Tuesday, 12 March 2013

Network Security study guide for WBUT CSE students

blogger counter | dedicated server



Here  I would try to help those CSE students of WBUT,Kolkata who are preparing for their 8th semester Network Security paper which is an elective and obviously one of the most interesting subjects for CSE students.
Here I would recommend  3 books if you wish to study Network Security in accordance with the prescribed WBUT syllabus:

1.Network Security Essentials :William Stallings 4th Edition <WBUT Syllabus is set according to the contents of this book but this text book is not for beginners >


2.Cryptography and Network Security :Atul Kahate Second Edition <Best book for beginners and I would recommend every student to thoroughly go through the chapters in accordance with the WBUT syllabus>


3. Cryptography and Network Security:Behrouz A. Forouzan Tata McGraw Hill<Special Indian Edition 2007>

Now I would give you a comprehensive  study guide  regarding the topics from the WBUT syllabus and the corresponding books from which you can study them for your exam purposes.


1.Module 1:Introduction [3]

Attacks, Services, Mechanisms, Security Attacks, Security Services, Model for Network Security

These topics are explained lucidly in Forouzan Chapter 1.1,1.2,1.3,1.4 and William Stallings Chapter 1.6.Read them in detail and the first module of your syllabus is over.


2.Module 2:Conventional Encryption and Message Confidentiality [8] 

Conventional Encryption Principles,  Conventional Encryption Algorithms, Location of Encryption Devices, Key Distribution.


Read from Atul Kahate 
chapter 2.1,2.2,2.3(2.3.1,2.3.2,2.3.3,2.3.4,2.3.5,2.3.6,2.3.7,2.3.8),2.4(2.4.1,2.4.2,2.4.3,2.4.4),2.5,2.6(2.6.1,2.6.2),2.7,2.8,2.9


Module 3:Public Key Cryptography and Message Authentication [8] 

Approaches to Message Authentication,        SHA-1, MD5, Public-Key Cryptography Principles, RSA, Digital Signatures, Key Management

Read from Atul Kahate 
chapter 3.2(3.2.1,3.2.2),3.3,3.4(3.4.1,3.4.2,3.4.3),4(4.2,4.3,4.4.1,4.4.2,4.4.3,4.5.1,4.5.2,4.6.1,4.6.2,4.6.3,4.6.4)


Network Security Applications [4]

Kerberos Motivation, Kerberos Version 4, PGP Notation, PGP Operational Description  
Read from Atul Kahate 
chapter 
6.11.3,7.7(7.7.2,7.7.3)


                    
                                                                                        TO BE CONTINUED...
                                                                                          Regards Anirban Basu
                                                                                          8017204158










1 comment:

  1. Thanks for sharing this is such a very nice post i really like it your blog.

    Network Security

    ReplyDelete