10.07.2015 Views

B.Tech. Degree Programme Computer Science & Engineering

B.Tech. Degree Programme Computer Science & Engineering

B.Tech. Degree Programme Computer Science & Engineering

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Lingaya’s University, Faridabad7. Baxenavis Andreas and Ouellette B. F. Francis(eds), “Bioinformatics: A Practical Guide to theAnalysis of Genes and Proteins”, John Wiley, 1998WEB REFERENCES1. http://bioinfo.ernet.in/2. http://www.ibioinformatics.org/3. http://www.bioinfbook.org/4. http://www.bioplanet.com/bioinformatics_tutorial.htmIT-441NETWORK SECURITY & L T P CrMANAGEMENT 5 0 0 3OBJECTIVEThe main objective behind this course is to learn aboutthe various network attacks and preventing attacks.This course is designed to cover Application security,Operating system security, Network security, Websecurity etc.PRE-REQUISITESKnowledge of data communications and computernetworks, computer programming, data structures,mathematics, telecom network. Knowledge of digitalsignal processing is desirable1. INTRODUCTION: Codes and ciphers; someclassical systems; statistical theory of ciphersystems: complexity theory of crypto systems;stream ciphers, block ciphers.2. STREAM CIPHERS: Rotor based system; shiftregister based systems; design considerationsfor stream ciphers, crypt-analysis of streamciphers; combined encryption and encoding;block ciphers: DES and variant, modes of use ofDES; public key systems: knapsack systems,RSK, Diffie Hellman exchange; authenticationand digital signatures; elliptic curve basedsystems.3. SYSTEM IDENTIFICATION AND CLUSTERING:Cryptology of speech signals: narrow band andwide band systems; analogue and digital Systemsof speech encryption.4. SECURITY: HASH FUNCTION –AUTHENTICATION: Protocols; digital signaturestandards; electronic mail security: PGP (PrettyGood Privacy), MIME; data compressiontechnique; IP security: architecture, authenticationleader, encapsulating security; payload: keymanagement; web security: secure socket layer &transport layer security, secure electronicstransactions; firewalls design principle; establishedsystems.5. TELECOMMUNICATION NETWORKARCHITECTURE: TMN management layers,management information model; managementservicing and functions; structure of managementinformation and TMN information model; SNMP v1,SNMP2 & SNMP3, RMON1 & 2; BroadbandNetwork Management (ATM, HFC, DSL); ASN6. SECURITY IN NETWORKS: Threats in networks,Network security control, Firewalls, Intrusiondetection systems, Secure e-mail, Networks andcryptography, Example protocols: PEM, SSL,IPsec, Administrating Security: Securityplanning, Risk analysis, Organizational securitypolicies, Physical security.7. LEGAL, PRIVACY, AND ETHICAL ISSUES INCOMPUTER SECURITY: Protecting program anddata; information and law; rights of employees andemployers; software failures; computer crime,privacy; ethical issues in computer society; casestudies of ethicsTEXT BOOKStallings William, “Cryptography and Network Security”,4th Edition, Prentice-Hall, Englewood Cliffs, 2006REFERENCE BOOKS1. “Cryptography and Network Security: Principal &Practices”, 3rd Edition, Prentice Hall of India, 20022. Mani Subramanian, “Network ManagementPrinciples & Practices”, Addison Wesley, 19993. Burke J. Richerd, “Network Management Conceptsand Practice A Hand-on Approach, PearsonEducation, Reprint 20044. Kauffman C., Perlman R. and Spenser M.,“Network Security”, 2nd Edition, Prentice Hall,2002.5. Stallings William, “SNMP”, Addison Wesley, 19996. “SNMP: A Guide to Network Management”,McGraw Hill, 20057. Wang H. H., “Telecom Network Management”, 3rdEdition, McGraw Hill, 19978. Dlack U., “Network Management”, 3rd Edition,McGraw Hill, 19979. Menezes Alfred, van Oorschot Paul, and VanstoneScott, “Handbook of Applied Cryptography”, CRCPress, NY, 2004.10. Bellovin S. and Chesvick W., “Internet Security andFirewalls”, 2nd Edition, Addison Wesley, 1998.11. Schneier Bruce, “Applied Cryptography”, WileyStudent Edition, 2nd Edition, Singapore, 1996.WEB REFERENCES1. www.londonexternal.ac.uk2. crypto.stanford.edu/cs155/3. www.skillstrainuk.com/network-security4. www.networkcomputing.com5. www.foundstone.com/us/resources-free-tools.aspIT-442INFORMATION SECURITYL T P Cr5 0 0 3OBJECTIVETo impart knowledge about the information securitytools, techniques, procedures, standards, etc. that areessential for protection of information in an organization1. INTRODUCTION TO COMPUTER SECURITY:Protocols; passwords; access control; distributedsystems security; multilevel security; multilateralsecurity; monitoring systems; biometrics; physicaltamper resistance; network attack and defense;protecting e-commerce systems; copyright andprivacy protection.2. CRYPTOGRAPHY: Basic mathematicalbackground to cryptography; symmetric andasymmetric cryptographic algorithms; hashes;63

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!