MLR Institute of Technology Laxma Reddy Avenue, Dundigal, Quthbullapur (M), Hyderabad 500 043 Phone Nos: 08418 204066 / 204088, Fax: 08418 204088 COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION Course Title : NETWORK SECURITY Course Code : 56030 Regulation : R09(JNTUH) Lectures Tutorials Practical s Credits Course Structure : 4 0-4 Course Coordinator : Ms N.SHIRISHA Assistant Professor Team of Instructors : Mr Ch. Subba Reddy, Assistant Professor I. COURSE OVERVIEW: This course provides an introduction to the field of network security. Specific topics to be examined include threats and vulnerabilities to network architectures and protocols. The course is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop security policies that will protect an organization s information. Students will learn how to evaluate network and Internet security issues and design. II. PREREQUISITES: Level Credits Periods / Week Prerequisites UG 3 4 Data Communication and Computer Networks III. MARKS DISTRIBUTION: Sessional Marks Mid Semester Test There shall be two midterm examinations. Each midterm examination consists of subjective type and objective type tests. The subjective test is for 10 marks of 60 minutes duration. Subjective test of shall contain 4 questions; the student has to answer 2 questions, each carrying 5 marks. The objective type test is for 10 marks of 20 minutes duration. It consists of 10 Multiple choice and 10 objective type questions, the student has to answer all the questions and each carries half mark. First midterm examination shall be conducted for the first two and half units of syllabus and second midterm examination shall be conducted for the remaining portion. Assignment Five marks are earmarked for assignments. There shall be two assignments in every theory course. Marks shall be awarded considering the average of two assignments in each course. University End Exam marks Total marks 75 100 1 P a g e
IV. EVALUATION SCHEME: S. No Component Duration Marks 1. I Mid Examination 80 minutes 20 2. I Assignment - 5 3. II Mid Examination 80 minutes 20 4. II Assignment - 5 5. External Examination 3 hours 75 V. COURSE OBJECTIVES: i. Understand the basic categories of threats to computers and networks. ii. List various cryptographic algorithms. iii. Describe public-key cryptography. iv. Analyze PGP key pair and use the PGP package to send an encrypted e-mail message. v. Understand how IP protocol provides security through IPSec protocols that provide web security. vi. State how network management is provided by SNMP and firewall secures the data in the network. VI. COURSE OUTCOMES: At the end of the course the students are able to: 1. Differentiate network security and computer security. 2. Understand various attacks on network. 3. List various conventional cryptography algorithms. 4. Analyze key management and approaches to message authentication. 5. List various asymmetric encryption algorithms. 6. State various authentication services. 7. Analyze how PGP is used to protect messages transmitted through e-mail. 8. Analyze how S/MIME is used to protect messages transmitted through e-mail. 9. State how IPSec provides security for IP protocol. 10. Understand the process of combining security association and key management. 11. State various requirements for web security and implementing security through SSL/TLS. 12. Understand how credit card transactions are protected through SET. 13. Analyze how security is provided for many applications through SNMP. 14. List various intruders. 15. Understand various firewall design principles. 16. State intrusion detection system. 2 P a g e
VII. HOW PROGRAM OUTCOMES ARE ASSESSED: a b c Program Outcomes Level Proficiency assessed by An ability to apply knowledge of computing, mathematical S Assignments foundations, algorithmic principles, and computer science and and Tutorials engineering theory in the modeling and design of computer-based systems to real-world problems (fundamental engineering analysis skills). An ability to design and conduct experiments, as well as to N ----- analyze and interpret data (information retrieval skills). An ability to design, implement, and evaluate a computer-based system, process, component, or program to meet desired needs, within realistic constraints such as economic, environmental, social, political, health and safety, manufacturability, and sustainability (creative skills). H Designing Network d An ability to function effectively on multi-disciplinary teams H Experiments (teamwork). e An ability to analyze a problem, and identify, formulate