CS 802D Credits: 3
Introduction [3] Attacks, Services, Mechanisms, Security Attacks, Security Services, Model for Network Security
Conventional Encryption and Message Confidentiality [8] Conventional Encryption Principles, Conventional Encryption Algorithms, Location of Encryption Devices, Key Distribution
Public Key Cryptography and Message Authentication [8] Approaches to Message Authentication, SHA-1, MD5, Public-Key Cryptography Principles, RSA, Digital Signatures, Key Management
Network Security Applications [4] Kerberos Motivation, Kerberos Version 4, PGP Notation, PGP Operational Description
IP Security [2] IP Security Overview, IP Security Architecture, Authentication Header
Web Security [7] Web Security Threats, Web Traffic Security Approaches, Overview of Secure Socket Layer and Transport Layer Security, Overview of Secure Electronic Transaction
Intruders and Viruses [4] Intruders, Intrusion Techniques, Password Protection, Password Selection Strategies, Intrusion Detection, Malicious Programs, Nature of Viruses, Types of Viruses, Macro Viruses, Antivirus Approaches
Firewalls [3] Firewall Characteristics, Types of Firewalls, Firewall Configuration
Text Books:
Network Security Essentials:Applications and standards:4th edition :William Stallings
Cryptography And Network Security By Atul Kahate
Cryptography And Network Security By Behrouz A. Forouzan
No comments:
Post a Comment