MLR Institute of Technology
|
|
- Hilary Flynn
- 6 years ago
- Views:
Transcription
1 MLR Institute of Technology Laxma Reddy Avenue, Dundigal, Quthbullapur (M), Hyderabad Phone Nos: / , Fax: COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION Course Title : NETWORK SECURITY Course Code : Regulation : R09(JNTUH) Lectures Tutorials Practical s Credits Course Structure : Course Coordinator : Ms N.SHIRISHA Assistant Professor Team of Instructors : Mr Ch. Subba Reddy, Assistant Professor I. COURSE OVERVIEW: This course provides an introduction to the field of network security. Specific topics to be examined include threats and vulnerabilities to network architectures and protocols. The course is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop security policies that will protect an organization s information. Students will learn how to evaluate network and Internet security issues and design. II. PREREQUISITES: Level Credits Periods / Week Prerequisites UG 3 4 Data Communication and Computer Networks III. MARKS DISTRIBUTION: Sessional Marks Mid Semester Test There shall be two midterm examinations. Each midterm examination consists of subjective type and objective type tests. The subjective test is for 10 marks of 60 minutes duration. Subjective test of shall contain 4 questions; the student has to answer 2 questions, each carrying 5 marks. The objective type test is for 10 marks of 20 minutes duration. It consists of 10 Multiple choice and 10 objective type questions, the student has to answer all the questions and each carries half mark. First midterm examination shall be conducted for the first two and half units of syllabus and second midterm examination shall be conducted for the remaining portion. Assignment Five marks are earmarked for assignments. There shall be two assignments in every theory course. Marks shall be awarded considering the average of two assignments in each course. University End Exam marks Total marks P a g e
2 IV. EVALUATION SCHEME: S. No Component Duration Marks 1. I Mid Examination 80 minutes I Assignment II Mid Examination 80 minutes II Assignment External Examination 3 hours 75 V. COURSE OBJECTIVES: i. Understand the basic categories of threats to computers and networks. ii. List various cryptographic algorithms. iii. Describe public-key cryptography. iv. Analyze PGP key pair and use the PGP package to send an encrypted message. v. Understand how IP protocol provides security through IPSec protocols that provide web security. vi. State how network management is provided by SNMP and firewall secures the data in the network. VI. COURSE OUTCOMES: At the end of the course the students are able to: 1. Differentiate network security and computer security. 2. Understand various attacks on network. 3. List various conventional cryptography algorithms. 4. Analyze key management and approaches to message authentication. 5. List various asymmetric encryption algorithms. 6. State various authentication services. 7. Analyze how PGP is used to protect messages transmitted through Analyze how S/MIME is used to protect messages transmitted through State how IPSec provides security for IP protocol. 10. Understand the process of combining security association and key management. 11. State various requirements for web security and implementing security through SSL/TLS. 12. Understand how credit card transactions are protected through SET. 13. Analyze how security is provided for many applications through SNMP. 14. List various intruders. 15. Understand various firewall design principles. 16. State intrusion detection system. 2 P a g e
3 VII. HOW PROGRAM OUTCOMES ARE ASSESSED: a b c Program Outcomes Level Proficiency assessed by An ability to apply knowledge of computing, mathematical S Assignments foundations, algorithmic principles, and computer science and and Tutorials engineering theory in the modeling and design of computer-based systems to real-world problems (fundamental engineering analysis skills). An ability to design and conduct experiments, as well as to N analyze and interpret data (information retrieval skills). An ability to design, implement, and evaluate a computer-based system, process, component, or program to meet desired needs, within realistic constraints such as economic, environmental, social, political, health and safety, manufacturability, and sustainability (creative skills). H Designing Network d An ability to function effectively on multi-disciplinary teams H Experiments (teamwork). e An ability to analyze a problem, and identify, formulate