Network Security
Network Security
COURSE PLAN
Designation/Department AP/ECE
Course Code/Name CCS354/ NETWORK SECURITY
Year/Section/Department III/AI&DS
Credits Details L:3 T: 0 P: 2 C:3
Total Contact Hours Required 60
Syllabus:
Key Management and Distribution: Symmetric Key Distribution, Distribution of Public Keys,
X.509
Certificates, Public-Key Infrastructure. User Authentication: Remote User-Authentication Principles,
Remote User-Authentication Using Symmetric Encryption, Kerberos Systems, Remote User
Authentication Using Asymmetric Encryption.
UNIT-III ACCESS CONTROL AND SECURITY 4+6
Network Access Control: Network Access Control, Extensible Authentication Protocol, IEEE 802.1X
Port-Based Network Access Control - IP Security - Internet Key Exchange (IKE). Transport-Level
Security: Web Security Considerations, Secure Sockets Layer, Transport Layer Security, HTTPS
standard, Secure Shell (SSH) application.
UNIT-IV APPLICATION LAYER SECURITY 5+6
Electronic Mail Security: Pretty Good Privacy, S/MIME, DomainKeys Identified Mail. Wireless
Network Security: Mobile Device Security.
UNIT-V SECURITY PRACTICES 6+9
Firewalls and Intrusion Detection Systems: Intrusion Detection Password Management, Firewall
Characteristics Types of Firewalls, Firewall Basing, Firewall Location and Configurations.
Blockchains, Cloud Security and IoT security.
Practical Exercise:
1. Implement symmetric key algorithms.
2. Implement asymmetric key algorithms and key exchange algorithms.
3. Implement digital signature schemes.
1
TIET/AI&DS/CCS354/III/VI
4. Installation of Wire shark, tcp dump and observe data transferred in client-server
communication using UDP/TCP and identify the UDP/TCP datagram.
5. Check message integrity and confidentiality using SSL.
6. Experiment Eavesdropping, Dictionary attacks, MITM attacks .
7. Experiment with Sniff Traffic using ARP Poisoning .
8. Demonstrate intrusion detection system using any tool.
9. Explore network monitoring tools.
10. Study to configure Firewall, VPN.
Objective:
T1. Cryptography and Network Security: Principles and Practice, 6th Edition, William
Stallings,2014, Pearson, ISBN 13:9780133354690.
Reference Book:
W1. https://youtu.be/2YGUvopGkQc?si=Zfti9YyRikJ11tYB
W2. https://youtu.be/Yhwj1iVfMLc
W3. https://youtu.be/ZHCtVZ6cjdg?si=z-lmsvhiF5SjV2aR
W4. https://youtu.be/-8IYmkHFTDc?si=c79A-sHsX9UNwkY9
Online Mode of Study (if Any):
https://youtu.be/RhS1PB3gDgU?si=Q5D2ibSFjryLDPXe
Course Plan:
2
TIET/AI&DS/CCS354/III/VI
Required Periods
UNIT I INTRODUCTION
Remote User-Authentication
13 T1 454 Black Board 1 22
Using Symmetric Encryption
Outcome of Unit II
CO3- Evaluate the security techniques applied to network and transport layer
UNIT IV APPLICATION LAYER SECURITY
4
TIET/AI&DS/CCS354/III/VI
Experiment Eavesdropping, P
Experimental
30 Dictionary attacks, MITM - 3 42
attacks Setup
Outcome of Unit IV
Demonstrate intrusion P
Experimental
38 detection system using any - 3 54
Setup
tool.
Outcome of Unit V
5
TIET/AI&DS/CCS354/III/VI
Course Outcome:
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO 1 3 3 2 2 2 - - - 2 1 2 1
CO 2 1 1 3 2 2 - - - 2 2 1 1
CO 3 1 2 1 1 2 - - - 3 3 1 3
CO 4 2 2 3 2 3 - - - 3 3 2 1
CO 5 2 1 3 2 2 - - - 2 1 1 3
Assignment:
Mode of
Assignment
Assign Batch Total
Register Number Written/ Topics
ment Details Number
Seminar/
PPT
623022243001- Secure Hash Algorithm
Batch - I 16 Written
623022243021
623022243022- Public key cryptography
I Batch - II 16 Written
623022243041
623022243042- 16 Authentication techniques
Batch - III Written
623022243302
623022243001- X.509 certificates
Batch - I 16 Seminar
623022243021
623022243022- Kerberos system
II Batch - II 16 Seminar
623022243041
623022243042- 16 Remote user Authentication
Batch - III Seminar
623022243302
6
TIET/AI&DS/CCS354/III/VI
University Questions:
1. Discuss how digital signatures can enhance the security of online transactions.
2.Describe how hash functions can be utilized to store and verify passwords securely.
3.Describe how an attack could be analyzed to determine the type of cryptographic vulnerabilities
that occurred.
UNIT-1 4.Compare and contrast the effectiveness of conventional and public-key cryptography in securing
a network. Discuss the strengths and weaknesses of each approach.
5.Demonstrate how a user would use their private key to authenticate to a remote server in an
asymmetric encryption scenario.
6. Evaluate the effectiveness of using multi-factor authentication (MFA) in combination with
cryptographic techniques to enhance system security. What potential weaknesses might still exist?
UNIT-2 1. Analyze the implications of key compromise in symmetric key distribution and propose a
mitigation strategy.
2.Design a step-by-step process for securely distributing public keys in a corporate environment.
3. Assess the potential risks and benefits of using public keys for user authentication compared to
symmetric keys.
4. Examine the principles of remote user authentication and illustrate how they can be
implemented in a mobile application.
5. Develop a hypothetical scenario involving a company utilizing symmetric encryption for
remote authentication.
6. Discuss ethical concerns, such as privacy issues and data protection, along with challenges like
false acceptance rates.
UNIT-3 1.Explain how Network Access Control improves network security.
2.Describe the role of Internet Key Exchange (IKE) in IP Security.
3.Apply the principles of Transport-Level Security to assess the security of a web application
using HTTPS.
4.Compare and contrast the security mechanisms offered by SSH and TLS in the context of
network communication.
5.Design a secure network access control policy that incorporates NAC principles and 802.1X
authentication.
6.Demonstrate how IEEE 802.1X can be implemented in a wireless network.
UNIT-4 1. Discuss the importance of digital signatures in S/MIME for verifying the authenticity of emails.
2. Implement a basic mobile security strategy for employees who use their personal devices for
work purposes.
3. Assess the role of cyber security policies in mitigating threats to wireless networks and mobile
devices in an organizational context.
4. Examine how various mobile device threats exploit vulnerabilities in outdated operating
7
TIET/AI&DS/CCS354/III/VI
systems.
5. Evaluate the effectiveness of using two-factor authentication alongside S/MIME in
strengthening email security.
6. Evaluate the effectiveness of public awareness training programs in reducing the incidence of
phishing attacks targeting mobile users.
UNIT-5 1.Discuss the importance of logging and monitoring in Intrusion Detection Systems.
2.Develop a basic plan for implementing a firewall in a small business network.
3. Examine the impact of cloud security breaches on business operations and reputational risk.
4.Assess the relevance of real-time monitoring in Intrusion Detection Systems and its impact on
breach mitigation.
5. Summarize the fundamental principles of block chain technology.
6. Investigate how block chain technology can enhance the security of IoT devices.
Submission Details: