0% found this document useful (0 votes)
57 views12 pages

Network Security Topics and Sub-Topics As Per Chapterwise

The document outlines the topics and sub-topics covered in each chapter of a book on network security. Chapter 1 introduces computer security concepts, the OSI security architecture, security attacks and services, and security mechanisms. Subsequent chapters cover symmetric and public-key cryptography, key distribution and user authentication, transport-level security including SSL/TLS, wireless network security, email security using PGP and S/MIME. Each chapter lists detailed sub-topics to be discussed.

Uploaded by

Prasanth
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views12 pages

Network Security Topics and Sub-Topics As Per Chapterwise

The document outlines the topics and sub-topics covered in each chapter of a book on network security. Chapter 1 introduces computer security concepts, the OSI security architecture, security attacks and services, and security mechanisms. Subsequent chapters cover symmetric and public-key cryptography, key distribution and user authentication, transport-level security including SSL/TLS, wireless network security, email security using PGP and S/MIME. Each chapter lists detailed sub-topics to be discussed.

Uploaded by

Prasanth
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

2650002 – NETWORK SECURITY TOPICS AND SUB-TOPICS AS PER CHAPTERWISE

TOPICS OF BOOKS WITH THERE SUB TOPICS

CHAPTER 1 - INTRODUCTION
1.1 COMPUTER SECURITY CONCEPTS
 A Definition of Computer Security
 Examples
o CONFIDENTIALITY
o INTEGRITY
o AVAILABILITY
 The Challenges of Computer Security
1.2 THE OSI SECURITY ARCHITECTURE

1.3 SECURITY ATTACKS


 Passive Attacks
 Active Attacks

1.4 SECURITY SERVICES


 Authentication
 Access Control
 Data Confidentiality
 Data Integrity
 Nonrepudiation
 Availability Service

1.5 SECURITY MECHANISMS


 SPECIFIC SECURITY MECHANISMS
 PERVASIVE SECURITY MECHANISMS

1.6 A MODEL FOR NETWORK SECURITY

MANJOOR HUSSAIN KAPOOR Page 1 of 12


ASST. PROF. – LAXMI INSTITUTE OF COMPUTER APPLICATIONS (MCA), SARIGAM
2650002 – NETWORK SECURITY TOPICS AND SUB-TOPICS AS PER CHAPTERWISE

CHAPTER 1 - SYMMETRIC ENCRYPTION AND MESSAGE CONFIDENTIALITY


2.1 SYMMETRIC ENCRYPTION PRINCIPLES
 Cryptography
 Cryptanalysis
 Feistel Cipher Structure

2.2 SYMMETRIC BLOCK ENCRYPTION ALGORITHMS


 Data Encryption Standard
o DESCRIPTION OF THE ALGORITHM
o THE STRENGTH OF DES
 Triple DES
 Advanced Encryption Standard
o OVERVIEW OF THE ALGORITHM

2.3 RANDOM AND PSEUDORANDOM NUMBERS


 The Use of Random Numbers
o RANDOMNESS
o UNPREDICTABILITY
 TRNGs, PRNGs, and PRFs
 Algorithm Design

2.4 STREAM CIPHERS AND RC4


 Stream Cipher Structure
 The RC4 Algorithm
o INITIALIZATION OF S
o STREAM GENERATION
o STRENGTH OF RC4

2.5 CIPHER BLOCK MODES OF OPERATION


 Electronic Codebook Mode
 Cipher Block Chaining Mode
 Cipher Feedback Mode
 Counter Mode

MANJOOR HUSSAIN KAPOOR Page 2 of 12


ASST. PROF. – LAXMI INSTITUTE OF COMPUTER APPLICATIONS (MCA), SARIGAM
2650002 – NETWORK SECURITY TOPICS AND SUB-TOPICS AS PER CHAPTERWISE

CHAPTER 3 - PUBLIC-KEY CRYPTOGRAPHY AND MESSAGE AUTHENTICATION


3.1 APPROACHES TO MESSAGE AUTHENTICATION
 Authentication Using Conventional Encryption
 Message Authentication without Message Encryption
o MESSAGE AUTHENTICATION CODE
o ONE-WAY HASH FUNCTION

