|
|
Venue: |
SIC 201, 2nd Floor, KReSIT, IITBombay
|
Timings: |
Monday
|
3:30pm - 5:00pm
|
Thursday
|
3:30pm - 5:00pm
|
|
Please subscribe to
course mailing list
All further announcements will be conveyed over this mailing list as well as on moodle.
|
Marks distribution :
Homework : 5-10 Marks End sem : 45-50 Marks 3 Quizzes : (15 Marks each)
Audit Students can give any 2 quizes out of 3 to pass the course. They might have to give endsem as well which will depend on their
performance in 2 quizes.
Course Contents
- Introduction
- Threats, Vulnerabilities, Attacks
- Data Integrity, Confidentiality, Anonymity
- Message and Entity Authentication
- Authorization, Non-repudiation
- Symmetric Key Cryptography
- DES, Triple DES
- AES
- Key distribution
- Attacks
- Public Key Cryptography
- Integrity, Authentication and Non-Repudiation
- Hash Functions (Examples - MD5, SHA5) : Properties and implementation
- Message Authentication Code (MAC)
- Digital Signature (RSA, DSA Signatures)
- Public Key Infrastructure
- Digital Certificates
- Certifcation Authorities
- Key Exchange
- Discrete Logarithm Problem
- Diffie-Hellman Key Exchange
- Attacks
- Protocols
- Basic Authentication Protocols
- Attacks(Replay, Reflection, Man-in-the-middle)
- Needham Schroeder Protocol
- Kerberos
- Security Protocols
- Network Security with IPSec
- SSL/TSL
- Software Vulnerabilities
- Buffer Overflow
- Cross Site Scripting
- SQL Injection
- Case Studies worms and viruses
- E-mail Viruses
- Internet worms
- Mobile viruses
- e.g. Sammy, Blaster, Code Red, Slammer, email melissa etc.
- Attacks
- Attacks on DNS
- Phishing and Pharming
- Denial of Service (DoS and DDoS)
- Different kinds of Firewalls
- Intrusion detection system (Host based and Network based)
- Honeypots
|