NETWORKING & INFORMATION SECURITY

Paper Code: 
CBDA 611
Credits: 
6
Periods/week: 
6
Max. Marks: 
100.00
Objective: 

The course will enable the students to

  1. Understand the fundamentals of Networking, Cryptography and Security.
  2. Understand how to deploy encryption techniques to secure data across the layers.
  3. Understand the security mechanism of networks and transmission.
  4. Acquire knowledge on standard algorithms used to provide confidentiality, integrity and authenticity.

 

Course Outcomes (COs).

Course Outcome (at course level)

 

Learning and teaching strategies

Assessment Strategies

 
 

On completion of this course, the students will:

CO275. Analyse the need to create a Network.

CO276. Evaluate different layers and protocols present in communicating devices.

CO277. Explain basic security services and network security model using cryptography.

CO278. Identify security mechanisms at various layers.

CO279. Analyse intrusion detection problems and their preventive measures.

Interactive Lectures, Discussion, Tutorials, reading assignments, Demonstrations, Team teaching, Teaching using advanced IT audio-video tools, G-suite. Self-learning assignments, Effective questions, Simulation, Seminar presentation

Class test, Semester end examinations, Quiz, Solving problems in tutorials, Assignments, Presentation, Individual and group projects

 

 

18.00
 
Network Layer (Logical Addressing). IP v4 – Address Space, Notations, Classful addressing, classless addressing and Sub-netting and IP Distribution, IP v6 – Structure and Address space.
Network Layer (Internet Protocol) . Need for Network layer, IPv4 – Datagram, Fragmentation, Checksum, Options, IPv6 – Advantages, Packet Format, Extension Headers, Transition from IPv4 to IPv6 – Dual Stack, Tunneling and Header Translation.
Network Layer. Address Mapping, Error Reporting and Multicasting.
 
 
18.00
Unit II: 
Network Layer. Direct and Indirect Delivery, Forwarding Process and Techniques, Routing Table, Unicast Routing Protocols – Optimization, Intra and Inter domain Routing, Distance vector routing, Link state routing, Path vector routing. Process to process delivery- Client server paradigm, Multiplexing and Demultiplexing, connectionless versus connection oriented services, reliable versus unreliable, User Datagram Protocol- Ports , User Datagram, Checksum, UDP operation and its use, TCP- services, features and segment, TCP connection, Flow control, Error control and congestion control.
 
 
 
 
18.00
Unit III: 
Information Security. Introduction, History of Information security, what is Security, Components of Information System. Network Security. Services, Mechanism and Attacks, The OSI security Architecture, Model of Network Security.
 
Cryptography. Concepts and Techniques, symmetric and asymmetric key cryptography, steganography, Symmetric key Ciphers. DES structure, DES Analysis, Security of DES, variants of DES
 
 
 
18.00
Unit IV: 
Block cipher modes of operation, AES structure, Analysis of AES, Key distribution Asymmetric Key Ciphers. Principles of public key cryptosystems, RSA algorithm, Analysis of RSA, Diffie-Hellman Key exchange.
Key distribution Asymmetric Key Ciphers. Principles of public key cryptosystems, RSA algorithm, Analysis of RSA, Diffie-Hellman Key exchange.
Message Authentication and Hash Functions. Authentication requirements and functions, MAC and Hash Funtions, MAC Algorithms. Secure Hash Algorithm, Digital signatures, X.509, Kerberos.
 
 
 
18.00
Unit V: 
Data base Security. Security requirements, Reliability and integrity, Sensitive data, Inference, multilevel database, proposals for multilevel security. 
Security in Network. Threats in Network, Network Security Controls, Intruders, Virus and Firewalls. Intruders, Intrusion detection, password management, Virus and related threats, Countermeasures, Firewall design principles, Types of firewalls, Secure E-Mail.
Administering Security. Security Planning, Risk Analysis, Organizational Security policies, Physical Security
ESSENTIAL READINGS: 
  1. Michael E. Whitman, Herbert J. Mattord, “Principles of Information Security”, CENGAGE Learning, 4th Edition.
  2. William Stallings, “Cryptography and Network Security”, Pearson Education, 5th Edition.
  3. Forouzan and Mukhopadhyay, “Cryptography and Network Security”, McGraw Hill, 3rd Edition.
  4. Charles P. Pfleeger, ”Security in Computing”, 4rd Edition, PHI.
  5. Atul Kahate, “Cryptography and Network Security”, McGraw Hill, 2nd Edition
     

 

REFERENCES: 
  1. C K Shyamala, N Harini, Dr T R Padmanabhan, “Cryptography and Network Security”, Wiley India, 2st Edition.
    2. Bernard Menezes, “Network Security and Cryptography” CENGAGE Learning
    3. WM.Arthur Conklin, “Principles of Computer Security”, Greg White, TMH
    4. Neal Krawetz “Introduction to Network Security”, CENGAGE Learning
    5. Yang Xiao, Frank H Li, Hui Chen, “Handbook of Security of Networks”, World Scientific, 2011.

 

 

E RESOURCE

 

JOURNALS

  • Journal of Information Technology, Sage: https://journals.sagepub.com/home/jin
  • International Journal of Information Security, Springer: https://www.springer.com/journal/10207

 

Academic Year: