Information security hand written notes

INFORMATION SECURITY Credit : 3
1.Introduction, CRYPTO BASICS :Classic Crypto, Simple Substitution Cipher,, Cryptanalysis of a simple
substitution, Double Transposition Cipher, One-time Pad, Project VENONA, Codebook Cipher.
2.SYMMETRIC KEY CRYPTO :Stream Ciphers, A5/1, RC4, Block Ciphers, Fiestel Cipher, DES, Triple DES,
AES.
3.PUBLIC KEY CRYPTO :Knapsack, RSA, Diffie-Hellman, Uses for Public Key Crypto.
4.HASH FUNCTION :

AUTHENTICATION : Authentication Methods, Keys versus Passwords, Biometrics, Two-Factor

Authentication.
AUTHORIZATION :Access Control Matrix, Multilevel Security Models, Firewalls, Intrusion Detection.
5.SOFTWARE FLAWS AND MALWARE :Software Flaws, Malware, Miscellaneous Software-Based Attacks.
6.OPERATING SYSTEM AND SECURITY :Operating System Security Functions, Trusted Operating System,
Next Generation Secure Computing Base.
Text Book :
(1)Information Security Principles & Practices by Mark Stamp, Wiley.
Reference Books :
(1)Introduction to Computer Security by Bishop and Venkatramanayya, PearsonEducation.

Download PDF notes :- click here

Leave a Reply

Your email address will not be published. Required fields are marked *