The course will enable the students to
Understand the fundamentals of Networking, Cryptography and Security.
Understand how to deploy encryption techniques to secure data across the layers.
Understand the security mechanism of networks and transmission.
Acquire knowledge on standard algorithms used to provide confidentiality, integrity and authenticity.
(Logical Addressing). IP v4 – Address Space, Notations, Classful addressing, classless addressing and Sub-netting and IP Distribution, IP v6 – Structure and Address space.
Network Layer (Internet Protocol) . Need for Network layer, IPv4 – Datagram, Fragmentation, Checksum, Options, IPv6 – Advantages, Packet Format, Extension Headers, Transition from IPv4 to IPv6 – Dual Stack, Tunneling and Header Translation.
Network Layer. Address Mapping, Error Reporting and Multicasting.
Network Layer. Direct and Indirect Delivery, Forwarding Process and Techniques, Routing Table, Unicast Routing Protocols – Optimization, Intra and Inter domain Routing, Distance vector routing, Link state routing, Path vector routing. Process to process delivery- Client server paradigm, Multiplexing and Demultiplexing, connectionless versus connection oriented services, reliable versus unreliable, User Datagram Protocol- Ports , User Datagram, Checksum, UDP operation and its use, TCP- services, features and segment, TCP connection, Flow control, Error control and congestion control.
Introduction, History of Information security, what is Security, Components of Information System. Network Security. Services, Mechanism and Attacks, The OSI security Architecture, Model of Network Security.
Cryptography. Concepts and Techniques, symmetric and asymmetric key cryptography, steganography, Symmetric key Ciphers. DES structure, DES Analysis, Security of DES, variants of DES
Block cipher modes of operation, AES structure, Analysis of AES, Key distribution Asymmetric Key Ciphers. Principles of public key cryptosystems, RSA algorithm, Analysis of RSA, Diffie-Hellman Key exchange.
Key distribution Asymmetric Key Ciphers. Principles of public key cryptosystems, RSA algorithm, Analysis of RSA, Diffie-Hellman Key exchange.
Message Authentication and Hash Functions. Authentication requirements and functions, MAC and Hash Funtions, MAC Algorithms. Secure Hash Algorithm, Digital signatures, X.509, Kerberos.
Security requirements, Reliability and integrity, Sensitive data, Inference, multilevel database, proposals for multilevel security.
Security in Network. Threats in Network, Network Security Controls, Intruders, Virus and Firewalls. Intruders, Intrusion detection, password management, Virus and related threats, Countermeasures, Firewall design principles, Types of firewalls, Secure E-Mail.
Administering Security. Security Planning, Risk Analysis, Organizational Security policies, Physical Security
SUGGESTED TEXT BOOKS
Michael E. Whitman, Herbert J. Mattord, “Principles of Information Security”, CENGAGE Learning, 4th Edition.
William Stallings, “Cryptography and Network Security”, Pearson Education, 5th Edition.
Forouzan and Mukhopadhyay, “Cryptography and Network Security”, McGraw Hill, 3rd Edition.
Charles P. Pfleeger, ”Security in Computing”, 4rd Edition, PHI.
Atul Kahate, “Cryptography and Network Security”, McGraw Hill, 2nd Edition
SUGGESTED REFERENCE BOOKS
C K Shyamala, N Harini, Dr T R Padmanabhan, “Cryptography and Network Security”, Wiley India, 2st Edition.
2. Bernard Menezes, “Network Security and Cryptography” CENGAGE Learning
3. WM.Arthur Conklin, “Principles of Computer Security”, Greg White, TMH
4. Neal Krawetz “Introduction to Network Security”, CENGAGE Learning
5. Yang Xiao, Frank H Li, Hui Chen, “Handbook of Security of Networks”, World Scientific, 2011.
e RESOURCE
NOC: Introduction to Information Security I, IIT Madras: https://nptel.ac.in/courses/106106129
Tutorial point, data communications:
https.//www.tutorialspoint.com/data_communication_computer_network/index.htm
Link for Practice Cryptography--https.//cse29-iiith.vlabs.ac.in/
JOURNALS
Journal of Information Technology, Sage: https://journals.sagepub.com/home/jin
International Journal of Information Security, Springer: https://www.springer.com/journal/10207