Skip to main content

CS406: Information Security

Page path
  • Home /
  • Courses /
  • Course Catalog /
  • Computer Science /
  • CS406: Information Security /
  • Unit 5: Security Solutions
Back to course 'CS406: Information Security'
  • Unit 5: Security Solutions

    In this unit, we explore some of the common solutions for security issues that are currently in use. For securing web-based applications such as e-Commerce, Secure Sockets Layer (SSL) is a commonly used solution to enable security of transactions. It makes use of public-key based encryption and symmetric encryption during the transaction to ensure security. We also look into a protocol called Internet Protocol Security (IPSec) to secure communications.

    Completing this unit should take you approximately 5 hours.

    • Unit 5 Learning Outcomes Page
    • 5.1: Security Protocols and Solutions

      • Indian Institute of Technology, Kharagpur: Indranil Sengupta's "Basic Cryptographic Concepts" Page

        Watch this video about cryptographic concepts related to Secure Sockets Layer (SSL), Secure Shell (SSH), and Internet Protocol Security (IPSec).

    • 5.2: Internet Protocol Security

      • Gary C. Kessler's "An Overview of Cryptography: IP Security (IPSec) Protocol" >

        Read section 5.6 about Internet Protocol for securing communications. After reading this section, describe the two modes for IPSec: AH and ESP. Also try to explain how to use AH and ESP to build VPN (tunnel mode and transport mode).

    • 5.3: Secure Sockets Layer

      • Gary C. Kessler's "An Overview of Cryptography: The SSL Family of Secure Transaction Protocols for the World Wide Web" >

        Read section 5.7 about the SSL family of protocols for securing transactions over the Internet. When reading this section, please pay special attention to the diagram in Figure 5. You need to be able to explain the message flows in Figure 5 for SSL/TLS.

    • 5.4: Pretty Good Privacy

      • Gary C. Kessler's "An Overview of Cryptography: Pretty Good Privacy (PGP)" >

        Read section 5.5 about Pretty Good Privacy (PGP), one of today's most widely used public-key cryptography programs.

Navigation

Art History
Biology
Business Administration
Chemistry
Communication
Economics
English
History
Mathematics

Creative Commons License
© Saylor Academy 2010-2018 except as otherwise noted. Excluding course final exams, content authored by Saylor Academy is available under a Creative Commons Attribution 3.0 Unported license. Third-party materials are the copyright of their respective owners and shared under various licenses. See www.saylor.org/open/licensinginformation for detailed licensing information.

Saylor Academy and Saylor.org® are trade names of the Constitution Foundation, a 501(c)(3) organization through which our educational activities are conducted.

Terms of Use | Privacy Policy