Download This Book
Lab manual of Networks and Information Security
Download programs of Networks and Information Security
410448 Networks And Information Security
Teaching Scheme
Theory: 4 Hrs/ Week
Practical: 2 HrslWeek
Examination Scheme
Theory:100 Marks
Term Work: 25 Marks
Oral: 50 Marks Duration: 3 Hrs.
UNITI
Introduction
Need of security, attributes of security, authentication, access control, confidentiality, authorization, integrity, non-reproduction and cryptography, Vulnerabilities in OSI model, layers, Types of attacks, DOS, IP spoofing, man-in-the-middle, attack, replay, DNS poisoning, Information security lifecycle, multilevel model of security, Worms, viruses, Trojans, one time passwords, single sign on, use of Bioinformatics in security.
UNIT II:
Public Key Cryptography
Principles, RSA, ECC, DSA, key management, Kerberos, Elliptical curve Cryptography, X.509, diffie-heileman, key exchange, attacks, message authentication and hash functions, Hash algorithms, digital signatures.
UNIT III:
Secret Key Cryptography
DES, triple DES, AES, IDEA, key distribution, attacks.
UNIT-IV :
Virtual Private Network
Need, types of VPN, VPN supported systems, tunneling and tunneling protocols, PPTP, L2TP, 1¬PSEC protocollsuite, IKE, ESP, AH.
UNIT V:
Network Periphery Security
Router and security, firewalls, packet filters, DMZ, application level gateways, IPS, types, OS hardening, VLAN, wireless LAN, WEP, Honey pot.
UNIT VI:
Web And Email Security
Security services, web security considerations, SSL and TLS, SET, PEM and S/!'v1IME, PGP smart cards, application security using smart cards, Kerberos, electronic commerce attacks, micro payments, un smart cards, E-cache.
Text Books:
1. William Stallings "Cryptography and network security, principles and practices",Pearson
Reference Books:
1. Charlie Kaufman, Radia Perlman and mike speciner "Network security, private
communication in a public world"
2. Christopher M. King, Curtis patton and RSA press "Security architecture, design
deployment and operations".
3. Stephen northcatt, leny zeltser, et al "INSIDE NETWORK Perimeter Security" Pearson
Education Asia.
4.. Robert Bragge, Mark Rhodes, Heith straggberg "Network Security. the complete
reference", Tata McGraw Hill Publication
No comments:
Post a Comment