and use the appropriate computing and engineering requirements for H Assignments, Exams obtaining its solution (engineering problem solving skills). f An understanding of professional, ethical, legal, security and N ----- social issues and responsibilities (professional integrity). g An ability to communicate effectively both in writing and N ----- orally(speaking /writing skills) h The broad education necessary to analyze the local and global S Experiments impact of computing and engineering solutions on individuals, organizations, and society (engineering impact assessment skills). i Recognition of the need for, and an ability to engage in continuing professional development and life-long learning (continuing education awareness). H Assignments, Tutorials and Exams j A knowledge of contemporary issues (social awareness). ----- k An ability to use current techniques, skills, and tools necessary for H Lab, Exams computing and engineering practice (practical engineering analysis skills). l An ability to apply design and development principles in the construction of software and hardware systems of varying complexity (software hardware interface). N ----- m An ability to recognize the importance of professional N ----- development by pursuing postgraduate studies or face competitive examinations that offer challenging and rewarding careers in computing (successful career and immediate employment). N= None S= Supportive H = Highly Related VIII. SYLLABUS: UNIT I Security Attacks (Interruption, Interception, Modification and Fabrication), Security Services (Confidentiality, Authentication, Integrity, Non-repudiation, access Control and Availability) and Mechanisms, A model for Internetwork security, Internet Standards and RFCs, Buffer overflow & format string vulnerabilities, TCP session hijacking, ARP attacks, route table modification, UDP hijacking, and man-in-the-middle attacks. 3 P a g e
UNIT-II Conventional Encryption Principles, Conventional Encryption Algorithms, Cipher block modes of operation, Location of encryption devices, Key distribution, Approaches of message authentication, secure Hash functions and HMAC UNIT-III Public key cryptography principles, public key cryptography algorithms, digital signatures, digital certificates, Certificate Authority and key management Kerberos, X.509 Directory Authentication Services. UNIT-IV Email privacy: Pretty Good Privacy (PGP) and S/MIME. UNIT-V IP security Overview, IP Security Architecture, Authentication Header, Encapsulation Security Payload, Combining Security Associations and Key Management. UNIT-VI Web Security Requirements, Secure Socket Layer (SSL) and Transport Layer Security (TLS), Secure Electronic Transaction (SET). UNIT-VII Basic concepts of SNMP, SNMPv1 Community facility and SNMPv3. Intruders, Viruses and threats. UNIT-VIII Firewall Design principles, Trusted Systems. Intrusion Detection Systems TEXT BOOKS 1. Network Security Essentials (Application and Standards) by William Stallings Pearson Education. 2. Hack Proofing your network by Ryan Russell, Dan Kaminski, Rain Forest Puppy, Joe Grand, David Ahmad, Hal Flynn Ido Dubrawsky.. REFERENCES 1. Fundamentals of Network Security by Eric Maiwald (Dreamtech press). 2. Network Security-Private Communication in a public World by Charlie Kaufman, Radia Perlman and Mike Speciner, Pearson/PHI.. 3. Cryptography and network security, Third edition, Stallings, PHI/Pearson. 4. Principles of Information Security, Whitman, Thomson. 5. Network Security: The complete reference, Robert Bragg, Mark Rhodes. 6. Introduction to Cryptography, Bachmann, Springr. IX. COURSE PLAN: At the end of the course, students are able to achieve the following learning outcomes Lecture No. 1 2 3 4 Course Learning Outcomes Topics to be covered Reference Understand the importance of identifying threats to network Analyze how network model is Designed Understand how internet standards are standardized using RFC s Evaluate various types of attacks on the network. Security Attacks, Services, Mechanisms A model for internetwork security Internet Standards and RFCs Buffer overflow, Format string vulnerabilities T1:1.3-1.7 R2, R3 4 P a g e
