0% found this document useful (0 votes)
43 views

Network Security Topics and Sub-Topics As Per Chapterwise

The document outlines the topics and sub-topics covered in each chapter of a book on network security. Chapter 1 introduces computer security concepts, the OSI security architecture, security attacks and services, and security mechanisms. Subsequent chapters cover symmetric and public-key cryptography, key distribution and user authentication, transport-level security including SSL/TLS, wireless network security, email security using PGP and S/MIME. Each chapter lists detailed sub-topics to be discussed.

Uploaded by

Prasanth
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views

Network Security Topics and Sub-Topics As Per Chapterwise

The document outlines the topics and sub-topics covered in each chapter of a book on network security. Chapter 1 introduces computer security concepts, the OSI security architecture, security attacks and services, and security mechanisms. Subsequent chapters cover symmetric and public-key cryptography, key distribution and user authentication, transport-level security including SSL/TLS, wireless network security, email security using PGP and S/MIME. Each chapter lists detailed sub-topics to be discussed.

Uploaded by

Prasanth
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

2650002 – NETWORK SECURITY TOPICS AND SUB-TOPICS AS PER CHAPTERWISE

TOPICS OF BOOKS WITH THERE SUB TOPICS

CHAPTER 1 - INTRODUCTION
1.1 COMPUTER SECURITY CONCEPTS
 A Definition of Computer Security
 Examples
o CONFIDENTIALITY
o INTEGRITY
o AVAILABILITY
 The Challenges of Computer Security
1.2 THE OSI SECURITY ARCHITECTURE

1.3 SECURITY ATTACKS


 Passive Attacks
 Active Attacks

1.4 SECURITY SERVICES


 Authentication
 Access Control
 Data Confidentiality
 Data Integrity
 Nonrepudiation
 Availability Service

1.5 SECURITY MECHANISMS


 SPECIFIC SECURITY MECHANISMS
 PERVASIVE SECURITY MECHANISMS

1.6 A MODEL FOR NETWORK SECURITY

MANJOOR HUSSAIN KAPOOR Page 1 of 12


ASST. PROF. – LAXMI INSTITUTE OF COMPUTER APPLICATIONS (MCA), SARIGAM
2650002 – NETWORK SECURITY TOPICS AND SUB-TOPICS AS PER CHAPTERWISE

CHAPTER 1 - SYMMETRIC ENCRYPTION AND MESSAGE CONFIDENTIALITY


2.1 SYMMETRIC ENCRYPTION PRINCIPLES
 Cryptography
 Cryptanalysis
 Feistel Cipher Structure

2.2 SYMMETRIC BLOCK ENCRYPTION ALGORITHMS


 Data Encryption Standard
o DESCRIPTION OF THE ALGORITHM
o THE STRENGTH OF DES
 Triple DES
 Advanced Encryption Standard
o OVERVIEW OF THE ALGORITHM

2.3 RANDOM AND PSEUDORANDOM NUMBERS


 The Use of Random Numbers
o RANDOMNESS
o UNPREDICTABILITY
 TRNGs, PRNGs, and PRFs
 Algorithm Design

2.4 STREAM CIPHERS AND RC4


 Stream Cipher Structure
 The RC4 Algorithm
o INITIALIZATION OF S
o STREAM GENERATION
o STRENGTH OF RC4

2.5 CIPHER BLOCK MODES OF OPERATION


 Electronic Codebook Mode
 Cipher Block Chaining Mode
 Cipher Feedback Mode
 Counter Mode

MANJOOR HUSSAIN KAPOOR Page 2 of 12


ASST. PROF. – LAXMI INSTITUTE OF COMPUTER APPLICATIONS (MCA), SARIGAM
2650002 – NETWORK SECURITY TOPICS AND SUB-TOPICS AS PER CHAPTERWISE

CHAPTER 3 - PUBLIC-KEY CRYPTOGRAPHY AND MESSAGE AUTHENTICATION


3.1 APPROACHES TO MESSAGE AUTHENTICATION
 Authentication Using Conventional Encryption
 Message Authentication without Message Encryption
o MESSAGE AUTHENTICATION CODE
o ONE-WAY HASH FUNCTION