and use the appropriate computing and engineering requirements for H Assignments, Exams obtaining its solution (engineering problem solving skills). f An understanding of professional, ethical, legal, security and N social issues and responsibilities (professional integrity). g An ability to communicate effectively both in writing and N orally(speaking /writing skills) h The broad education necessary to analyze the local and global S Experiments impact of computing and engineering solutions on individuals, organizations, and society (engineering impact assessment skills). i Recognition of the need for, and an ability to engage in continuing professional development and life-long learning (continuing education awareness). H Assignments, Tutorials and Exams j A knowledge of contemporary issues (social awareness) k An ability to use current techniques, skills, and tools necessary for H Lab, Exams computing and engineering practice (practical engineering analysis skills). l An ability to apply design and development principles in the construction of software and hardware systems of varying complexity (software hardware interface). N m An ability to recognize the importance of professional N development by pursuing postgraduate studies or face competitive examinations that offer challenging and rewarding careers in computing (successful career and immediate employment). N= None S= Supportive H = Highly Related VIII. SYLLABUS: UNIT I Security Attacks (Interruption, Interception, Modification and Fabrication), Security Services (Confidentiality, Authentication, Integrity, Non-repudiation, access Control and Availability) and Mechanisms, A model for Internetwork security, Internet Standards and RFCs, Buffer overflow & format string vulnerabilities, TCP session hijacking, ARP attacks, route table modification, UDP hijacking, and man-in-the-middle attacks. 3 P a g e
4 UNIT-II Conventional Encryption Principles, Conventional Encryption Algorithms, Cipher block modes of operation, Location of encryption devices, Key distribution, Approaches of message authentication, secure Hash functions and HMAC UNIT-III Public key cryptography principles, public key cryptography algorithms, digital signatures, digital certificates, Certificate Authority and key management Kerberos, X.509 Directory Authentication Services. UNIT-IV privacy: Pretty Good Privacy (PGP) and S/MIME. UNIT-V IP security Overview, IP Security Architecture, Authentication Header, Encapsulation Security Payload, Combining Security Associations and Key Management. UNIT-VI Web Security Requirements, Secure Socket Layer (SSL) and Transport Layer Security (TLS), Secure Electronic Transaction (SET). UNIT-VII Basic concepts of SNMP, SNMPv1 Community facility and SNMPv3. Intruders, Viruses and threats. UNIT-VIII Firewall Design principles, Trusted Systems. Intrusion Detection Systems TEXT BOOKS 1. Network Security Essentials (Application and Standards) by William Stallings Pearson Education. 2. Hack Proofing your network by Ryan Russell, Dan Kaminski, Rain Forest Puppy, Joe Grand, David Ahmad, Hal Flynn Ido Dubrawsky.. REFERENCES 1. Fundamentals of Network Security by Eric Maiwald (Dreamtech press). 2. Network Security-Private Communication in a public World by Charlie Kaufman, Radia Perlman and Mike Speciner, Pearson/PHI.. 3. Cryptography and network security, Third edition, Stallings, PHI/Pearson. 4. Principles of Information Security, Whitman, Thomson. 5. Network Security: The complete reference, Robert Bragg, Mark Rhodes. 6. Introduction to Cryptography, Bachmann, Springr. IX. COURSE PLAN: At the end of the course, students are able to achieve the following learning outcomes Lecture No Course Learning Outcomes Topics to be covered Reference Understand the importance of identifying threats to network Analyze how network model is Designed Understand how internet standards are standardized using RFC s Evaluate various types of attacks on the network. Security Attacks, Services, Mechanisms A model for internetwork security Internet Standards and RFCs Buffer overflow, Format string vulnerabilities T1: R2, R3 4 P a g e
