Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

CSE2008 NETWORK SECURITY L T P J C

3 0 0 4 4
Pre-requisite Nil Syllabus version
1.0
Course Objectives:
1. To develop a fundamental understanding of computer and network security proper practices,
policies, technologies and standards
2.To impart familiarity with the security techniques that provide information and network security
3.To enable to evaluate the security of communication systems networks and protocols based on a
multitude of security factors

Expected Course Outcome:


1. Describe computer and network security fundamental concepts and principles.
2.Identify and assess different types of threats, malware, spyware, viruses, vulnerabilities, and
today’s attacks such as social engineering, rootkit, and botnets
3.Describe the inner-workings of today’s real time communication security, e-mail security and
wireless security
4.Demonstrate the ability to select among available network security technology and protocols such
as IDS, IPS, firewalls, honeynets, SSL, SSH, IPSec, TLS, VPNs, etc..

Student Learning Outcomes (SLO): 1,2,10,14,17


Module:1 INTRODUCTION ON NETWORKING AND 7 hours
SECURITY
Access Control and Site Security- Virtual Local Area Network (VLAN), Demilitarized zone
(DMZ) ATTACKS, SERVICES MECHANISMS Attack Methods – TCP/IP Internetworking,
Security problems in TCP/IP protocol suite, BGP security attacks, DNS Cache poisoning, Denial of
Service (DoS) attacks, Distributed Denial of Service (DDoS) attacks, IP Trace back attacks

Module:2 REAL-TIME COMMUNICATION 8 hours


SECURITY
Introduction to TCP/IP protocol stack -Implementation layers for security protocols and
implications - IPsec: AH and ESP- IPsec: IKE- SSL/TLS- Distribution lists-Establishing keys-
Privacy, Source Authentication, Message Integrity, Non-Repudiation, Proof of Submission, Proof
of Delivery, Message Flow Confidentiality, Anonymity – Packet filters-Application level gateways.

Module:3 INTERNET CONTROL MESSAGE 5 hours


PROTOCOL (ICMP)
ICMP Messages - Attacks Using ICMP Messages - Reconnaissance Scanning - ICMP Sweep-
Traceroute - Firewalk - Inverse Mapping - OS Fingerprinting - Exploiting Systems - ICMP Route
Redirect - ICMP informational messages - ICMP Router Discovery Messages - ICMP Floods -
Smurf - Keeping Access Covering The Tracks

Module:4 ELECTRONIC MAIL SECURITY 5 hours


Pretty Good Privacy – PGP services – Transmission and Reception of PGP Messages – PGP
Message Generation – PGP Message Reception

Module:5 Web Security 4 hours


Threats on the web – Secure Socket Layer and Transport Layer Security:SSL architecture – SSL
record protocol – Handshake protocols

Module:6 Wireless Security 7 hours


SSID vulnerabilities, Hotspot vulnerabilities, Privacy and security issues in WiFi, WPA,
Wireless Intrusion Prevention System (WIPS), - Audit records - Viruses and related threats
–Security of data oriented and voice oriented wireless networks (GSM UMTS, other models)
IOT SECURITY Introduction –Application Space – IoT Security Issues – Hardware, Software
and Network Security Solutions – Security Analysis

Module:7 Network Defense Solutions 7 hours


Firewall, VPNs, Intrusion Detection and Prevention filters, Covert channels and counter measures
in communication protocols, Techniques for shielding applications from an untrusted environment,
Client and Server Security tools and applications

Module:8 Recent Trends 2 hours


Industry Expert talk
Total Lecture hours: 45 hours

Text Book(s)
1. W. Stallings, Cryptography and Network Security: Principles and Practice, 5th Ed. Boston:
Prentice Hall, 2010. (ISBN No.: 978-0-13-609704-4).
2 A. Das and C. VeniMadhavan, Public-key Cryptography: Theory and Practice. New Delhi,
India: Pearson Education India, 2009. (ISBN No. : 978-8-13-170832-3).
Reference Books
1. D. R. Stinson, Cryptography: Theory and Practice, 3rd Ed. Boca Raton, FL: Chapman
Hall/CRC, 2005. (ISBN No.: 978-1-58-488508-5 ).
2. M. Rhodes-Ousley, Network security the complete reference (complete reference), 2nd ed.
New York, USA: McGraw-Hill Professional Publishing, 2013. (ISBN No. :
978-1-59749-535-6)
3. C. Kaufman, R. Perlman, and M. Speciner, Network Security: Private Communication in a
Public World, 2nd Ed. United States: Prentice Hall PTR, 2002. (ISBN No.:
978-0-13-046019-6 ).
4. A. Kahate, Cryptography and Network Security, 3rd Ed. New Delhi: Tata McGraw-Hill
Education, 2003.(ISBN No. : 978-0-07-049483-1)
5. A. Basta and M. Zgola, Database Security, 1st Ed. Boston, MA: Delmar Cengage Learning,
2012. (ISBN No.: 978 - 1 – 4354 – 5390 – 6)
Mode of Evaluation: CAT / Assignment / Quiz / FAT / Project / Seminar
Mode of assessment: Project/Activity
Recommended by Board of Studies 28-02-2017
Approved by Academic Council No. 41 Date 16-03-2017

You might also like