Professional Documents
Culture Documents
Information Security
Information Security
Unit-1:
Security attacks (interruption, interception, modification and fabrication),
security services (confidentiality, authentication, integrity, non-repudiation,
access control and availability) and mechanisms, a model for inter network
security, internet standards and rfcs, buffer overflow & format string
vulnerabilities, tcp session hijacking, attacks, route table modification, udp
hijacking, and man-in-the-middle attacks.
Unit-2:
Conventional encryption principles, conventional encryption algorithms, cipher
block modes of operation, location of encryption devices, key distribution
approaches of message authentication, secure hash functions and hmac,Cipher
Text,Decryption Algorithm.
Unit-3:
Electronic Code book Book (ECB),Cipher Block Chaining Mode (CBC),Output
Feedback Mode (OFB),Counter Mode (CTR),Message Authentication,Message
Encryption,Message Authentication Code,Hash Function,MD5 Message Digest
Algorithm.
Unit-5:
Internet Protocol security (IP Sec) is a framework of open standards for
protecting communications over Internet Protocol (IP) networks through the use
of cryptographic security services. IPSec supports network-level peer
authentication, data origin authentication, data integrity, data confidentiality
(encryption), and replay protection.
Unit-6:
Web security requirements, secure socket layer (SSL) and transport layer
security (TLS),
secure electronic transaction (SET),Web Traffic Security Approaches,SSL
Record Protocol,SSL Change Cipher Spec Protocol.