5 Lecture No Course Learning Outcomes Topics to be covered Reference Understand how routing tables are modified by attackers Understand how sessions are hijacked in UDP Understand how Unauthorized person acquires data in middle of transmission of data in network Classify various algorithms used for sending data securely in network Understand how plaintext is Processed Analyze how security depends on location of encryption devices in network Evaluate how security keys are being used in network Understand how secret keys are being distributed Analyze various methods for authenticating messages Understand public key cryptography principles Understand various public key cryptography algorithms Understand various key exchange Algorithms Solve secret key using Diffie Hellman Illustrate how security provided through signature 19 Compare various security aspects for entering into secure network 20 Understand Kerberos authentication Service 21 Understand X.509 authentication Service 22 Compare all authentication services 23 Understand how provide security to data sending through 24 Understand PGP functionality 25 Analyze how MIME is used Analyze the importance of secured architecture for internet protocol Understand how authentication header provides authentication TCP session hijacking, ARP attack Route table modification UDP hijacking Man-in the middle attacks Conventional encryption principles, Conventional encryption algorithms(des, AES) Cipher block modes of operation, Location of encryption devices Key distribution, Approaches of message authentication Public key cryptography principles, Public key cryptography algorithms(rsa, security aspects of RSA, Diffie Hellman key exchange, elliptic curve cryptography) Digital signatures and certificates, Certificate authority and key management, Kerberos, X.509 directory authentication services, Authentication procedures in X.509 , PGP(authentication, confidentiality, authentication and confidentiality) PGP(compression, compatibility, segmentation and reassembling) S/MIME content types, S/MIME transfer encodings Functionality of S/MIME, S/MIME message IP security overview, Architecture Authentication header T1: ,2.4 T1: ,3.1 T1: T1:3.5,3.6, T1:5.1 T1:5.2 T1: P a g e
6 Lecture No. 28 Analyze where to place the AH in IP Packet 29 Understand AH in IP packet 30 Understand ESP protocol to secure IP packets 31 Understand key management Process 32 Analyze OAKLEY key exchange Method 33 Analyze ISAKMP key exchange Method 34 Understand web security requirements 35 Analyze how SSL provides security in www 36 Analyze how TLS standardized SSL 37 Understand various protocols of SSL 38 Analyze different layered security in Web 39 Understand various protocols of SSL 40 Understand how credit card Course Learning Outcomes Topics to be covered Reference transactions are secured Analyze securing data/money in online transaction though SET Understand how devices are managed on IP network 43 Analyze how many applications are processed and secured 44 Understand how SNMP is used 45 Explain the process of VACM 46 Analyze key localization process 47 Analyze the process of identifying malicious activity in network 48 Understand various types of threats 49 Understand various types of viruses Understand firewall design Principles 55 Evaluate different techniques which inspects network traffic 56 Understand how systems are Trusted 57 Analyze different malicious software s 58 Understand how Trojan horse is Detected 59 Understand how data is protected from Trojan horse Encapsulation security payload, Combining security association Key management(oakley), ISAKMP, ISAKMP exchanges Web security introduction, Requirements, Secure socket layer(architecture, record protocol, change cipher spec protocol) SSL(alert protocol, handshake protocol), Transport layer security(tls), Secure electronic transaction(set) Basic concepts of SNMP, SNMP V1 community facility, SNMP V3(architecture, manager, agent) SNMP V3(applications, key localization, VACM) Intruders Viruses and related threats Firewall design principles- application gateway, Firewall configurations Trusted systems- data access, control, concepts Intrusion detection system, Trojan horse defense T1: T1: T1: T1: T1:9.1, T: T1:11.2, P a g e
7 X. MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT OF THE PROGRAM OUTCOMES: Program Outcomes Course Objectives a b c d e f g h i j k l m I H S II H S III H S IV S H V H S VI S H S = Supportive H = Highly Related XI. MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT OF THE PROGRAM OUTCOMES: Program Outcomes Course Outcomes a b c d e f g h i j k l m 1 S 2 H 3 S 4 S H 5 S 6 S 7 S 8 H 9 S 10 H 11 S 12 S 13 S 14 H 15 S 16 S S = Supportive H = Highly Related Prepared by: Ms. D. Rajani Bai, Assistant Professor; Mr. N. Bashwanth, Assistant Professor HOD, COMPUTER SCIENCE AND ENGINEERING 7 P a g e
COURSE PLAN. Name of the Faculty:: K.ROSHAN & M.A.MUNEER Designation: Assoc.Professor Asst. Professor. Name Of The Programme:: B.