Lecture No. 5 6 7 8 9 10 11 12 13 14 15 16 17 18 Course Learning Outcomes Topics to be covered Reference Understand how routing tables are modified by attackers Understand how sessions are hijacked in UDP Understand how Unauthorized person acquires data in middle of transmission of data in network Classify various algorithms used for sending data securely in network Understand how plaintext is Processed Analyze how security depends on location of encryption devices in network Evaluate how security keys are being used in network Understand how secret keys are being distributed Analyze various methods for authenticating messages Understand public key cryptography principles Understand various public key cryptography algorithms Understand various key exchange Algorithms Solve secret key using Diffie Hellman Illustrate how security provided through signature 19 Compare various security aspects for entering into secure network 20 Understand Kerberos authentication Service 21 Understand X.509 authentication Service 22 Compare all authentication services 23 Understand how provide security to data sending through email 24 Understand PGP functionality 25 Analyze how MIME is used 26 27 Analyze the importance of secured architecture for internet protocol Understand how authentication header provides authentication TCP session hijacking, ARP attack Route table modification UDP hijacking Man-in the middle attacks Conventional encryption principles, Conventional encryption algorithms(des, AES) Cipher block modes of operation, Location of encryption devices Key distribution, Approaches of message authentication Public key cryptography principles, Public key cryptography algorithms(rsa, security aspects of RSA, Diffie Hellman key exchange, elliptic curve cryptography) Digital signatures and certificates, Certificate authority and key management, Kerberos, X.509 directory authentication services, Authentication procedures in X.509 E-mail, PGP(authentication, confidentiality, authentication and confidentiality) PGP(compression, E-mail compatibility, segmentation and reassembling) S/MIME content types, S/MIME transfer encodings Functionality of S/MIME, S/MIME message IP security overview, Architecture Authentication header T1:2.1-2.2,2.4 T1:2.5-2.6,3.1 T1:3.3-3.4 T1:3.5,3.6, 4.1-4.2 T1:5.1 T1:5.2 T1:6.1-6.3 5 P a g e
Lecture No. 28 Analyze where to place the AH in IP Packet 29 Understand AH in IP packet 30 Understand ESP protocol to secure IP packets 31 Understand key management Process 32 Analyze OAKLEY key exchange Method 33 Analyze ISAKMP key exchange Method 34 Understand web security requirements 35 Analyze how SSL provides security in www 36 Analyze how TLS standardized SSL 37 Understand various protocols of SSL 38 Analyze different layered security in Web 39 Understand various protocols of SSL 40 Understand how credit card 41 42 Course Learning Outcomes Topics to be covered Reference transactions are secured Analyze securing data/money in online transaction though SET Understand how devices are managed on IP network 43 Analyze how many applications are processed and secured 44 Understand how SNMP is used 45 Explain the process of VACM 46 Analyze key localization process 47 Analyze the process of identifying malicious activity in network 48 Understand various types of threats 49 Understand various types of viruses 50-54 Understand firewall design Principles 55 Evaluate different techniques which inspects network traffic 56 Understand how systems are Trusted 57 Analyze different malicious software s 58 Understand how Trojan horse is Detected 59 Understand how data is protected from Trojan horse Encapsulation security payload, Combining security association Key management(oakley), ISAKMP, ISAKMP exchanges Web security introduction, Requirements, Secure socket layer(architecture, record protocol, change cipher spec protocol) SSL(alert protocol, handshake protocol), Transport layer security(tls), Secure electronic transaction(set) Basic concepts of SNMP, SNMP V1 community facility, SNMP V3(architecture, manager, agent) SNMP V3(applications, key localization, VACM) Intruders Viruses and related threats Firewall design principles- application gateway, Firewall configurations Trusted systems- data access, control, concepts Intrusion detection system, Trojan horse defense T1:6.4-6.6 T1:7.1-7.2 T1:7.2-7.3 T1:8.1-8.3 T1:9.1,10.1-10.2 T:11.1-11.2 T1:11.2, 9.2 6 P a g e
X. MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT OF THE PROGRAM OUTCOMES: Program Outcomes Course Objectives a b c d e f g h i j k l m I H S II H S III H S IV S H V H S VI S H S = Supportive H = Highly Related XI. MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT OF THE PROGRAM OUTCOMES: Program Outcomes Course Outcomes a b c d e f g h i j k l m 1 S 2 H 3 S 4 S H 5 S 6 S 7 S 8 H 9 S 10 H 11 S 12 S 13 S 14 H 15 S 16 S S = Supportive H = Highly Related Prepared by: Ms. D. Rajani Bai, Assistant Professor; Mr. N. Bashwanth, Assistant Professor HOD, COMPUTER SCIENCE AND ENGINEERING 7 P a g e