Professional Documents
Culture Documents
Network Security
Dr Muhammad Awais Azam
Lecture 1
Overview
About This Course
• Suggested Books
• Cryptography and Network security, Principles
and Practice; by William Stallings
• Cryptography: Theory and Practice; by Douglas
R. Stinson
• Any other referenced material
Grading and Others
• Assignment 20%
• Can be a group paper presentation
• Individual/Group Programming Assignment
• Quiz 20%
• Integrity
• Availability
Fundamentals of IT
Security
People
Processes
Technology
Course Contents
• Section-1
• Introduction
Ceaser cipher
World war-I & II
Ancient times to new Standards (DES, AES)
• Section-2
• The Threat Environment: Attackers & Attacks
Basic security terminology
Employee & Ex-Employee Threats
• Section-3
• Cryptography: Introduction
Definition and concepts
Steganography
Types of ciphers (substitutions & transposition)
Block & Stream ciphers
Symmetric vs Asymmetric Algorithms
Message Integrity
Digital Signatures
Public Key Infrastructure
Key Management
Email Security
Internet Security Standard
IPSec
• Section-4
• Network Security Topics
Enterprise Network Architecture
Firewall
System & Server Security
Web Application Security
Vulnerability & Penetration Testing
Other security measures …
Table 1.1
Threats and Attacks (RFC 4949)
Security Attacks
•A means of classifying security
attacks, used both in X.800 and
RFC 4949, is in terms of passive
attacks and active attacks