COURSE PLAN Name of the Faculty:: K.ROSHAN & M.A.MUNEER Designation: Assoc.Professor Asst. Professor Department:: Information Technology COURSE DETAILS Name Of The Programme:: B.TECH Batch:: 2011 Designation
More informationINSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad
INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, yderabad - 500 043 COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Course Code Regulation Course Structure Course Coordinator
More informationAcademic Course Description
BEC012 - CRYPTOGRAPHY AND NETWORK SECURITY Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication Engineering BEC012 Cryptography
More informationINSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad
INTITUTE OF AERONAUTICAL ENGINEERING Dundigal, yderabad - 500 043 INFORMATION TECNOLOGY COURE DECRIPTION FORM Course Title Course Code Regulation Course tructure Course Coordinator Team of Instructors
More information10EC832: NETWORK SECURITY
10EC832: NETWORK SECURITY Objective: In this electronic age, security and privacy are two of the issues whose importance cannot be stressed enough. How do we ensure the systems we use are resistant to
More informationINSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous)
INTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) INFORMATION TECNOLOGY COURE DECRIPTION FORM Course Title Course Code Regulation Course tructure Course Coordinator Team of Instructors INFORMATION ECURITY
More informationINSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad INFORMATION TECHNOLOGY COURSE DESCRIPTION FORM
INSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, yderabad - 500 043 INFORMATION TECNOLOGY COURSE DESCRIPTION FORM Course Title Course Code Regulation Course Structure Course Coordinator Team of Instructors
More informationINSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad
INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad - 500 043 INFORMATION TECHNOLOGY COURSE DESCRIPTION FORM Course Title Course Code Regulation Course Structure Course Coordinator SOFTWARE
More informationMLR Institute of Technology
MLR Institute of Technology Laxma Reddy Avenue, Dundigal, Quthbullapur (M), yderabad 500 043 Phone Nos: 08418 204066 / 204088, Fax : 08418 204088 COURE DECRIPTION Name of the Dept.: INFORMATION TECNOLOGY
More informationSRI VENKATESWARA COLLEGE OF ENGINEERING
COURSE DELIVERY PLAN - THEORY Page 1 of 6 Department of Information Technology B.E/B.Tech :IT/CS Regulation:2013 LP: CS6701 Rev. No: 01 Date: 30.06.2017 Sub. Code / Sub. Name : CS6701 CRYPTOGRAPHY & NETWORK
More informationINSTITUTE OF AERONAUTICAL ENGINEERING Autonomous Dundigal, Hyderabad
INSTITUTE OF AERONAUTICAL ENGINEERING Autonomous Dundigal, yderabad - 500 043 COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Course Code Regulation Course Structure Course Coordinator
More informationINSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad
INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad - 500 043 Course Title Course Code Regulation COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM JAVA PROGRAMMING A40503 R15-JNTUH
More informationINSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad
INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad -500 043 COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Course Code Regulation Course Structure Course Coordinator
More informationThe University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus
The University of Jordan Accreditation & Quality Assurance Center COURSE Syllabus 1 Course title Computer Security 2 Course number 1901463 Credit hours (theory, practical) 3 3 Contact hours (theory, practical)
More informationCRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK
CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK UNIT-1 1. Answer the following: a. What is Non-repudiation b. Distinguish between stream and block ciphers c. List out the problems of one time pad d. Define
More informationFaculty of Science & Information Technology
Faculty of Science & Information Technology Department: Computer Science COURSE SYLLABUS Short Description Student s Copy One copy of this course syllabus is provided to each student registered in this
More informationChapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,
Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls 32.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 32.2 Figure 32.1 Common structure
More informationINSTITUTE OF AERONAUTICAL ENGINEERING (AUTONOMOUS) Dundigal, Hyderabad
INTITUTE OF AERONAUTICAL ENGINEERING (AUTONOMOU) Dundigal, yderabad - 500 043 ELECTRONIC AND COMMUNICATION ENGINEERING COURE DECRIPTION FORM Course Title : Microprocessors and Microcontrollers Course Code
More informationIntroduction and Overview. Why CSCI 454/554?
Introduction and Overview CSCI 454/554 Why CSCI 454/554? Get Credits and Graduate Security is important More job opportunities More research funds 1 Workload Five homework assignments Two exams (open book
More informationSankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank
Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology Question Bank Subject: Information Security (160702) Class: BE Sem. VI (CE/IT) Unit-1: Conventional