3.2 SECURE HASH FUNCTIONS


 Hash Function Requirements
 Security of Hash Functions
 Simple Hash Functions
 The SHA Secure Hash Function

3.3 MESSAGE AUTHENTICATION CODES


 HMAC
o HMAC DESIGN OBJECTIVES
o HMAC ALGORITHM
 MACs Based on Block Ciphers
o CIPHER-BASED MESSAGE AUTHENTICATION CODE (CMAC)
o COUNTER WITH CIPHER BLOCK CHAINING-MESSAGE AUTHENTICATION CODE

3.4 PUBLIC-KEY CRYPTOGRAPHY PRINCIPLES


 Public-Key Encryption Structure
 Applications for Public-Key Cryptosystems
 Requirements for Public-Key Cryptography

3.5 PUBLIC-KEY CRYPTOGRAPHY ALGORITHMS


 The RSA Public-Key Encryption Algorithm
 Diffie-Hellman Key Exchange
o THE ALGORITHM
o KEY EXCHANGE PROTOCOLS
o MAN-IN-THE-MIDDLE ATTACK
 Other Public-Key Cryptography Algorithms
o DIGITAL SIGNATURE STANDARD
o ELLIPTIC-CURVE CRYPTOGRAPHY

3.6 DIGITAL SIGNATURES

MANJOOR HUSSAIN KAPOOR Page 3 of 12


ASST. PROF. – LAXMI INSTITUTE OF COMPUTER APPLICATIONS (MCA), SARIGAM
2650002 – NETWORK SECURITY TOPICS AND SUB-TOPICS AS PER CHAPTERWISE

CHAPTER 4 - KEY DISTRIBUTION AND USER AUTHENTICATION


4.1 SYMMETRIC KEY DISTRIBUTION USING SYMMETRIC ENCRYPTION

4.2 KERBEROS
 Kerberos Version 4
o A SIMPLE AUTHENTICATION DIALOGUE
o A MORE SECURE AUTHENTICATION DIALOGUE
o THE VERSION 4 AUTHENTICATION DIALOGUE
o KERBEROS REALMS AND MULTIPLE KERBERI
 Kerberos Version 5
o DIFFERENCES BETWEEN VERSIONS 4 AND 5
o THE VERSION 5 AUTHENTICATION DIALOGUE

4.3 KEY DISTRIBUTION USING ASYMMETRIC ENCRYPTION


 Public-Key Certificates
 Public-Key Distribution of Secret Keys

4.4 X.509 CERTIFICATES


 Certificates
o OBTAINING A USER’S CERTIFICATE
o REVOCATION OF CERTIFICATES
 X.509 Version 3
o KEY AND POLICY INFORMATION
o CERTIFICATE SUBJECT AND ISSUER ATTRIBUTES
o CERTIFICATION PATH CONSTRAINTS

4.5 PUBLIC-KEY INFRASTRUCTURE


 PKIX Management Functions
 PKIX Management Protocols

MANJOOR HUSSAIN KAPOOR Page 4 of 12


ASST. PROF. – LAXMI INSTITUTE OF COMPUTER APPLICATIONS (MCA), SARIGAM
2650002 – NETWORK SECURITY TOPICS AND SUB-TOPICS AS PER CHAPTERWISE

CHAPTER 5 - TRANSPORT -LEVEL SECURITY


5.1 WEB SECURITY CONSIDERATIONS
 Web Security Threats
 Web Traffic Security Approaches

5.2 SECURE SOCKET LAYER AND TRANSPORT LAYER SECURITY


 SSL Architecture
 SSL Record Protocol
 Change Cipher Spec Protocol
 Alert Protocol
 Handshake Protocol
o PHASE 1. ESTABLISH SECURITY CAPABILITIES
o PHASE 2. SERVER AUTHENTICATION AND KEY EXCHANGE
o PHASE 3. CLIENT AUTHENTICATION AND KEY EXCHANGE
o PHASE 4. FINISH
 Cryptographic Computations
o MASTER SECRET CREATION
o GENERATION OF CRYPTOGRAPHIC PARAMETERS

5.3 TRANSPORT LAYER SECURITY


 Version Number
 Message Authentication Code
 Pseudorandom Function
 Alert Codes
 Cipher Suites
 Client Certificate Types
 Certificate_Verify and Finished Messages
 Cryptographic Computations
 Padding

