0% found this document useful (0 votes)
31 views1 page

Syllabus

The document outlines 5 units that cover topics such as security attacks, security services, symmetric and public key cryptography, email and web security, intruders and firewalls. Textbooks on cryptography and network security are also listed.

Uploaded by

ainoc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views1 page

Syllabus

The document outlines 5 units that cover topics such as security attacks, security services, symmetric and public key cryptography, email and web security, intruders and firewalls. Textbooks on cryptography and network security are also listed.

Uploaded by

ainoc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

UNIT I

INTRODUCTION: Security Attacks (Interruption, Interception, Modification and Fabrication),


Security Services (Confidentiality, Authentication, Integrity, Non repudiation, access Control
and Availability) and Mechanisms, A model for Internetwork security, Internet Standards and
RFCs, Buffer overflow, format string vulnerabilities, TCP session hijacking, ARP attacks, route
table modification, UDP hijacking and man-in-the-middle attacks.

UNIT II

SYMMETRIC ENCRYPTION AND MESSAGE AUTHENTICATION: Principles,


Symmetric Block Encryption Algorithms, Cipher Block Modes of Operation, Location of
Encryption Devices, Key Distribution, Approaches of Message Authentication, Secure Hash
Functions and HMAC.

UNIT III
PUBLIC KEY CRYPTOGRAPHY AND KEY DISTRIBUTION: Principles, Public key
Cryptography Algorithms, Digital Signatures, Key Management, Kerberos, X.509 Directory
Authentication Services, Public key Infrastructure

UNIT IV
E-MAIL SECURITY: Pretty Good Privacy, S/MIME
IP SECURITY: IP Security overview, IP Security architecture, Authentication Header,
Encapsulating security payload, combining security associations, key management.
UNIT V
WEB SECURITY: Web security considerations, Secure Socket Layer and Transport Layer
Security, Secure electronic transaction
INTRUDERS, VIRUS AND FIREWALLS: Intruders, Intrusion detection, password
management, Virus and related threats, Countermeasures, Firewall design principles, Types of
firewalls

TEXT/REFERENCE BOOKS:
T/R BOOK TITLE/AUTHORS/PUBLICATION
T Cryptography and network Security: William Stallings, Pearson Education, 4Th Edition.
T Cryptography and Network Security: Atul Kahate, Mc Graw Hill, 2nd Edition.
R Cryptography and Network Security by Behrouz A.Forouzan.
R Cryptography and network Security: Forouzan Mukhopadhyay, Mc Geaw Hill, 2nd
Edition.
R Information security, Principles and practice: Mar Stamp, wiley India
R Principles of computer security: WM. Arthur Conklin, Greg white TMH
R Introduction to Network Security: Neal Krawetz, CENGAGE Learning
R Network Security and Cryptography: Bernard Menezes

You might also like