More informationG. PULLAIAH COLLEGE OF ENGINEERING AND TECHNOLOGY Pasupula, Nandikotkur Road, Kurnool
G. PULLAIAH COLLEGE OF ENGINEERING AND TECHNOLOGY Pasupula, Nandikotkur Road, Kurnool-518014 BRANCH: COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Course Code Regulation Course
More informationAcademic Course Description
BEC601 - COMPUTER COMMUNICATION AND NETWORKS Course (catalog) description Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication
More informationAcronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector
Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National
More informationINSTITUTE OF AERONAUTICAL ENGINEERING
INSTITUTE OF AERONAUTICAL ENGINEERING Course Title Course Code Regulation (Autonomous) Dundigal, yderabad - 500 043 COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM DATABASE MANAGEMENT SYSTEMS
More informationCONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements
CONTENTS Preface Acknowledgements xiii xvii Chapter 1 TCP/IP Overview 1 1.1 Some History 2 1.2 TCP/IP Protocol Architecture 4 1.2.1 Data-link Layer 4 1.2.2 Network Layer 5 1.2.2.1 Internet Protocol 5 IPv4
More informationSyllabus: The syllabus is broadly structured as follows:
Syllabus: The syllabus is broadly structured as follows: SR. NO. TOPICS SUBTOPICS 1 Foundations of Network Security Principles of Network Security Network Security Terminologies Network Security and Data
More informationAcademic Course Description
Academic Course Description SRM University Faculty of Engineering and Technology Department of Electronics and Communication Engineering EC1027 COMPUTER COMMUNICATION Seventh Semester, 2016-17 (odd semester)
More informationCity University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester B 2017/18
City University of Hong Kong offered by Department of Computer Science with effect from Semester B 2017/18 Part I Course Overview Course Title: Internet Security and E-Commerce Protocols Course Code: CS4286
More informationChapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010
Cryptography Chapter 8 Network Security Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security An Introduction
More informationUniversity of Asia Pacific (UAP) Department of Computer Science and Engineering (CSE) Course Outline
University of Asia Pacific (UAP) Department of Computer Science and Engineering (CSE) Course Outline Program: Course Title: Computer Networks Sessional Course Code: CSE 448 Semester: Level: Spring-2018
More informationFIT5044 Network security. Unit Guide. Semester 1, 2010
FIT5044 Network security Unit Guide Semester 1, 2010 The information contained in this unit guide is correct at time of publication. The University has the right to change any of the elements contained
More informationCryptography and Network Security Chapter 16. Fourth Edition by William Stallings
Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Chapter 16 IP Security If a secret piece of news is divulged by a spy before the time is ripe, he must be put to death,
More informationAcademic Course Description
BEC003 Integrated Services Digital Network Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication Engineering BEC002INTEGRATED
More informationName of chapter & details.
Course Title Course Code Information Security IT707 Theory : 03 Course Credit Practical : 01 Tutorial : 00 Course Learning Outcomes Credits : 04 On the completion of the course, students will be able to:
More informationChapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads
Cryptography p y Chapter 8 Network Security Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security An Introduction
More informationSt. MARTIN s ENGINERING COLLEGE Dhulapally,Secunderabad
St. MARTIN s ENGINERING COLLEGE Dhulapally,Secunderabad-500014 INFORMATION TECHNOLOGY COURSE DESCRIPTION FORM Course Title Data Structures Course Code A30502 Regulation R13-JNTUH Course Structure Lectures
More informationIT443 Network Security Administration Spring Gabriel Ghinita University of Massachusetts at Boston
IT443 Network Security Administration Spring 2018 Gabriel Ghinita University of Massachusetts at Boston Contact Information Instructor: Dr. Gabriel Ghinita Email: Gabriel.Ghinita@umb.edu (preferred contact)
More informationINSTITUTE OF AERONAUTICAL ENGINEERING
INTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, yderabad - 500 043 Course Title Course Code INFORMATION TECNOLOGY COURE DECRIPTION FORM DATA COMMUNICATION A40409 Regulation/Academic R15 JNTU/2016-17
More informationNetworks and Communications MS216 - Course Outline -
Networks and Communications MS216 - Course Outline - Objective Lecturer Times Overall Learning Outcomes Format Programme(s) The objective of this course is to develop in students an understanding of the
More informationCourse Name: Computer Networks-1 Course Code: IT222
Course Name: Computer Networks-1 Course Code: IT222 I. Basic Course Information Major or minor element of program: General Department offering the course: Information Technology Department Academic level:
More information(2½ hours) Total Marks: 75
(2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.
