Security trends - Legal, Ethical and Professional Aspects of Security, Need for Security at Multiple levels, Security Policies - Model of network security – Security attacks, services and mechanisms – OSI security architecture Introduction to Cyber Threats-Cyber Warfare, Cyber Crime, Cyber terrorism, Cyber Espionage. Comprehensive Cyber Security Policy
Classical encryption techniques: substitution techniques, transposition techniques, steganography. Euclid’s algorithm and Extended Euclid’s algorithm- Congruence SYMMETRIC KEY CIPHERS: Data Encryption Standard –Advanced Encryption Standard - RC4 – Key distribution.
MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing – Factorization – Euler’s totient function, Fermat’s and Euler’s Theorem - Chinese Remainder Theorem. ASYMMETRIC KEY CIPHERS: RSA cryptosystem– Key management – Diffie Hellman key exchange - ElGamal cryptosystem – Elliptic curve arithmetic-Elliptic curve cryptography.
MAC – Hash function – Security of hash function and MAC, DSS, Cyber Victimization, Cyber Security Vulnerabilities and Cyber Security Safeguards: Cyber Security Vulnerabilities – Overview, vulnerabilities in software, System administration, Complex Network Architectures, Open Access to Organizational Data, Weak Authentication, Poor Cyber Security Awareness
Cyber Security Safeguards – Overview, Access control, Authentication, Biometrics, Passwords -Phishing, Cryptography, Ethical Hacking, Firewalls, Intrusion Detection Systems, Incident Response, Scanning, Security policy, Threat Management. Security services: Electronic Mail security – PGP, S/MIME
Reference Book:
1.C K Shyamala, N Harini and Dr. T R Padmanabhan: Cryptography and Network Security, Wiley India Pvt.Ltd. 2.BehrouzA.Foruzan, Cryptography and Network Security, Tata McGraw Hill 2007. 3.Stefan Beissel, “Cybersecurity Investments – Decision Support Under Economic Aspects”, Springer, 2016. 4.Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: PRIVATE Communication in a PUBLIC World, Prentice Hall, ISBN 0-13-046019-2
Text Book:
William Stallings, Cryptography and Network Security: Principles and Practice, PHI 3rd Edition, 2006.