Sie sind auf Seite 1von 3

Birla Institute of Technology & Science, Pilani Work-Integrated Learning Programmes Division First Semester 2011-2012 Course Handout

Course No. Course Title Instructor Course Description The primary goal of the course is to introduce the student to system and application design aspects of network security including cryptographic, systemic and computational security aspects of the network / internetwork systems. Scope and Objectives The course covers fundamental aspects of security in a modern networked environment with the focus on system design aspects and cryptography in the specific context of network / internetwork security. It also dwells into basics of cryptographic techniques, algorithms and protocols required to achieve these properties; computational issues in implementing cryptographic protocols and algorithms; and system/application design issues in building secure networked systems. Prescribed Text Book T1. Stallings William, Cryptography and Network Security, Pearson Education, 4th Edition, 2006 : SS ZG513 : Network Security : Murali P, K Haribabu

Reference Books R1. R2. R3. Harrington, Jan L., Network Security: A Practical Approach, Morgan Kaufmann (Elsevier), 2005. Bruce Schneier, Applied Cryptography, Wiley Student Edition, 2nd Edition, 1996 Alfred Menezes, Paul van Oorschot, and Scott Vanstone: Handbook of Applied Cryptography. CRC Press, NY. C.Kauffman, R. Perlman and M.Spenser, Network Security, 2nd Edition, Prentice Hall, 2002. S.Bellovin and W.Chesvick: Internet Security and Firewalls, 2nd Ed., Addison-Wesley, 1998.

R4. R5.

SS ZG513 (Course Handout)


Plan of Self Study Week No. 1 2 Learning Objective

First Semester 2011-2012

Page 2

Topic(s) Introduction & Foundation Attacks - Services MechanismsModel of Network security.-OSI arichitecture Conventional Encryption - Classical and Modern Technique

Chapter Reference T1-Ch.1 T1-Ch.1

To learn the basic terminologies used

4 6 7

9 10 11 12

13 14

15

16

To learn how cryptographic T1-Ch.2 algorithms were written in the initial days To learn the basics of Block Block Ciphers And The Data T1-Ch.3 Ciphers in general: Encryption Standard -An example modern block Advanced Encryption Standard. T1-Ch.5 cipher - Some of the additional Contemporary Symmetric Ciphers & T1-Ch.6 & Ch.7 techniques used in the Confidentiality Using Symmetric development of symmetric Encryption ciphers To learn some of the basic Cryptography Theory and Related T1-Ch.4 mathematical back ground Mathematics essential for understanding cryptographic techniques To learn the basics of Public Key RSA - Elliptic Curve Cryptography T1-Ch.8 & Ch.9 cryptography Number Theory ConceptsSyllabus for Mid-Semester Test (Closed Book): Topics in Week No. 1 to 8 To learn the basics of key Key Management: Other Public Key T1-Ch.10 management Cryptosystems To learn about secure hashing Message Authentication And Hash T1-Ch.11 & Ch.12 and its applications Functions-Hash Algorithms. To learn about non-repudiation Digital Signatures And Authentication T1-Ch.13 techniques available Protocols To learn some of the current Authentication Applications T1-Ch.14 techniques used for Kerberos-X.509 Authentication authentication ServiceTo learn basics of secured email Electronic Mail Security T1-Ch.15 communication To understand the various Ip Security T1-Ch.16 security risks and some of the techniques used in the IP Layer To understand the various Web Security T1-Ch.17 security risks and some of the techniques used while using webbased services To understand the various System Security: Intrusion Detection T1-Ch.18, Ch.19 & techniques used in DMZ and Systems-Firewalls Ch.20 effectively understand how to protect a network deployment Syllabus for Comprehensive Exam (Open Book): All topics given in Plan of Self Study

SS ZG513 (Course Handout)

First Semester 2011-2012

Page 3

Evaluation Scheme:
EC No. EC-1 EC-2 EC-3 Evaluation Component & Type of Examination Assignment/Quiz Duration TBA 2 Hours 3 Hours Weightage 10% 30% 60% Day, Date, Session,Time TBA Saturday, 03/09/2011 (FN)* 10 AM 12 Noon Saturday, 29/10/2011 (FN)* 9 AM 12 Noon

Mid-Semester Test
(Closed Book)*

Comprehensive Exam
(Open Book)*

* Legend: AN: AfterNoon Session; FN: ForeNoon Session; TBA : To be announced

Closed Book Test: No reference material of any kind will be permitted inside the exam hall. Open Book Exam: Use of any printed / written reference material (books and notebooks) will be permitted inside the exam hall. Loose sheets of paper will not be permitted. Computers of any kind will not be allowed inside the exam hall. Use of calculators will be allowed in all exams. No exchange of any material will be allowed. Note: It shall be the responsibility of the individual student to be regular in maintaining the self study schedule as given in the course handout, attend the online/on demand lectures as per details that would be put up in the BITS WILP website www.bits-pilani.ac.in/dlp-home and take all the prescribed components of the evaluation such as Mid Semester Test and Comprehensive Examination according to the Evaluation Scheme given in the respective Course Handout. If the student is unable to appear for the Regular Test/Examination due to genuine exigencies, the student must refer to the procedure for applying for Make-up Test/Examination, which will be available through the Important Information link on the BITS WILP website on the date of the Regular Test/Examination. The Make-up Tests/Exams will be conducted only at selected exam centres on the dates to be announced later. Instructor-in-Charge

Das könnte Ihnen auch gefallen