IF4301 Information and Network Security Syllabus:

IF4301 Information and Network Security Syllabus – Anna University PG Syllabus Regulation 2021

COURSE OBJECTIVES:

 To introduce the concepts and models of security.
 To understand the risk assessment and security standard.
 To plan for business continuity and incident response plan.
 To estimate the level of security risk faced by an organisation and the countermeasures to handle the risk.
 To understand potential vulnerabilities and to develop a security blueprint.

UNIT I INFORMATION SECURITY

Introduction to Information Security – Security Issues – CIA Triad – Parkerian Hexad – Introduction to Security Attacks – Types of Attacks – Threats, Vulnerabilities, and Risk – Risk Management – Incident Response Identification – Access Controls – Identity Verification – Authentication – Multifactor Authentication – Mutual Authentication – Passwords – Biometrics – Hardware Tokens.

UNIT II FUNDAMENTALS OF CRYPTOGRAPHY

Foundations of Cryptology – Cipher Methods – Cryptographic Algorithms – Kerckhoffs’s Principles. Keyword Ciphers – One-Time Pads – Symmetric and Asymmetric Cryptography Techniques – Hash Functions – SHA – MD5 – Digital Signatures – Certificates – Modern Cryptographic Tools.

UNIT III INTRUSION DETECTION

Threat Models – Secure Communications – Intrusion Detection Systems – Intrusion Detection and Prevention Systems – Honeypots – Scanning and Analysis Tools – Traditional Reconnaissance and Attacks – Malicious Software – Preventive Measures – Intrusion Monitoring and Detection – Reactive Measures – Network-Based Intrusion Protection.

UNIT IV NETWORK SECURITY

Kerberos – IP Security – IP Security architecture – Key Management – Email Security – Pretty Good Privacy, S/MIME – Public Key Infrastructure – Traffic flow security – Firewalls – Design and Types of Firewalls – Personal Firewalls

UNIT V APPLICATION SECURITY

Software Development Vulnerabilities – Buffer Overflows – Race Conditions – Input Validation Attacks – Authentication Attacks – Authorization Attacks – Cryptographic Attacks – Web Security – Client-Side Attacks – Server-Side Attacks – Database Security – Protocol Issues – Unauthenticated Access – Arbitrary Code Execution – Privilege Escalation – Application Security Tools – Sniffers – Web Application Analysis Tools – Fuzzers

SUGGESTED ACTIVITIES:

1: In-class activity to learn about various security services and attacks.
2: Analyse risk for any real time applications and prepare a blueprint for security to control the risk.
3: Develop an attack success scenario and assess the potential damage.
4: Prepare the contingency planning documents for business continuity.
5: Discussion on scanning and analysis tools for identifying the vulnerabilities.

COURSE OUTCOMES:

After completing the course students will be able to
CO1: Apply the basic security models and policies required by the computing system.
CO2: Apply a cryptographic algorithm to build a secure application.
CO3: Monitor, detect and prevent intrusions in a network.
CO4: Predict the vulnerabilities in any computing system and propose a security solution.
CO5: Understand the importance of network security and risk management of an organization.

TOTAL :45 PERIODS

REFERENCES

1. Cryptography and Network Security : William Stallings, Pearson Education, 7th Edition
2. Security in Computing, Fifth Edition, by Charles P. Pfleeger, Pearson Education
3. Foundations of Information Security: A Straightforward Introduction, Jason Andress. No Starch Press, 2019
4. Fundamentals of information systems security, Kim, David, Solomon, and Michael G. Jones & Bartlett Learning, third edition, 2018
5. Information Security: Foundations, technologies and applications, Ali Ismail Awad, Michael Fairhurst. Institution of Engineering & Technology, 2018
6. Computer and Information Security Handbook, John R. Vacca. Morgan Kaufmann, 2017
7. Software-Defined Networking and Security, Dijiang Huang, Ankur Chowdhary, and Sandeep Pisharody. CRC Press, 2018