More informationAIT 682: Network and Systems Security
AIT 682: Network and Systems Security Final Exam Review Instructor: Dr. Kun Sun Topics covered by Final Topic before Midterm 10% Topic after Midterm 90% Date: 12/13/2017 7:30am 10:15am Place: the same
More informationUniversity of Asia Pacific (UAP) Department of Electrical and Electronics Engineering (EEE) Course Outline
University of Asia Pacific (UAP) Department of Electrical and Electronics Engineering (EEE) Course Outline Program: Course Title: Electrical and Electronics Engineering (EEE) Computer Networks Course Code:
More informationInt ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28
Int ernet w orking Internet Security Literature: Forouzan: TCP/IP Protocol Suite : Ch 28 Internet Security Internet security is difficult Internet protocols were not originally designed for security The
More informationSYLLABUS. DIVISION: Business and Engineering Technology REVISED: FALL 2015 CREDIT HOURS: 4 HOURS/WK LEC: 4 HOURS/WK LAB: 0 LEC/LAB COMB: 4
SYLLABUS DIVISION: Business and Engineering Technology REVISED: FALL 2015 CURRICULA IN WHICH COURSE IS TAUGHT: IST, Information Systems Technology COURSE NUMBER AND TITLE: ITN 262 Cisco CCNA Security CREDIT
More informationCOURSE PLAN Regulation: R11 FACULTY DETAILS: Department::
203-4 COURSE PLAN Regulation: R FACULTY DETAILS: Name of the Faculty:: Designation: Department:: ROSHAN KAVURI Associate Professor IT COURSE DETAILS Name Of The Programme:: B.TECH Batch:: 202 Designation::
More informationRYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education
RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education COURSE OF STUDY 2017-2018 (C)ITM 820 Information Systems Security and Privacy
More informationSecurity+ SY0-501 Study Guide Table of Contents
Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators
More informationINSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad
INTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, yderabad - 500 043 COMPUTER CIENCE AND ENGINEERING COURE INFORMATION EET Course Title Course Code Regulation Course tructure Course Coordinator
More informationPart A: Course Outline
University of Macau Faculty of Science and Technology Course Title: Department of Electrical and Computer Engineering Part A: Course Outline Communication System and Data Network Course Code: ELEC460 Year
More informationAcademic Course Description
BEC502 MICROPROCESSOR AND MICROCONTROLLER Course (catalog) description Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication Engineering
More informationA & B Section. Day. A Mrs. Krishnaveni S 1204 UB
SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF SOFTWARE ENGINEERING COURSE PLAN Course Code : SE1102 Course Title : NETWORKS SECURITY Semester : IV Course Time : FEB MAY 2016 Day A
More informationG.PULLAIH COLLEGE OF ENGINEERING & TECHNOLOGY
G.PULLAI COLLEGE OF ENGINEERING & TECNOLOGY Nandikotkur Road, Kurnool 518002 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Semester VI (2017-2018) COURSE DESCRIPTION Course Code : 15A05601 Course Title
More informationPrinciples of Information Security, Fourth Edition. Chapter 8 Cryptography
Principles of Information Security, Fourth Edition Chapter 8 Cryptography Learning Objectives Upon completion of this material, you should be able to: Chronicle the most significant events and discoveries
More informationKALASALINGAM UNIVERSITY
KALASALINGAM UNIVERSITY (Kalasalingam Academy of Research and Education) DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CLASS NOTES CRYPTOGRAPHY AND NETWOTK SECURITY (CSE 405) Prepared by M.RAJA AP/CSE
More informationTotal No. of Questions : 09 ] [ Total No.of Pages : 02
CS / IT 321 (CR) Total No. of Questions : 09 ] [ Total No.of Pages : 02 III/IV B. TECH. DEGREE EXAMINATIONS, OCT / NOV - 2015 Second Semester COMPUTER SCIENCE & ENGINEERING NETWK SECURITY Time : Three
More informationComputer Networking. What is network security? Chapter 7: Network security. Symmetric key cryptography. The language of cryptography
Chapter 7: Network security 15-441 Computer Networking Network Security: Cryptography, Authentication, Integrity Foundations: what is security? cryptography authentication message integrity key distribution
More informationTextbook Charles Petzold, Programming Windows, 5th edition, Microsoft Press. References - other textbooks or materials none
CS351 Systems Programming Last Updated - 03/01/02 Course Manager Dr. Phil Dickens, Assistant Professor 3 credit hours; required for CS & CPE; 100 min. lecture & 100 min. lab each week Current Catalog Description
More informationCryptography and Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,
More informationThe World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to
1 The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to compromises of various sorts, with a range of threats
More informationBS Electrical Engineering Program Assessment Plan By Dan Trudnowski Spring 2018
BS Electrical Engineering Program Assessment Plan By Dan Trudnowski Spring 2018 What is your program mission statement? The mission of the Electrical Engineering program at Montana Tech is to provide a
More informationUnderstanding Cisco Cybersecurity Fundamentals
210-250 Understanding Cisco Cybersecurity Fundamentals NWExam.com SUCCESS GUIDE TO CISCO CERTIFICATION Exam Summary Syllabus Questions Table of Contents Introduction to 210-250 Exam on Understanding Cisco
More informationCSCE 715: Network Systems Security
CSCE 715: Network Systems Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina Security in Network Layer Implementing security in application layer provides flexibility in security
More informationThe Internet community has developed application-specific security mechanisms in a number of application areas, including electronic mail (S/MIME,
1 The Internet community has developed application-specific security mechanisms in a number of application areas, including electronic mail (S/MIME, PGP), client/server (Kerberos), Web access (Secure Sockets
More information14. Internet Security (J. Kurose)
14. Internet Security (J. Kurose) 1 Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer:
More informationCS 356 Internet Security Protocols. Fall 2013
CS 356 Internet Security Protocols Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5
More informationPESIT SOUTH CAMPUS 10IS835: INFORMATION AND NETWORK SECURITY. Faculty Name: Aisha Begam No. of Hours: 52
10IS835: INFORMATION AND NETWORK SECURITY Faculty Name: Aisha Begam No. of Hours: 52 Objectives In this electronic age, security and privacy are two of the issues whose importance cannot be stressed enough.
