(CS 05317) INFORMATION SECURITY  UNIT I  Security  Attacks  (Interruption,  Interception,  Modification  and  Fabrication).  Security  Services  (Confidentially,  Authentification,  Integrity,  Non­repudiation,  access  Control  and  Availability)  and  Mechanisms, A model for internet work security, Internet Standards and RFCs, Buffer overflow &  format string vulnerabilities, TCP session hijacking, ARP attacks, route  table modification, UDP  hijacking and man in the middle attacks.  UNIT II  Conventional  Encryption  Principles,  Conventional  encryption  algorithms,  cipher  block  modes  of  operations  location  of  encryption  devices,  key  distribution.    Approaches  of  Message  Authentication, Secure Hash Functions and HMAC.  UNIT III  Public key cryptography principles, public key cryptography algorithms, digital signatures, digital  certificates, Certificates Authority and key management Kerberos, X 509 Directory Authentication  Service.  UNIT IV  E mail privacy: Pretty Good Privacy (PGP) and S/MIME.  UNIT V  IP  Security  Overview,  IP  Security  Architecture,  Authentication  Header,  Encapsulating  Security  Payload, Combining Security Associations and key management.  UNIT VI  Web  Security  Requirements,  Secure  Socket  Layer  (SSL)  and  Transport  Layer  Security  (TLS),  Secure Electronic Transaction (SET).  UNIT VII  Basic concepts of SNMP, SNMPv1 Community facility and SNMPv3.  Intrusion, Viruses and related threats.  UNIT VIII  Firewall Design principles, Trusted Systems.  Instrusion  Detection Systems.  TEXT BOOKS:  1.  Network  Security  Essentials  (Applications  and  Standards)  by  William  Stallings  Pearson  Education.  2.  Hack  Proofing  your  network  by  Ryan  Russell,  Dan  Kaminsky,  Rain  Forest  Puppy,  Joe  Grand,  David  Ahmad,  Hal  Flynn  Ido  Dubrawsky,  Steve  W.Manzuik  and  Ryan  Permeh,  Wiley Dreamtech.  REFERENCES:  1.  Fundamentals of Network Security by Eric Maiwald (Dreamtech press)  2.  Network  Security­Private  Communication  in  a  public  World  by  Charlie  Kaufman,  Radia  Perlman and Mike Speciner, Pearson/PHI.  3.  Cryptography and network Security, Third edition, Stallings, PHI/Pearson.  4.  Principles of Information Security, Whitman, Thomson.  5.  Network Security: The complete reference, Robert Bragg, Mark Rhodes, TMH.  6.  Introduction to Crytography, Buchmann, Springer.

INFORMATION SECURITY UNIT I Security Attacks

(CS 05317) INFORMATION SECURITY. UNIT I. Security ... (Confidentially, Authentification, Integrity, Nonrepudiation, access Control and Availability) and.

51KB Sizes 2 Downloads 200 Views

Recommend Documents

INFORMATION SECURITY UNIT I Security Attacks
(CS 05317) INFORMATION SECURITY. UNIT I. Security ... Network Security Essentials (Applications and Standards) by William Stallings Pearson. Education. 2.

Information Security and Acceptable Use Security Policy.pdf ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Information ...

1499499175335-detective-security-essentials-information ...
1499499175335-detective-security-essentials-information-safekeeping.pdf. 1499499175335-detective-security-essentials-information-safekeeping.pdf. Open.

Information Security and Acceptable Use Security Policy.pdf ...
Page 2 of 15. Published 6/30/2016 2. Information Security Office. Education - Partnership - Solutions. District organizational expectations for responsible use of ...

PDF Information Security
Jun 14, 2014 - business environments. They offer ... from cloud services to mobile applications, “Bring Your ... maximize security -- Plan for business continuity ...

pdf-1414\android-security-attacks-and-defenses.pdf
... publications Android Security: Attacks And. Defenses can be a terrific problem for your life. Page 3 of 6. pdf-1414\android-security-attacks-and-defenses.pdf.

Security Challenges and Attacks in Vehicular Ad hoc ...
DOS attack will occur by jam the channel system so no authentic vehicle will access it.In VANET it's most major problem because the user cannot communicate within the network and pass data to other vehicle that could result in a lot of devastation in

types of attacks in network security pdf
types of attacks in network security pdf. types of attacks in network security pdf. Open. Extract. Open with. Sign In. Main menu.