Tags

Jan 24, 2010

Networks and Information Security



 Download This Book







Lab manual of Networks and Information Security
Download programs of Networks and Information Security



410448 Networks And Information Security

Teaching Scheme
Theory: 4 Hrs/ Week
Practical: 2 HrslWeek

Examination Scheme
Theory:100 Marks
Term Work: 25 Marks
Oral: 50 Marks Duration: 3 Hrs.

UNITI
Introduction
Need of security, attributes of security, authentication, access control, confidentiality, authorization, integrity, non-reproduction and cryptography, Vulnerabilities in OSI model, layers, Types of attacks, DOS, IP spoofing, man-in-the-middle, attack, replay, DNS poisoning, Information security lifecycle, multilevel model of security, Worms, viruses, Trojans, one time passwords, single sign on, use of Bioinformatics in security.

UNIT II:
Public Key Cryptography
Principles, RSA, ECC, DSA, key management, Kerberos, Elliptical curve Cryptography, X.509, diffie-heileman, key exchange, attacks, message authentication and hash functions, Hash algorithms, digital signatures.

UNIT III:
Secret Key Cryptography
DES, triple DES, AES, IDEA, key distribution, attacks.

UNIT-IV :
Virtual Private Network
Need, types of VPN, VPN supported systems, tunneling and tunneling protocols, PPTP, L2TP, 1¬PSEC protocollsuite, IKE, ESP, AH.

UNIT V:
Network Periphery Security
Router and security, firewalls, packet filters, DMZ, application level gateways, IPS, types, OS hardening, VLAN, wireless LAN, WEP, Honey pot.

UNIT VI:
Web And Email Security
Security services, web security considerations, SSL and TLS, SET, PEM and S/!'v1IME, PGP smart cards, application security using smart cards, Kerberos, electronic commerce attacks, micro payments, un smart cards, E-cache.


Text Books:
1. William Stallings "Cryptography and network security, principles and practices",Pearson

Reference Books:
1. Charlie Kaufman, Radia Perlman and mike speciner "Network security, private
communication in a public world"
2. Christopher M. King, Curtis patton and RSA press "Security architecture, design
deployment and operations".
3. Stephen northcatt, leny zeltser, et al "INSIDE NETWORK Perimeter Security" Pearson
Education Asia.
4.. Robert Bragge, Mark Rhodes, Heith straggberg "Network Security. the complete
reference", Tata McGraw Hill Publication

No comments:

Post a Comment