You are on page 1of 2

unit-1

Security Attacks (Interruption, Interception, (Modification and Fabrication)


Security Services (Confidentiality, Authentication, Integrity, Non–Repudiation,
Access Control and Availability)
Mechanisms, A model for Inter network security
Internet Standards and RFCs

...................................................................................
....................................
unit-2
Conventional Encryption Principles,
Conventional encryption algorithms,

cipher block modes of operation,

location of encryption devices,


key distribution Approaches of Message Authentication,
Secure Hash Functions
HMAC

...................................................................................
....................................
unit-3
Public key cryptography principles
Public key cryptography algorithms
digital signatures
digital Certificates
Certificate Authority
key management Kerberos
X.509 Directory Authentication Service
Email Privacy
Pretty Good Privacy(PGP)
S/MIME

...................................................................................
........................................
unit-4
IP Security Overview
IP Security Architecture
Authentication Header
Encapsulating Security Payload
Combining Security Associations
Key Management

>>>>>>>>>>>>>>>>>>>>>>>
1.What parameters identify an SA and what parameters characterize the nature of a
particular SA?
2.Explain IPSec Authentication Header with a neat diagram.
3.Explain IPSec ESP Header with a neat diagram.
4.Explain the benefits of IPSec.
5.Explain the routing applications of IPSec.
6.Explain IPSec Document Overview with a neat diagram.
What are the services provided by IPSec? Explain.

-----------------------------------------------------------------------------------
--------------
unit-5
Web Security Requirements

Secure Socket Layer (SSL) and

Transport Layer Security (TLS)


Secure Electronic Transaction (SET)
Intruders
Viruses
related threats

-----------------------------------------------------------------------------------
--------------
unit-6
Firewall Design principles,

Trusted Systems
Intrusion Detection Systems

-----------------------------------------------------------------------------------
--------------

You might also like