Friday, 27 January 2012

Fourth Week

In this week we covered hmmm nothing :P
  • DES (COMPLETED FIIINNNALLYYY !)
  • and TEST 1

Friday, 20 January 2012

Third Weeks Conclusion

In this week we covered the following topics:
  • We reviewed our previously studied algorithms
    • PlayFair and Hill Cipher
  • Vigenere Cipher
  • Verman Cipher
  • One Time Pad
  • Tranposition Techniques
  • Stagnography
  • Data Encryption Standard (contd)
Note: We are still on DES but try to review on your half as well so that no one can ask in class ECG kiya hota hai :P

Monday, 16 January 2012

Second Weeks Conclusion

In this week we covered the following topics:
  • Symmetric Ciphers
    • Monosubstitutional Ciphers
      • Ceasar Cipher
        • Breaking a mono substitutional cipher using language charecteristics.
    • Modular Arithmetic
    • Play Fair Cipher
    • Hill Cipher
      • The use of matrices

Thursday, 5 January 2012

First Weeks Conclusion

In this week we covered the following topics:
  • X.800 Security Architecture
    • Security Service
      • Authentication
      • Access Control
      • Data Confidentiality
      • Data Integrity
    • Security Attacks
      • Actice Attacks
      • Passive Attacks
    • Security Meshanism
      • Selective
        • Encipherment, Digital Signatures, Access Control, Routing Control, Data Integrity, Authentication Exchange, Traffic Padding, and Notarization
      • Pervasive
        • Trusted Functionality
        • Security Audit Trials
        • Disaster Recovery or Security Recovery
  • Malware
    • Viruses
    • Worms
    • Trojans
    • Hoax
    • Spyware
  • Anual Rate of Occurence ARO
  • Single Loss Expectensy SLE
  • Annual Loss Expectancy ALE

Sunday, 1 January 2012

Network Management and Security by Zohaib Jan

Hello everyone I welcome you all in our group of network mangement and security. We will sharing all the resources here and any updates on assignemtns and quizes will be posted here.

Reference Book is Cryptography and Network Security, William Stalling, 4th Edition, Prentice Hall

Course Contents are


Introduction to Information Security
Cryptography and Symmetric Ciphers
Public Key Encryption
Test 1, Key Management
Message Authentication
Hash Function, Digital Signature
Authentication Applications
Mid Term Examination
Electronic Mail Security
IPSec
Web Security
Systems Security
Network Management
Security Management
Assignments + Presentations