3.2 SECURE HASH FUNCTIONS


 Hash Function Requirements
 Security of Hash Functions
 Simple Hash Functions
 The SHA Secure Hash Function

3.3 MESSAGE AUTHENTICATION CODES


 HMAC
o HMAC DESIGN OBJECTIVES
o HMAC ALGORITHM
 MACs Based on Block Ciphers
o CIPHER-BASED MESSAGE AUTHENTICATION CODE (CMAC)
o COUNTER WITH CIPHER BLOCK CHAINING-MESSAGE AUTHENTICATION CODE

3.4 PUBLIC-KEY CRYPTOGRAPHY PRINCIPLES


 Public-Key Encryption Structure
 Applications for Public-Key Cryptosystems
 Requirements for Public-Key Cryptography

3.5 PUBLIC-KEY CRYPTOGRAPHY ALGORITHMS


 The RSA Public-Key Encryption Algorithm
 Diffie-Hellman Key Exchange
o THE ALGORITHM
o KEY EXCHANGE PROTOCOLS
o MAN-IN-THE-MIDDLE ATTACK
 Other Public-Key Cryptography Algorithms
o DIGITAL SIGNATURE STANDARD
o ELLIPTIC-CURVE CRYPTOGRAPHY

3.6 DIGITAL SIGNATURES

MANJOOR HUSSAIN KAPOOR Page 3 of 12


ASST. PROF. – LAXMI INSTITUTE OF COMPUTER APPLICATIONS (MCA), SARIGAM
2650002 – NETWORK SECURITY TOPICS AND SUB-TOPICS AS PER CHAPTERWISE

CHAPTER 4 - KEY DISTRIBUTION AND USER AUTHENTICATION


4.1 SYMMETRIC KEY DISTRIBUTION USING SYMMETRIC ENCRYPTION

4.2 KERBEROS
 Kerberos Version 4
o A SIMPLE AUTHENTICATION DIALOGUE
o A MORE SECURE AUTHENTICATION DIALOGUE
o THE VERSION 4 AUTHENTICATION DIALOGUE
o KERBEROS REALMS AND MULTIPLE KERBERI
 Kerberos Version 5
o DIFFERENCES BETWEEN VERSIONS 4 AND 5
o THE VERSION 5 AUTHENTICATION DIALOGUE

4.3 KEY DISTRIBUTION USING ASYMMETRIC ENCRYPTION


 Public-Key Certificates
 Public-Key Distribution of Secret Keys

4.4 X.509 CERTIFICATES


 Certificates
o OBTAINING A USER’S CERTIFICATE
o REVOCATION OF CERTIFICATES
 X.509 Version 3
o KEY AND POLICY INFORMATION
o CERTIFICATE SUBJECT AND ISSUER ATTRIBUTES
o CERTIFICATION PATH CONSTRAINTS

4.5 PUBLIC-KEY INFRASTRUCTURE


 PKIX Management Functions
 PKIX Management Protocols

MANJOOR HUSSAIN KAPOOR Page 4 of 12


ASST. PROF. – LAXMI INSTITUTE OF COMPUTER APPLICATIONS (MCA), SARIGAM
2650002 – NETWORK SECURITY TOPICS AND SUB-TOPICS AS PER CHAPTERWISE

CHAPTER 5 - TRANSPORT -LEVEL SECURITY


5.1 WEB SECURITY CONSIDERATIONS
 Web Security Threats
 Web Traffic Security Approaches

5.2 SECURE SOCKET LAYER AND TRANSPORT LAYER SECURITY


 SSL Architecture
 SSL Record Protocol
 Change Cipher Spec Protocol
 Alert Protocol
 Handshake Protocol
o PHASE 1. ESTABLISH SECURITY CAPABILITIES
o PHASE 2. SERVER AUTHENTICATION AND KEY EXCHANGE
o PHASE 3. CLIENT AUTHENTICATION AND KEY EXCHANGE
o PHASE 4. FINISH
 Cryptographic Computations
o MASTER SECRET CREATION
o GENERATION OF CRYPTOGRAPHIC PARAMETERS

5.3 TRANSPORT LAYER SECURITY


 Version Number
 Message Authentication Code
 Pseudorandom Function
 Alert Codes
 Cipher Suites
 Client Certificate Types
 Certificate_Verify and Finished Messages
 Cryptographic Computations
 Padding

