Security in Computing

Only available on StudyMode
  • Download(s) : 41
  • Published : March 15, 2011
Open Document
Text Preview
RT 801

1

Security in Computing

St. Joseph’s College of Engineering and Technology

RT 801 RT 801

2 SECURITY IN COMPUTING

Security in Computing 2+1+0

Module1 Introduction: Security basics – Aspects of network security – Attacks – Different types – Hackers – Crackers – Common intrusion techniques –Trojan Horse, Virus, Worm – Security services and mechanisms. Module 2 OS Security – Protection Mechanisms –Authentication & Access control – Discretionary and Mandatory access control – Authentication mechanisms – Official levels of computer security (DoD) - Security breaches – Concept of a hole - Types of a holes – Study of the security features for authentication, access control and remote execution in UNIX, WINDOWS 2000 Module 3 Cryptography: Basic Encryption & Decryption – Transposition & substitution ciphers – Caesar substitution – Polyalphabetic substitutions – Crypt analysis – Symmetric key algorithms – Fiestel Networks – Confusion – Diffusion – DES Algorithm – Strength of DES – Comparison & important features of modern symmetric key algorithms – Public key cryptosystems – The RSA Algorithm – Diffice Hellman key exchange – comparison of RSA & DES – Message Authentication & Hash functions – Digital signature Module 4 Network & Application Security: Kerberos – X509 Authentication service – IP security Architecture – Secure socket layer – Electronic mail security – Pretty Good privacy – S/MIME – secure Electronic Transactions – Firewalls - Security mechanisms in JAVA platform – Applet security – Security policy and Security Manager. Module 5 Database Security: - Security issues – SQL security DAC based on granting & revoking privileges – MAC for multilevel security – Statistical database security. Text Books 1. Module1, 4 Network Security Essentials Applications & Standards, William S., Pearson Education Asia 2. Module2 Modern operating System, Andrew S. Tanenbaum, Pearson Education Asia 3. Using JAVA 2 platform, Joseph L. Weber, Prentice Hall of India 4. Module3 Cryptography and network security principles and practice, William Stallings, Pearson Education Asia 5. Information theory coding and cryptography, Ranjan Bose, TMH 6. Module 4,5 Designing security Architecture Solutions, Jay Ramachandran, Wiley Dreamtech 7. Module5 Database Security Mechanisms for Computer Network, Sead Muftic, John wiles

St. Joseph’s College of Engineering and Technology

RT 801 References

3

Security in Computing

Security in Computing - Charles P. Pfleeger IEEE Computer Science Press Database Security Mechanisms for Computer Network- Sead Muftic, John wiles Designing Security Architecture Solutions – Jay Ramachandran, Wiley dreamtech Firewalls Complete - Marcus Gonsalvus, TMH Networking Technologies - Jaisal, Galgotia Publication Security in Computer Operating System - G.O.Shea, NCC Blackwell Manchester Oxford Mastering JAVA security: Cryptography, Algorithms and Architecture - Rich Helton, Wiley Dreamtech Implementing IPv6- Mark A. Miller P.E, IDG Books

1. 2. 3. 4. 5. 6. 7.

St. Joseph’s College of Engineering and Technology

RT 801

4

Security in Computing

MODULE 1

St. Joseph’s College of Engineering and Technology

RT 801

5

Security in Computing

Introduction: Security Basics – Aspects of network security – Attacks – Different Types – Hackers – Crackers – Common Intrusion Techniques - Trojan Horse – Virus – Worms – Security Services and Mechanism

Introduction
The information security has undergone two major changes with the evolution of computers. The need for automated tools for protecting information stored on the computer became evident. The collection of tools designed to protect data and to thwart hackers is computer security. The introduction of distributed systems and the use of networks and communications facilities for carrying data between terminal user and computer and between computer and computer leaded to network security.

Aspects of network security
The...
tracking img