5.4 HTTPS
 Connection Initiation
 Connection Closure

5.5 SECURE SHELL (SSH)


 Transport Layer Protocol
o HOST KEYS
o PACKET EXCHANGE
o KEY GENERATION

MANJOOR HUSSAIN KAPOOR Page 5 of 12


ASST. PROF. – LAXMI INSTITUTE OF COMPUTER APPLICATIONS (MCA), SARIGAM
2650002 – NETWORK SECURITY TOPICS AND SUB-TOPICS AS PER CHAPTERWISE

 User Authentication Protocol


o MESSAGE TYPES AND FORMATS
o AUTHENTICATION METHODS
 Connection Protocol
o CHANNEL MECHANISM
o CHANNEL TYPES
o PORT FORWARDING

MANJOOR HUSSAIN KAPOOR Page 6 of 12


ASST. PROF. – LAXMI INSTITUTE OF COMPUTER APPLICATIONS (MCA), SARIGAM
2650002 – NETWORK SECURITY TOPICS AND SUB-TOPICS AS PER CHAPTERWISE

CHAPTER 6 - WIRELESS NETWORK SECURITY


6.1 IEEE 802.11 WIRELESS LAN OVERVIEW
 The Wi-Fi Alliance
 IEEE 802 Protocol Architecture
o PHYSICAL LAYER
o MEDIA ACCESS CONTROL
o LOGICAL LINK CONTROL
 IEEE 802.11 Network Components and Architectural Model
 IEEE 802.11 Services
o DISTRIBUTION OF MESSAGES WITHIN A DS
o ASSOCIATION-RELATED SERVICES

6.2 IEEE 802.11iWIRELESS LAN SECURITY


 IEEE 802.11i Services
 IEEE 802.11i Phases of Operation
 Discovery Phase
o SECURITY CAPABILITIES
o MPDU EXCHANGE
 Authentication Phase
o IEEE 802.1X ACCESS CONTROL APPROACH
o MPDU EXCHANGE
o EAP EXCHANGE
 Key Management Phase
o PAIRWISE KEYS
o GROUP KEYS
o PAIRWISE KEY DISTRIBUTION
o GROUP KEY DISTRIBUTION
 Protected Data Transfer Phase
o TKIP
o CCMP
 The IEEE 802.11i Pseudorandom Function

6.3 WIRELESS APPLICATION PROTOCOL OVERVIEW


 Operational Overview
 Wireless Markup Language
 WAP Architecture
o SECURITY SERVICES
o SERVICE DISCOVERY
 Wireless Application Environment
 WAP Protocol Architecture

MANJOOR HUSSAIN KAPOOR Page 7 of 12


ASST. PROF. – LAXMI INSTITUTE OF COMPUTER APPLICATIONS (MCA), SARIGAM
2650002 – NETWORK SECURITY TOPICS AND SUB-TOPICS AS PER CHAPTERWISE

o WIRELESS SESSION PROTOCOL


o WIRELESS TRANSACTION PROTOCOL

6.4 WIRELESS TRANSPORT LAYER SECURITY


 WTLS Sessions and Connections
 WTLS Protocol Architecture
o WTLS RECORD PROTOCOL
o CHANGE CIPHER SPEC PROTOCOL
o ALERT PROTOCOL
o HANDSHAKE PROTOCOL
 Cryptographic Algorithms
o AUTHENTICATION
o KEY EXCHANGE
o PSEUDORANDOM FUNCTION(PRF)

6.5 WAP END-TO-END SECURITY

MANJOOR HUSSAIN KAPOOR Page 8 of 12


ASST. PROF. – LAXMI INSTITUTE OF COMPUTER APPLICATIONS (MCA), SARIGAM
2650002 – NETWORK SECURITY TOPICS AND SUB-TOPICS AS PER CHAPTERWISE

CHAPTER 7 - ELECTRONIC MAIL SECURITY


7.1 PRETTY GOOD PRIVACY
 Notation
 Operational Description
o AUTHENTICATION
o CONFIDENTIALITY
o CONFIDENTIALITY AND AUTHENTICATION
o COMPRESSION
o E-MAIL COMPATIBILITY
 Cryptographic Keys and Key Rings
o SESSION KEY GENERATION
o KEY IDENTIFIERS
o KEY RINGS
 Public-Key Management
o APPROACHES TO PUBLIC-KEY MANAGEMENT
o THE USE OF TRUST
o REVOKING PUBLIC KEYS