5.4 HTTPS
 Connection Initiation
 Connection Closure

5.5 SECURE SHELL (SSH)


 Transport Layer Protocol
o HOST KEYS
o PACKET EXCHANGE
o KEY GENERATION

MANJOOR HUSSAIN KAPOOR Page 5 of 12


ASST. PROF. – LAXMI INSTITUTE OF COMPUTER APPLICATIONS (MCA), SARIGAM
2650002 – NETWORK SECURITY TOPICS AND SUB-TOPICS AS PER CHAPTERWISE

 User Authentication Protocol


o MESSAGE TYPES AND FORMATS
o AUTHENTICATION METHODS
 Connection Protocol
o CHANNEL MECHANISM
o CHANNEL TYPES
o PORT FORWARDING

MANJOOR HUSSAIN KAPOOR Page 6 of 12


ASST. PROF. – LAXMI INSTITUTE OF COMPUTER APPLICATIONS (MCA), SARIGAM
2650002 – NETWORK SECURITY TOPICS AND SUB-TOPICS AS PER CHAPTERWISE

CHAPTER 6 - WIRELESS NETWORK SECURITY


6.1 IEEE 802.11 WIRELESS LAN OVERVIEW
 The Wi-Fi Alliance
 IEEE 802 Protocol Architecture
o PHYSICAL LAYER
o MEDIA ACCESS CONTROL
o LOGICAL LINK CONTROL
 IEEE 802.11 Network Components and Architectural Model
 IEEE 802.11 Services
o DISTRIBUTION OF MESSAGES WITHIN A DS
o ASSOCIATION-RELATED SERVICES

6.2 IEEE 802.11iWIRELESS LAN SECURITY


 IEEE 802.11i Services
 IEEE 802.11i Phases of Operation
 Discovery Phase
o SECURITY CAPABILITIES
o MPDU EXCHANGE
 Authentication Phase
o IEEE 802.1X ACCESS CONTROL APPROACH
o MPDU EXCHANGE
o EAP EXCHANGE
 Key Management Phase
o PAIRWISE KEYS
o GROUP KEYS
o PAIRWISE KEY DISTRIBUTION
o GROUP KEY DISTRIBUTION
 Protected Data Transfer Phase
o TKIP
o CCMP
 The IEEE 802.11i Pseudorandom Function

6.3 WIRELESS APPLICATION PROTOCOL OVERVIEW


 Operational Overview
 Wireless Markup Language
 WAP Architecture
o SECURITY SERVICES
o SERVICE DISCOVERY
 Wireless Application Environment
 WAP Protocol Architecture

MANJOOR HUSSAIN KAPOOR Page 7 of 12


ASST. PROF. – LAXMI INSTITUTE OF COMPUTER APPLICATIONS (MCA), SARIGAM
2650002 – NETWORK SECURITY TOPICS AND SUB-TOPICS AS PER CHAPTERWISE

o WIRELESS SESSION PROTOCOL


o WIRELESS TRANSACTION PROTOCOL

6.4 WIRELESS TRANSPORT LAYER SECURITY


 WTLS Sessions and Connections
 WTLS Protocol Architecture
o WTLS RECORD PROTOCOL
o CHANGE CIPHER SPEC PROTOCOL
o ALERT PROTOCOL
o HANDSHAKE PROTOCOL
 Cryptographic Algorithms
o AUTHENTICATION
o KEY EXCHANGE
o PSEUDORANDOM FUNCTION(PRF)

6.5 WAP END-TO-END SECURITY

MANJOOR HUSSAIN KAPOOR Page 8 of 12


ASST. PROF. – LAXMI INSTITUTE OF COMPUTER APPLICATIONS (MCA), SARIGAM
2650002 – NETWORK SECURITY TOPICS AND SUB-TOPICS AS PER CHAPTERWISE

CHAPTER 7 - ELECTRONIC MAIL SECURITY


7.1 PRETTY GOOD PRIVACY
 Notation
 Operational Description
o AUTHENTICATION
o CONFIDENTIALITY
o CONFIDENTIALITY AND AUTHENTICATION
o COMPRESSION
o E-MAIL COMPATIBILITY
 Cryptographic Keys and Key Rings
o SESSION KEY GENERATION
o KEY IDENTIFIERS
o KEY RINGS
 Public-Key Management
o APPROACHES TO PUBLIC-KEY MANAGEMENT
o THE USE OF TRUST
o REVOKING PUBLIC KEYS