More informationAcademic Course Description
BET008 WIRELESS NETWORKS Academic Course Description Course (catalog) description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication Engineering BET008
More informationTransport Level Security
2 Transport Level Security : Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l12, Steve/Courses/2013/s2/css322/lectures/transport.tex,
More informationCryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 14: Folklore, Course summary, Exam requirements Ion Petre Department of IT, Åbo Akademi University 1 Folklore on
More informationCOURSE DESCRIPTION FORM. Level Credits Periods/ Week Prerequisites
t. MARTIN ENGINEERING COLLEGE Approved by AICTE, New Delhi, Affiliated to J.N.T.U, yderabad. Dhulapally(V), Qutubullapur(M), ecunderabad 500 014. Department of Computer cience and Engineering Course Title
More informationHOLY ANGEL UNIVERSITY COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY CYBER SECURITY COURSE SYLLABUS
HOLY ANGEL UNIVERSITY LLEGE OF INFORMATION AND MMUNICATIONS TECHNOLOGY CYBER SECURITY URSE SYLLABUS Course Code : 6CSEC Prerequisite : 6MPRO2L Course Credit : 3 Units (2 hours LEC,3 hours LAB) Year Level:
More informationISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :
ISACA CISA ISACA CISA ( Certified Information Systems Auditor ) Download Full Version : http://killexams.com/pass4sure/exam-detail/cisa QUESTION: 390 Applying a digital signature to data traveling in a
More informationCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE FIFTH EDITION William Stallings Prentice Hall Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai
More informationInformation Security: Principles and Practice Second Edition. Mark Stamp
Information Security: Principles and Practice Second Edition Mark Stamp August 10, 2009 Contents Preface Second Edition Preface About The Author Acknowledgments xvii xix xxiii xxv 1 Introduction 1 1.1
More informationBCA III Network security and Cryptography Examination-2016 Model Paper 1
Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 1 M.M:50 The question paper contains 40 multiple choice questions with four choices and student will have to pick the correct
More informationDepartment of Computer Science and Engineering NITK, Surathkal IS703 - Network Security [M. Tech-ISE] (Syllabus and Assessment Plan)
Department of Computer Science and Engineering NITK, Surathkal IS703 - Network Security [M. Tech-ISE] (Syllabus and Assessment Plan) Semester: II [ISE] Academic Year: 2017-18 Credits: (3-0-2) 4 Theory
More information(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography
Code No: RR410504 Set No. 1 1. Write short notes on (a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography 3. (a) Illustrate Diffie-hellman Key Exchange scheme for GF(P) [6M] (b) Consider
More informationSchool of Engineering & Computational Sciences
Catalog: Undergraduate Catalog 2014-2015 [Archived Catalog] Title: School of Engineering and Computational Sciences School of Engineering & Computational Sciences Administration David Donahoo, B.S., M.S.
