0% found this document useful (0 votes)
128 views

AISE Syllabus

This document outlines the topics covered in 5 units on network security. Unit 1 introduces network security, security threats, types of attacks, intrusion detection systems, and risk management. Unit 2 covers public key cryptography, encryption algorithms like RSA and Diffie-Hellman, and digital signatures. Unit 3 discusses hash functions, authentication methods like Kerberos, and encryption protocols. Unit 4 examines malware like trojans, viruses, worms, and phishing attacks. Unit 5 looks at IP security, web security, firewalls, computer forensics, and hacking techniques. Suggested books on cryptography, network security, intrusion detection, and computer forensics are also provided.

Uploaded by

Shivam Chhabra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
128 views

AISE Syllabus

This document outlines the topics covered in 5 units on network security. Unit 1 introduces network security, security threats, types of attacks, intrusion detection systems, and risk management. Unit 2 covers public key cryptography, encryption algorithms like RSA and Diffie-Hellman, and digital signatures. Unit 3 discusses hash functions, authentication methods like Kerberos, and encryption protocols. Unit 4 examines malware like trojans, viruses, worms, and phishing attacks. Unit 5 looks at IP security, web security, firewalls, computer forensics, and hacking techniques. Suggested books on cryptography, network security, intrusion detection, and computer forensics are also provided.

Uploaded by

Shivam Chhabra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

UNIT 1 (8L)

Introduction to Network Security, Computer Securit y and Cyber Security. Security Terminologies and
Principle, Security Threats, Types of attacks (Operating System, application level, Shrink Wrap code,
Misconfiguration attacks etc.). Introduction to Intrusion, Terminologies, Intrusion Detection System
(IDS), Types of Intrusion Detection Systems, System Integrity Verifiers (SIVS).Indication of
Intrusion:
System Indications, File System Indications Network Indications. Intrusion Detection Tools ,Post
attack
IDS Measures & Evading IDS Systems. Penetration Testing, Categories of security assessments,
Vulnerability Assessment, Types of Penetration Testing. Risk Management.

UNIT 2 (8L)
Public key cryptography, Principles of Public key Cryptosystems, Cryptographic Algorithms
RSA,Digital
Signature: Analysis, Components, Method, Applications, Standard, Algorithm: Signature
Generation/Verification, ECDSA, EIgamal Signature Scheme, Digital Certificates. Data Encryption
Standard (DES), RC4, RC5, RC6, Blowfish, Key Management, Diffie-Hellman key exchange, elliptic
curve cryptography.

UNIT 3 (8L)
Hash Functions, One-way Hash Functions, SHA (Secure Hash Algorithm), Authentication
Requirements,
Authentication Functions, Kerberos. Message Authentication codes , Message Digest Functions,
MD5,
SSL (Secure Sockets Layer), SSH (Secure Shell), Algorithms and Security, Disk Encryption,
Government
Access to Keys (GAK)

UNIT 4 (8L)
Trojans and Backdoors: Overt and Covert Channels, Working, Types (Remote Access Trojans, DataSending Trojans, Destructive Trojans, Trojans, Proxy Trojans, FTP Trojans, Security Software
Disablers).
Viruses and Worms: Characteristics, Working, Infection Phase, Attack Phase.
Sniffers: Definition, spoofing, Sniffing, Vulnerable Protocols, Types.
Phishing: Methods, Process, Attacks Types (Man-in-the-Middle Attacks, URL Obfuscation Attacks,
Hidden Attacks, Client-side Vulnerabilities, Deceptive Phishing, Malware-Based Phishing, DNS
Based
Phishing, Content-Injection Phishing, Search Engine Phishing).

UNIT 5 (8L)
IP Security, Web Security, Firewalls: Types, Operation, Design Principles, Trusted Systems. Computer
Forensics, Need, Objectives,Stages & Steps of Forensic Investigation in Tracking Cyber Criminals,
Incident Handling. Hacking, Classes of Hacker (Black hats, grey hats, white hats, suicide hackers),
Footprinting, Scanning (Types-Port, Network, Vulnerability), E-Mail Spiders, Overview of System
Hacking Cycle.

SUGGESTED BOOKS:
1. William Stallings, Cryptography and Network Security: Principles and Practice Pearson
2. Charlie Kaufman, Radia Perlman, Mike Speciner, Michael Speciner, Network Security Private communication in a public world TMH
3. Fourozon, Cryptography & Network Security TMH
4. Joseph Migga Kizza, Computer Network Security, , Springer International Edition
5. Atul Kahate,Cryptography and Network Security Mc Graw Hill
6. Carl Endorf, Eugene Schultz, Jim Mellander INTRUSION DETECTION & PREVENSION
TMH
7. Neal, Krawetz, Introduction to Network Security, Cengage Learning

You might also like