7.2 S/MIME
 RFC 5322
 Multipurpose Internet Mail Extensions
o OVERVIEW
o MIME CONTENT TYPES
o MIME TRANSFER ENCODINGS
o MULTIPART EXAMPLE
o CANONICAL FORM
 S/MIME Functionality
o CRYPTOGRAPHIC ALGORITHMS
 S/MIME Messages
o SECURING A MIME ENTITY
o ENVELOPEDDATA
o SIGNEDDATA
o CLEAR SIGNING
o REGISTRATION REQUEST
o CERTIFICATES-ONLY MESSAGE
 S/MIME Certificate Processing
o USER AGENT ROLE
o VERISIGN CERTIFICATES
 Enhanced Security Services

MANJOOR HUSSAIN KAPOOR Page 9 of 12


ASST. PROF. – LAXMI INSTITUTE OF COMPUTER APPLICATIONS (MCA), SARIGAM
2650002 – NETWORK SECURITY TOPICS AND SUB-TOPICS AS PER CHAPTERWISE

CHAPTER 8 - IP SECURITY
8.1 IP SECURITY OVERVIEW
 Applications of IPsec
 Benefits of IPsec
 Routing Applications
 IPsec Documents
 IPsec Services
 Transport and Tunnel Modes
o TRANSPORT MODE
o TUNNEL MODE

8.2 IP SECURITY POLICY


 Security Associations
 Security Association Database
 Security Policy Database
 IP Traffic Processing
o OUTBOUND PACKETS
o INBOUND PACKETS

8.3 ENCAPSULATING SECURITY PAYLOAD


 ESP Format
 Encryption and Authentication Algorithms
 Padding
 Anti-Replay Service
 Transport and Tunnel Modes
o TRANSPORT MODE ESP
o TUNNEL MODE ESP

8.4 COMBINING SECURITY ASSOCIATIONS


 Authentication Plus Confidentiality
o ESP WITH AUTHENTICATION OPTION
o TRANSPORT ADJACENCY
o TRANSPORT-TUNNEL BUNDLE
 Basic Combinations of Security Associations

MANJOOR HUSSAIN KAPOOR Page 10 of 12


ASST. PROF. – LAXMI INSTITUTE OF COMPUTER APPLICATIONS (MCA), SARIGAM
2650002 – NETWORK SECURITY TOPICS AND SUB-TOPICS AS PER CHAPTERWISE

CHAPTER 9 – INTRUDERS
9.1 INTRUDERS
 Intruder Behavior Patterns
o HACKERS
o CRIMINALS
o INSIDER ATTACKS
 Intrusion Techniques

9.2 INTRUSION DETECTION


 Audit Records
 Statistical Anomaly Detection
 Rule-Based Intrusion Detection
 The Base-Rate Fallacy
 Distributed Intrusion Detection
 Honeypots
 Intrusion Detection Exchange Format

MANJOOR HUSSAIN KAPOOR Page 11 of 12


ASST. PROF. – LAXMI INSTITUTE OF COMPUTER APPLICATIONS (MCA), SARIGAM
2650002 – NETWORK SECURITY TOPICS AND SUB-TOPICS AS PER CHAPTERWISE

CHAPTER 11 – FIREWALLS
11.1 THE NEED FOR FIREWALLS

11.2 FIREWALL CHARACTERISTICS

11.3 TYPES OF FIREWALLS


 Packet Filtering Firewall
 Stateful Inspection Firewalls
 Application-Level Gateway
 Circuit-Level Gateway

11.4 FIREWALL BASING


 Bastion Host
 Host-Based Firewalls
 Personal Firewall

11.5 FIREWALL LOCATION AND CONFIGURATIONS


 DMZ Networks
 Virtual Private Networks
 Distributed Firewalls
 Summary of Firewall Locations and Topologies

MANJOOR HUSSAIN KAPOOR Page 12 of 12


ASST. PROF. – LAXMI INSTITUTE OF COMPUTER APPLICATIONS (MCA), SARIGAM

You might also like