyay, “Cryptography and Network Security”, McGraw Hill, 3rd Edition.

  4. Charles P. Pfleeger, ”Security in Computing”, 4rd Edition, PHI.

Atul Kahate, “Cryptography and Network Security”, McGraw Hill, 2nd Edition

REFERENCES: 

SUGGESTED REFERENCE BOOKS

  1. C K Shyamala, N Harini, Dr T R Padmanabhan, “Cryptography and Network Security”, Wiley India, 2st Edition.
    2. Bernard Menezes, “Network Security and Cryptography” CENGAGE Learning
    3. WM.Arthur Conklin, “Principles of Computer Security”, Greg White, TMH
    4. Neal Krawetz “Introduction to Network Security”, CENGAGE Learning
    5. Yang Xiao, Frank H Li, Hui Chen, “Handbook of Security of Networks”, World Scientific, 2011.

 

 

e RESOURCE

  1. NOC: Introduction to Information Security I, IIT Madras: https://nptel.ac.in/courses/106106129 

  2. Tutorial point, data communications:

  3. https.//www.tutorialspoint.com/data_communication_computer_network/index.htm

  4. Link for Practice Cryptography--https.//cse29-iiith.vlabs.ac.in/ 

 

JOURNALS

  1. Journal of Information Technology, Sage: https://journals.sagepub.com/home/jin

  2. International Journal of Information Security, Springer: https://www.springer.com/journal/10207

Academic Year: