Download/Source url :
http://www.youtube.com/watch?v=0QLRULNfbFg&feature=player_embedded
By Prof. S. Ghosh,Department of Computer Science & Engineering, I.I.T.,Kharagpur.
INFORMATION SECURITY SYLLABUS :
Source :http://jntuk.edu.in
UNIT - I
Security Attacks (Interruption, Interception, Modification and Fabrication), Security Services
(Confidentiality, Authentication, Integrity, Non-repudiation, access Control and Availability) and
Mechanisms, A model for Internetwork security, Internet Standards and RFCs, Buffer overflow & format
string vulnerabilities, TCP session hijacking, ARP attacks, route table modification, UDP hijacking, and
man-in-the-middle attacks.
UNIT - II
Conventional Encryption Principles, Conventional encryption algorithms, cipher block modes of operation,
location of encryption devices, key distribution Approaches of Message Authentication, Secure Hash
Functions and HMAC.
UNIT - III
Public key cryptography principles, public key cryptography algorithms, digital signatures, digital
Certificates, Certificate Authority and key management Kerberos, X.509 Directory Authentication Service.
UNIT - IV
Email privacy: Pretty Good Privacy (PGP) and S/MIME.
UNIT - V
IP Security Overview, IP Security Architecture, Authentication Header, Encapsulating Security Payload,
Combining Security Associations and Key Management.
UNIT - VI
Web Security Requirements, Secure Socket Layer (SSL) and Transport Layer Security (TLS), Secure
Electronic Transaction (SET).
UNIT - VII
Basic concepts of SNMP, SNMPv1 Community facility and SNMPv3.
Intruders, Viruses and related threats.
UNIT - VIII
Firewall Design principles, Trusted Systems. Intrusion Detection Systems.
TEXT BOOKS :
1. Network Security Essentials (Applications and Standards) by William
Stallings Pearson Education.
2. Hack Proofing your network by Ryan Russell, Dan Kaminsky, Rain Forest
Puppy, Joe Grand, David Ahmad, Hal Flynn Ido Dubrawsky, Steve
W.Manzuik and Ryan Permeh, wiley Dreamtech
REFERENCES :
1. Fundamentals of Network Security by Eric Maiwald (Dreamtech press)
2. Network Security - Private Communication in a Public World by Charlie
Kaufman, Radia Perlman and Mike Speciner, Pearson/PHI.
3. Cryptography and network Security, Third edition, Stallings, PHI/Pearson
4. Principles of Information Security, Whitman, Thomson.
5. Network Security: The complete reference, Robert Bragg, Mark Rhodes,
TMH
6. Introduction to Cryptography, Buchmann, Springer.
ReplyDeleteشركة نقل عفش
اهم شركات مكافحة حشرات بالخبر كذلك معرض اهم شركة مكافحة حشرات بالدمام والخبر والجبيل والخبر والاحساء والقطيف كذلك شركة رش حشرات بالدمام ومكافحة الحشرات بالخبر
شركة مكافحة حشرات بالدمام
شركة تنظيف خزانات بجدة الجوهرة من افضل شركات تنظيف الخزانات بجدة حيث ان تنظيف خزانات بجدة يحتاج الى مهارة فى كيفية غسيل وتنظيف الخزانات الكبيرة والصغيرة بجدة على ايدى متخصصين فى تنظيف الخزانات بجدة
شركة تنظيف خزانات بجدة
شركة كشف تسربات المياه بالدمام
شركة نقل عفش واثاث
ReplyDeleteشركة نقل عفش بخميس مشيط
شركة نقل عفش بالقصيم
شركة نقل عفش بتبوك
شركة نقل عفش بابها
شركة نقل عفش بنجران
شركة نقل عفش بحائل
Mua vé tại Aivivu, tham khảo
ReplyDeletemua ve may bay di my
vé máy bay đi hà nội tháng 9
vé máy bay hà nội sài gòn tháng 2
vé máy bay đi nha trang hôm nay
có vé máy bay từ mỹ về việt nam chưa
taxi sân bay hà nội giá rẻ
combo quy nhơn flc