sszg513

Upload: tejpal-singh

Post on 06-Apr-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 sszg513

    1/3

    Birla Institute of Technology & Science, Pilani

    Work-Integrated Learning Programmes Division

    First Semester 2011-2012

    Course Handout

    Course No. : SS ZG513

    Course Title : Network Security

    Instructor : Murali P, K Haribabu

    Course Description

    The primary goal of the course is to introduce the student to system and application design aspects of

    network security including cryptographic, systemic and computational security aspects of the network /

    internetwork systems.

    Scope and Objectives

    The course covers fundamental aspects of security in a modern networked environment with the focus on

    system design aspects and cryptography in the specific context of network / internetwork security. It alsodwells into basics of cryptographic techniques, algorithms and protocols required to achieve these properties;

    computational issues in implementing cryptographic protocols and algorithms; and system/application design

    issues in building secure networked systems.

    Prescribed Text Book

    T1. Stallings William, Cryptography and Network Security, Pearson Education, 4th Edition, 2006Reference Books

    R1. Harrington, Jan L., Network Security: A Practical Approach, Morgan Kaufmann (Elsevier), 2005.R2. Bruce Schneier, Applied Cryptography, Wiley Student Edition, 2nd Edition, 1996R3. Alfred Menezes, Paul van Oorschot, and Scott Vanstone: Handbook of Applied Cryptography. CRC

    Press, NY.

    R4. C.Kauffman, R. Perlman and M.Spenser, Network Security, 2nd Edition, Prentice Hall, 2002.R5. S.Bellovin and W.Chesvick: Internet Security and Firewalls, 2nd Ed., Addison-Wesley, 1998.

  • 8/3/2019 sszg513

    2/3

    SS ZG513 (Course Handout) First Semester 2011-2012 Page 2

    Plan of Self Study

    Week

    No.

    Learning Objective Topic(s) Chapter Reference

    1 Introduction & Foundation T1-Ch.1

    2

    To learn the basic terminologies

    used Attacks - Services Mechanisms-

    Model of Network security.-OSIarichitecture

    T1-Ch.1

    3 To learn how cryptographic

    algorithms were written in the

    initial days

    Conventional Encryption - Classical

    and Modern Technique

    T1-Ch.2

    4 To learn the basics of Block

    Ciphers in general:

    Block Ciphers And The Data

    Encryption Standard

    T1-Ch.3

    6 -An example modern block

    cipher

    Advanced Encryption Standard. T1-Ch.5

    7 - Some of the additionaltechniques used in the

    development of symmetric

    ciphers

    Contemporary Symmetric Ciphers &Confidentiality Using Symmetric

    Encryption

    T1-Ch.6 & Ch.7

    5 To learn some of the basic

    mathematical back ground

    essential for understanding

    cryptographic techniques

    Cryptography Theory and Related

    Mathematics

    T1-Ch.4

    8 To learn the basics of Public Key

    cryptography

    RSA - Elliptic Curve Cryptography -

    Number Theory Concepts-

    T1-Ch.8 & Ch.9

    Syllabus for Mid-Semester Test (Closed Book): Topics in Week No. 1 to 8

    9 To learn the basics of keymanagement

    Key Management: Other Public KeyCryptosystems

    T1-Ch.10

    10 To learn about secure hashing

    and its applications

    Message Authentication And Hash

    Functions-Hash Algorithms.

    T1-Ch.11 & Ch.12

    11 To learn about non-repudiationtechniques available

    Digital Signatures And AuthenticationProtocols

    T1-Ch.13

    12 To learn some of the current

    techniques used for

    authentication

    Authentication Applications

    Kerberos-X.509 Authentication

    Service-

    T1-Ch.14

    13 To learn basics of secured email

    communication

    Electronic Mail Security T1-Ch.15

    14 To understand the various

    security risks and some of the

    techniques used in the IP Layer

    Ip Security T1-Ch.16

    15 To understand the various

    security risks and some of the

    techniques used while using web-based services

    Web Security T1-Ch.17

    16 To understand the various

    techniques used in DMZ and

    effectively understand how to

    protect a network deployment

    System Security: Intrusion Detection

    Systems-Firewalls

    T1-Ch.18, Ch.19 &

    Ch.20

    Syllabus for Comprehensive Exam (Open Book): All topics given in Plan of Self Study

  • 8/3/2019 sszg513

    3/3

    SS ZG513 (Course Handout) First Semester 2011-2012 Page 3

    Evaluation Scheme:

    EC No. Evaluation Component &

    Type of Examination

    Duration Weightage Day, Date, Session,Time

    EC-1 Assignment/Quiz TBA 10% TBA

    EC-2 Mid-Semester Test

    (Closed Book)*

    2 Hours 30% Saturday, 03/09/2011 (FN)*

    10 AM 12 NoonEC-3 Comprehensive Exam

    (Open Book)*

    3 Hours 60% Saturday, 29/10/2011 (FN)*

    9 AM 12 Noon

    * Legend:

    AN: AfterNoon Session; FN: ForeNoon Session; TBA : To be announced

    Closed Book Test: No reference material of any kind will be permitted inside the exam hall.

    Open Book Exam: Use of any printed / written reference material (books and notebooks) will be permitted inside the

    exam hall. Loose sheets of paper will not be permitted. Computers of any kind will not be allowed inside the exam hall.

    Use of calculators will be allowed in all exams. No exchange of any material will be allowed.

    Note:It shall be the responsibility of the individual student to be regular in maintaining the self study schedule as given in the

    course handout, attend the online/on demand lectures as per details that would be put up in the BITS WILP website

    www.bits-pilani.ac.in/dlp-home and take all the prescribed components of the evaluation such as Mid Semester Test

    and Comprehensive Examination according to the Evaluation Scheme given in the respective Course Handout. If the

    student is unable to appear for the Regular Test/Examination due to genuine exigencies, the student must refer to the

    procedure for applying for Make-up Test/Examination, which will be available through the Important Information

    link on the BITS WILP website on the date of the Regular Test/Examination. The Make-up Tests/Exams will be

    conducted only at selected exam centres on the dates to be announced later.

    Instructor-in-Charge