7.2 S/MIME
 RFC 5322
 Multipurpose Internet Mail Extensions
o OVERVIEW
o MIME CONTENT TYPES
o MIME TRANSFER ENCODINGS
o MULTIPART EXAMPLE
o CANONICAL FORM
 S/MIME Functionality
o CRYPTOGRAPHIC ALGORITHMS
 S/MIME Messages
o SECURING A MIME ENTITY
o ENVELOPEDDATA
o SIGNEDDATA
o CLEAR SIGNING
o REGISTRATION REQUEST
o CERTIFICATES-ONLY MESSAGE
 S/MIME Certificate Processing
o USER AGENT ROLE
o VERISIGN CERTIFICATES
 Enhanced Security Services

MANJOOR HUSSAIN KAPOOR Page 9 of 12


ASST. PROF. – LAXMI INSTITUTE OF COMPUTER APPLICATIONS (MCA), SARIGAM
2650002 – NETWORK SECURITY TOPICS AND SUB-TOPICS AS PER CHAPTERWISE

CHAPTER 8 - IP SECURITY
8.1 IP SECURITY OVERVIEW
 Applications of IPsec
 Benefits of IPsec
 Routing Applications
 IPsec Documents
 IPsec Services
 Transport and Tunnel Modes
o TRANSPORT MODE
o TUNNEL MODE

8.2 IP SECURITY POLICY


 Security Associations
 Security Association Database
 Security Policy Database
 IP Traffic Processing
o OUTBOUND PACKETS
o INBOUND PACKETS

8.3 ENCAPSULATING SECURITY PAYLOAD


 ESP Format
 Encryption and Authentication Algorithms
 Padding
 Anti-Replay Service
 Transport and Tunnel Modes
o TRANSPORT MODE ESP
o TUNNEL MODE ESP

8.4 COMBINING SECURITY ASSOCIATIONS


 Authentication Plus Confidentiality
o ESP WITH AUTHENTICATION OPTION
o TRANSPORT ADJACENCY
o TRANSPORT-TUNNEL BUNDLE
 Basic Combinations of Security Associations

MANJOOR HUSSAIN KAPOOR Page 10 of 12


ASST. PROF. – LAXMI INSTITUTE OF COMPUTER APPLICATIONS (MCA), SARIGAM
2650002 – NETWORK SECURITY TOPICS AND SUB-TOPICS AS PER CHAPTERWISE

CHAPTER 9 – INTRUDERS
9.1 INTRUDERS
 Intruder Behavior Patterns
o HACKERS
o CRIMINALS
o INSIDER ATTACKS
 Intrusion Techniques

9.2 INTRUSION DETECTION


 Audit Records
 Statistical Anomaly Detection
 Rule-Based Intrusion Detection
 The Base-Rate Fallacy
 Distributed Intrusion Detection
 Honeypots
 Intrusion Detection Exchange Format

MANJOOR HUSSAIN KAPOOR Page 11 of 12


ASST. PROF. – LAXMI INSTITUTE OF COMPUTER APPLICATIONS (MCA), SARIGAM
2650002 – NETWORK SECURITY TOPICS AND SUB-TOPICS AS PER CHAPTERWISE

CHAPTER 11 – FIREWALLS
11.1 THE NEED FOR FIREWALLS

11.2 FIREWALL CHARACTERISTICS

11.3 TYPES OF FIREWALLS


 Packet Filtering Firewall
 Stateful Inspection Firewalls
 Application-Level Gateway
 Circuit-Level Gateway

11.4 FIREWALL BASING


 Bastion Host
 Host-Based Firewalls
 Personal Firewall

11.5 FIREWALL LOCATION AND CONFIGURATIONS


 DMZ Networks
 Virtual Private Networks
 Distributed Firewalls
 Summary of Firewall Locations and Topologies

MANJOOR HUSSAIN KAPOOR Page 12 of 12


ASST. PROF. – LAXMI INSTITUTE OF COMPUTER APPLICATIONS (MCA), SARIGAM

You might also like