More information06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security
1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security Dr. L. Christofi 1 0. Overview As the knowledge of computer networking and protocols has become more widespread, so the threat of
More informationEthical Hacker Foundation and Security Analysts Course Semester 2
Brochure Software Education Ethical Hacker Foundation and Security Analysts Course Semester 2 The Security Management Course is a graduate-level foundation course in the Information Security space. Brochure
More informationIntroduction to Network Security Missouri S&T University CPE 5420 Exam 2 Logistics
Introduction to Network Security Missouri S&T University CPE 5420 Exam 2 Logistics Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science
More informationCourse overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)
Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience
More informationINSTITUTE OF AERONAUTICAL ENGINEERING
INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) DUNDIGAL, YDERABAD -500 043 Course Title Course Code Regulation INFORMATION TECNOLOGY COURSE DESCRIPTION FORM JAVA PROGRAMMING A40503 R13 JNTU Course
More informationINSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad
INTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, yderabad - 500 043 COMPUTER CIENCE AND ENGINEERING COURE DECRIPTION FORM Course Title Course Code Regulation Course tructure Course Coordinator
More informationData Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II
Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II Hello and welcome to today's lecture on secured communication.
More informationSystems and Network Security (NETW-1002)
Systems and Network Security (NETW-1002) Dr. Mohamed Abdelwahab Saleh IET-Networks, GUC Spring 2017 Course Outline Basic concepts of security: Attacks, security properties, protection mechanisms. Basic
More informationIntroduction to information Security
First lecture Introduction to information Security Why Computer and information Security Cryptography Secret key algorithms: DES/AES Public key algorithms: RSA One-way hash functions & message digests:
More informationCS 134: Elements of Cryptography and Computer + Network Security Winter sconce.ics.uci.edu/134-w16/ CS 134 Background
CS 134: Elements of Cryptography and Computer + Network Security Winter 2016 sconce.ics.uci.edu/134-w16/ 1 CS 134 Background 11:00-12:20 @ SSL 290 Discussions section as needed (must register!) Senior-level
More informationCryptography and secure channel. May 17, Networks and Security. Thibault Debatty. Outline. Cryptography. Public-key encryption
and secure channel May 17, 2018 1 / 45 1 2 3 4 5 2 / 45 Introduction Simplified model for and decryption key decryption key plain text X KE algorithm KD Y = E(KE, X ) decryption ciphertext algorithm X
More informationChapter 6. IP Security. Dr. BHARGAVI H. GOSWAMI Department of Computer Science Christ University
Chapter 6 IP Security Dr. BHARGAVI H. GOSWAMI Department of Computer Science Christ University +91 9426669020 bhargavigoswami@gmail.com Topic List 1. IP Security Overview 2. IP Security Architecture 3.
More informationCSCE 813 Internet Security Final Exam Preview
CSCE 813 Internet Security Final Exam Preview Professor Lisa Luo Fall 2017 Coverage All contents! Week1 ~ Week 15 The nature of the exam: 12 questions: 3 multiple choices questions 1 true or false question
More informationINSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad
INTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, yderabad - 500 043 COMPUTER CIENCE AND ENGINEERING COURE DECRIPTION FORM Course Title Course Code Course tructure Course Coordinator Team of
More informationImplementing Cisco Network Security (IINS) 3.0
Implementing Cisco Network Security (IINS) 3.0 COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using
More informationCS System Security 2nd-Half Semester Review
CS 356 - System Security 2nd-Half Semester Review Fall 2013 Final Exam Wednesday, 2 PM to 4 PM you may bring one 8-1/2 x 11 sheet of paper with any notes you would like no cellphones, calculators This
More informationCourse Intended Learning Outcomes (CILOs): Upon successful completion of this course, students should be able to:
Title (Units): COMP 7330 Information Systems Security & Auditing (3,3,0) Course Aims: Prerequisite: To introduce the fundamental concepts and techniques in computer and network security, giving students
More informationNetwork Security and Cryptography. December Sample Exam Marking Scheme
Network Security and Cryptography December 2015 Sample Exam Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers
More informationACS / Computer Security And Privacy. Fall 2018 Mid-Term Review
ACS-3921-001/4921-001 Computer Security And Privacy Fall 2018 Mid-Term Review ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been adopted and/or modified
More informationCryptography and Network Security. Sixth Edition by William Stallings
Cryptography and Network Security Sixth Edition by William Stallings Chapter 20 IP Security If a secret piece of news is divulged by a spy before the time is ripe, he must be put to death, together with
More informationM.D UNIVERSITY SCHEME OF STUDIES AND EXAMINATION M.TECH 2nd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER 3rd CBCS Scheme effective from
M.D UNIVERSITY SCHEME OF STUDIES AND EXAMINATION M.TECH 2nd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER 3rd CBCS Scheme effective from 2017-18 Sl. No Course No. Subject Teaching Schedule Examination
More information