Documente Academic
Documente Profesional
Documente Cultură
2 0 0 4 3
Prerequisite: -
Objectives:
To acquire the knowledge and technical skills for understanding and designing
Information Security techniques
Network security approaches
Expected Outcome:
Able to design the communication network for accessing information
with authentication and authorization .
Student Learning Outcomes (SLO): 1, 2, 5, 6, 7, 14, 17
Module 1 Introduction 3 Hours SLO: 1,2
Need of Security – OSI Security architecture – Security attacks – Security mechanisms – Model
for network security – Information security management lifecycle –Classical Techniques -
Substitution – Transposition
Reference Books:
1. Christof Paar and Jan Pelzl, “Understanding Cryptography – A Textbook for
Students and Practitioners”, Springer, 2014.
2. Behrouz A.Forouzan : Cryptography & Network Security – The McGraw Hill
Company, 2007.
3. Charlie Kaufman, Radia Perlman, Mike Speciner, Network Security: “Private
Communication in a public World”, PTR Prentice Hall, Second Ed ition,
2002.
4. http://ocw.mit.edu/courses/electrical -engineering-and-computer-science/6 -
857-network-and-computer-security -spring-2014/