0% found this document useful (0 votes)
111 views

Information and Network Security

This document outlines an information and network security course. The course aims to help students identify network security threats and countermeasures, design security mechanisms, address internet security issues and protocols, and configure firewalls. It covers topics like cryptography, authentication, network security standards/protocols, web/email security, wireless security, and security systems management. The course references cryptography and network security books and aims for students to analyze data vulnerabilities, identify network security issues, evaluate security mechanisms, and compare IEEE standards and security issues.

Uploaded by

poonam jindal
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
111 views

Information and Network Security

This document outlines an information and network security course. The course aims to help students identify network security threats and countermeasures, design security mechanisms, address internet security issues and protocols, and configure firewalls. It covers topics like cryptography, authentication, network security standards/protocols, web/email security, wireless security, and security systems management. The course references cryptography and network security books and aims for students to analyze data vulnerabilities, identify network security issues, evaluate security mechanisms, and compare IEEE standards and security issues.

Uploaded by

poonam jindal
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

(INFORMATION AND NETWORK SECURITY)

Information and network security


At the end of the course, students will be able to:
CO1: Identify network security threats and determine efforts to counter them
CO2: Design security mechanisms for relevant security services.
CO3: Address issues in internet security and the relevant protocols.
CO4: Determine firewall requirements, and configure a firewall

Information Security
Unit-1 Introduction to General security concepts, basic terminologies, issues, network and
security models. Symmetric and asymmetric cryptography, data encryption standard (DES),
international data encryption algorithm (IDEA), advanced encryption standard (AES), Key
management and Distribution, Random Number Generation, RSA Algorithm, Diffie Hellman
Key Exchange, Elliptic Curve Cryptography.
Unit-2 Message Authentication and Hash Functions: Authentication Requirements,
Authentication Functions, weak and strong authentication, Zero knowledge protocol, Message
Authentication Codes, Hash Functions, Security of Hash Functions and MACs, Hash and MAC
Algorithms, Message Digest Algorithm, Secure Hash Algorithm, Digital Signatures.

Network Security
Unit-3 Security standards and protocols, Kerberos protocol: public key infrastructure (PKI);
security protocols for different network layers, secure IP protocol (IPsec), Secure Socket Layer
(SSL) and transport layer security (TLS), Protocols for E-Commerce.
Unit-4 Web and Email Security Important security issues with the Web (both the server and
the client sides), building and maintaining secure web sites.
Risks and issues associated with the uses of electronic email, privacy, message integrity and
authenticity, technologies for secure email systems, PEM (Privacy Enhanced Email), S/MIME,
PGP secure mail protocol. Wireless network Security,802.11i, important security issues of
802.11 standard, Security in future wireless networks.
Unit-5 Security Systems and Management Issues, Security systems in the real world, firewalls,
security in software systems, main security features of some well-known systems and their
weaknesses. Security policies, management strategies and policies for enterprise information
security, management issues relevant to information security.

References:

1. Cryptography and Network Security by Behrouz A. Forouzan, TATA McGraw hill.


2. Charlie Kaufman, Radia Perlman, Mike Specincer: Network Security – private
communication in a public world, second edition, Prentice Hall.
3. Newman, Robert C: Enterprise Security, Prentice Hall.
4. Cryptography and Network Security, William Stalling, Prentice hall

Course Outcomes:
At the end of the course students should be able to:
CO1: Analyze the data vulnerabilities and hence be able to design a solution to secure the data.
CO2: Identify the security issues in the network and resolve it.
CO3: Evaluate and analyze various security mechanisms
CO4: Compare and Contrast different IEEE standards and network security issues

You might also like