Unit I Attacks on Computers and Computer Security Introduction, The need for security, Security approaches, Principles of security, Types of Security attacks, Security services, Security Mechanisms, A model for Network Security. (Chapter - 1) Unit II Cryptography - Concepts and Techniques Introduction, plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography, stenography, key range and key size, possible types of attacks. (Chapter - 2) Unit III Symmetric and Asymmetric key for Ciphers Block Cipher principles & Algorithms (DES, AES, Blowfish), Differential and Linear Crypt analysis, Block cipher modes of operation, Stream ciphers, RC4, Location and placement of encryption function, Key distribution, Asymmetric key Ciphers, Principles of public key crypto systems, Algorithms (RSA, Diffie-Hellman, ECC), Key Distribution. (Chapter - 3) Unit IV Message Authentication Algorithms and Hash Functions Authentication requirements, Functions, Message authentication codes, Hash Functions, Secure hash algorithm, HMAC, CMAC, Digital signatures, knapsack algorithm, Authentication Applications such as Kerberos, X.509 Authentication Service, Public - Key Infrastructure, Biometric Authentication. (Chapter - 4) Unit V E-Mail Security Pretty Good Privacy, S/MIME, IP security overview, IP Security architecture, Authentication Header, Encapsulating , Security payload, Combining security associations, Key management. (Chapter - 5) Unit VI Web Security Web security considerations, Secure Socket Layer and Transport Layer Security, Secure electronic transaction, Intruders, Intrusion detection, password management, virus and related threats, Countermeasures, Firewall design principles, types of firewalls, Secure Inter-branch Payment Transactions, Cross site Scripting Vulnerability, Virtual Elections. (Chapter - 6)