Master of Computer Application – II (Semester III)
Paper Code: PSMCAT302
Paper 2: Digital Cyber Security
Credit: 4] [Max. Marks: 80
Unit-I: Introduction to Internet Security
Need for Internet Security, Adopting Security Policies, Strategies for a Secure Network, Ethics of
Computer Security, Security Threats and Levels, Security Plan (RFC 2196). Classes of Attacks:
Stealing Passwords, Social Engineering, Bugs and Backdoors, Authentication Failures, Protocol
Failures, Information Leakage, Exponential Attacks – Virus and Worms, Denial-of-Service-Attacks,
Botnets, Active Attacks.
Unit-II: Computer Security
Introduction to Virus, Trojan Horses, Worms, Bombs, Protection against Virus, Structure of Virus.
Firewalls: Introduction to Firewalls, Kinds of Firewalls: Packet Filters, Application-Level Filtering,
Circuit-Level Gateways, Dynamic Packet Filters, Distributed Firewalls, Firewall Engineering: Rule
sets, Proxies, Building a Firewall from Scratch, Firewall Problems and Testing Firewalls.
Unit-III: Safer Tools and Services
Authentication: Passwords, Smart Cards, Biometrics, RADIUS, SASL, Host-To-Host
Authentication, PKI. Some Tools and Services: Ined-Network Services, Ssh-Terminal And File
Access, Syslog, Network Administration Tools, Chroot-Caging Suspect Software, Jailing The Apache
Web Server, Aftpd-A Simple Anonymous FTP Daemon, Mail Transfer Agents, POP3 And IMAP,
Samba: An SMB Implementation, Taming Named, Adding SSL Support with Sslwrap.
Unit-IV: Cryptography and VPNs
Introduction to Cryptography, Notation, Secret-Key Cryptography, Modes of Operation, Public Key
Cryptography, Exponential Key Exchange, Digital Signatures, Secure Hash Functions, Timestamps,
Basic Encryption and Decryption. Introduction to VPNs, Advantages, Disadvantages of VPN,
VPN Authentication and Authorization, VPN Threats and Exploits, Personal and Network VPNs,
Hardware and Software VPNs, Differences between Layer2 and Layer3 VPNs
Books:
1) W. R. Cheswick, S. M. Bellovin, A. D. Rubin, “Firewalls and Internet Security-Repelling the Wily
Hacker”, Addison-Wesley Publication, “2nd Edition”, Year- 2003, ISBN No- 0-201- 63466-X
2) J. Michael Stewart, “Network Security, Firewalls, and VPNs”, Jones & Bartlett Publication, Year-
2011, ISBN N- 978-0-7637-9130-8
References:
1) Kenneth Einar Himma, “Internet Security: Hacking, Counter Hacking and Society”, Jones &
Bartlett Publication, “1st Edition”, Year- 2007, ISBN No– 978-0-7637-3536-4
2) Man Young Rhee, “Internet Security: Cryptographic Principles, Algorithms and Protocols”, J.
Wiley Publication, Year- 2003, ISBN No- 978-0-4708-5285-9
[MCA - Gondwana University, Gadchiroli] Page 21