IS Course
IS Course
IT AR20 Regulation
Course Objectives:
Develop ability to
UNIT I
Security Concepts: Security Attacks (Interruption, Interception, Modification and Fabrication),
Security Services (Confidentiality, Authentication, Integrity, Non-repudiation, access Control
and Availability) and Mechanisms, A model for Internetwork security, Internet Standards and
RFCs, Distributed Denial of Service Attacks. TCP session hijacking, ARP attacks, route table
modification, UDP hijacking, and man-in- the-middle attacks. Buffer overflow & format string
vulnerabilities.
UNIT II
Malware Analysis: Viruses, Worms, goals of Malware Analysis, AV Scanning, Hashing,
Finding Strings, Packing and Obfuscation, PE file format, Static, Linked Libraries and
Functions, Static Analysis tools, Virtual Machines and their usage in malware analysis,
Sandboxing, Basic dynamic analysis, Malware execution, Process Monitoring, Viewing
processes, Registry snapshots.
UNIT III
Android Malware Analysis: Android architecture, App development cycle, APK Tool, APK
Inspector, Dex2Jar, JD-GUI, Static and Dynamic Analysis, Case studies. IP Security: IP
Security overview, IP Security architecture, Authentication Header, encapsulating security
payload, combining, security associations, Internet Key Exchange.
UNIT IV
Transport-level Security: Web security considerations, Secure Socket Layer, Transport Layer
Security and Secure Shell (SSH). E-Mail Security: Pretty Good Privacy, S/MIME
UNIT V
SNMP: Basic concepts of SNMP, SNMPv1 Community facility and SNMPv3., Digital
envelope, Digital Signature, SET protocol, Digital Certificate. Firewalls and Intrusion Detection
Systems: Intrusion Detection Password Management, Firewall Characteristics Types of
Firewalls, Firewall Basing, Firewall Location and Configurations.
TEXT BOOK(S)
1. Cryptography and Network Security Principles and Practice: William Stallings,
Pearson Education, Seventh Edition,2017.
2. Practical Malware Analysis by Michael Sikorski and Andrew Honig, First
Edition,2012.
REFERENCE BOOK(S)
1. Cryptography and Network Security: C K Shyamala, N Harini, Dr. T R
Padmanabhan, Wiley India, First Edition,2011.
2. Information Security, Principles and Practice: Mark Stamp, Wiley India, Second
Edition,2011.
3. Principles of Computer Security: WM Arthur Conklin, Greg White, TMH, Fourth
Edition,2016.
4. Introduction to Network Security: Neal Krawetz, CENGAGE Learning, First
Edition,2007.