[go: up one dir, main page]

0% found this document useful (0 votes)
12 views6 pages

Syllabus Ns (Network Security)

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 6

U

UkaTa rsadiaa Unive


ersity

B.Teech.
Semes
S ter V

NETTWORK SECURITTY
CY50
009

EFFECTTIVE FRO
OM June‐2
2023
Sylllabus verrsion: 1.00
Subject
Subject Title
Code
CY5009 Network Security

Teaching Scheme Examination Scheme


Theory Practical
Hours Credits Total
Marks Marks
Marks
Theory Practical Theory Practical Internal External CIE
3 2 3 1 40 60 50 150

Objectives of the course:


 Students shall be able to design and develop secure solution to provide
confidentiality and integrity, user authentication, secure web and email
communication, secure wireless communication, secure IP communication, attack
tolerance using Intrusion Detection System and firewall.

Course Outcomes:
Upon completion of the course, the student will be able to:
CO1: Design solutions to provide confidentiality and integrity.
CO2: Develop solutions to provide user authentication.
CO3: Design secure web and email communication.
CO4: Create secure wireless communication.
CO5: Develop solutions based on secure IP communication.
CO6: Design secure network using Intrusion Detection System and firewall.

Sr. No. Topics Hours


Unit – I
1 Introduction to Network Security 6
Computer Security Concepts, The OSI Security Architecture, Security
Attacks, Services, and Mechanisms, A Model for Network Security,
Standards, Symmetric Encryption Principles, Public‐Key Cryptography
Principles, Introduction to Secure Hash Function and Digital Signature

Unit – II
2 Key Distribution and User Authentication 6
Symmetric Key Distribution Using Symmetric Encryption, Kerberos,
Key Distribution Using Asymmetric Encryption, X.509 Certificates,
Public‐Key Infrastructure, Federated Identity Management
Unit – III
3 Transport‐Level Security and Email Security 6
Web Security Considerations, Secure Socket Layer and Transport Layer
Security, HTTPS, Secure Shell (SSH), Pretty Good Privacy, S/MIME,
Domain Keys Identified Mail

Unit – IV
4 Wireless Network Security 6
IEEE 802.11 Wireless LAN Overview, IEEE 802.11i Wireless LAN
Security, Wireless Application Protocol Overview, Wireless Transport
Layer Security, WAP End‐to‐End Security

Unit – V
5 IP Security 6
IP Security Overview, IP Security Policy, Encapsulating Security
Payload, Combining Security Associations, Internet Key Exchange,
Cryptographic Suites

Unit – VI
6 Intruders and Firewalls 6
Intruders, Intrusion Detection, Password Management, The Need for
Firewalls, Firewall Characteristics, Types of Firewalls, Firewall Basing,
Firewall Location and Configurations

Text book:
1. William Stallings, "Network Security Essentials: Applications and Standards",
Pearson.
Reference books:
1. Bernard Menezes, "Network Security and Cryptography", Cengage Learning
2. William Stalling, "Cryptography and Network Security", Pearson
3. Behrouz A. Forouzan, Debdeep Mukhopadhyay, "Cryptography and Network
Security", McGraw Hill (Indian Edition)
4. Straub, Detmar W., Goodman, Seymour, Baskerville, Richard L, "Information
Security : Policy, Processes, and Practices", PHI
5. Atul Kahate, "Cryptography and Network Security", McGraw Hill
Sr.
Network Security(Practical’s) Hours
No.

Write a C program that contains a string(char pointer) with a value \Hello


1 World’.The programs should XOR each character in this string with 0 and display 2
the result.
Write a C program that contains a string (char pointer) with a value \Hello
2 World’. The program should AND or and XOR each character in this string with 2
127 and display the result.
Write a Java program to perform encryption and decryption using Ceaser Cipher,
3 3
Substitution Cipher and Hill Cipher.
4 Write a C/JAVA program to implement the Blowfish algorithm logic. 2
Implement the Diffie‐Hellman Key Exchange mechanism using HTML and
5 2
JavaScript.
6 Calculate the message digest of a text using the SHA‐1 algorithm in JAVA. 3
7 Calculate the message digest of a text using the MD5 algorithm in JAVA. 2
8 Write a java program to implement triple DES. 3
9 Setup a honey pot and monitor the honeypot on network. 3
10 Installation of rootkits and study about the variety of options. 2
11 Perform wireless audit on an access point or a router and decrypt WEP and WPA. 3
Demonstrate intrusion detection system (ids) using any tool.
12 3
Write the rule to alert against SQL Injection

Course objectives and Course outcomes mapping:


 To design and develop secure solution to provide confidentiality and integrity, user
authentication : CO1, CO2
 Secure web and email communication, secure wireless communication : CO3,CO4
 Secure IP communication, attack tolerance using Intrusion Detection System and
firewall : CO5,CO6

Course units and Course outcome mapping:


Unit Course Outcomes
No. Unit Name
CO1 CO2 CO3 CO4 CO5 CO6
1 Introduction to Network Security ✓
2 Key Distribution and User ✓ ✓
Authentication ✓

3 Transport‐Level Security and Email


✓ ✓ ✓
Security
4 Wireless Network Security ✓ ✓ ✓ ✓
5 IP Security ✓ ✓ ✓ ✓ ✓
6 Intruders and Firewalls ✓ ✓ ✓ ✓ ✓

Programme Outcomes:

PO 1: Engineering knowledge: An ability to apply knowledge of mathematics,


science, and engineering.
PO 2: Problem analysis: An ability to identify, formulates, and solves engineering
problems.
PO 3: Design/development of solutions: An ability to design a system, component,
or process to meet desired needs within realistic constraints.
PO 4: Conduct investigations of complex problems: An ability to use the techniques,
skills, and modern engineering tools necessary for solving engineering
problems.
PO 5: Modern tool usage: The broad education and understanding of new
engineering techniques necessary to solve engineering problems.
PO 6: The engineer and society: Achieve professional success with an
understanding and appreciation of ethical behavior, social responsibility, and
diversity, both as individuals and in team environments.
PO 7: Environment and sustainability: Articulate a comprehensive world view that
integrates diverse approaches to sustainability.
PO 8: Ethics: Identify and demonstrate knowledge of ethical values in non‐
classroom activities, such as service learning, internships, and field work.
PO 9: Individual and team work: An ability to function effectively as an individual,
and as a member or leader in diverse teams, and in multidisciplinary settings.
PO 10: Communication: Communicate effectively on complex engineering activities
with the engineering community and with society at large, such as, being able
to comprehend and write effective reports and design documentation, make
effective presentations, and give/receive clear instructions.
PO 11: Project management and finance: An ability to demonstrate knowledge and
understanding of the engineering and management principles and apply
these to one’s own work, as a member and leader in a team, to manage
projects and in multidisciplinary environments.
PO 12: Life‐long learning: A recognition of the need for, and an ability to engage in
life‐long learning.
Programme Outcomes and Course Outcomes mapping:

Programme Course Outcomes


Outcomes
CO1 CO2 CO3 CO4 CO5 CO6

PO1 ✓ ✓ ✓ ✓

PO2 ✓ ✓ ✓ ✓ ✓ ✓

PO3
✓ ✓ ✓ ✓ ✓

PO4
✓ ✓ ✓

PO5
✓ ✓ ✓

PO6

PO7

PO8

PO9

PO10

PO11

PO12

You might also like