MLR Institute of Technology

Similar documents
COURSE PLAN. Name of the Faculty:: K.ROSHAN & M.A.MUNEER Designation: Assoc.Professor Asst. Professor. Name Of The Programme:: B.

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

Academic Course Description

INSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad

10EC832: NETWORK SECURITY

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous)

INSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad INFORMATION TECHNOLOGY COURSE DESCRIPTION FORM

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

MLR Institute of Technology

SRI VENKATESWARA COLLEGE OF ENGINEERING

INSTITUTE OF AERONAUTICAL ENGINEERING Autonomous Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

Faculty of Science & Information Technology

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,

INSTITUTE OF AERONAUTICAL ENGINEERING (AUTONOMOUS) Dundigal, Hyderabad

Introduction and Overview. Why CSCI 454/554?

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

G. PULLAIAH COLLEGE OF ENGINEERING AND TECHNOLOGY Pasupula, Nandikotkur Road, Kurnool

Academic Course Description

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

INSTITUTE OF AERONAUTICAL ENGINEERING

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements

Syllabus: The syllabus is broadly structured as follows:

Academic Course Description

City University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester B 2017/18

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

University of Asia Pacific (UAP) Department of Computer Science and Engineering (CSE) Course Outline

FIT5044 Network security. Unit Guide. Semester 1, 2010

Cryptography and Network Security Chapter 16. Fourth Edition by William Stallings

Academic Course Description

Name of chapter & details.

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

St. MARTIN s ENGINERING COLLEGE Dhulapally,Secunderabad

IT443 Network Security Administration Spring Gabriel Ghinita University of Massachusetts at Boston

INSTITUTE OF AERONAUTICAL ENGINEERING

Networks and Communications MS216 - Course Outline -

Course Name: Computer Networks-1 Course Code: IT222

(2½ hours) Total Marks: 75

AIT 682: Network and Systems Security

University of Asia Pacific (UAP) Department of Electrical and Electronics Engineering (EEE) Course Outline

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

SYLLABUS. DIVISION: Business and Engineering Technology REVISED: FALL 2015 CREDIT HOURS: 4 HOURS/WK LEC: 4 HOURS/WK LAB: 0 LEC/LAB COMB: 4

COURSE PLAN Regulation: R11 FACULTY DETAILS: Department::

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

Security+ SY0-501 Study Guide Table of Contents

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

Part A: Course Outline

Academic Course Description

A & B Section. Day. A Mrs. Krishnaveni S 1204 UB

G.PULLAIH COLLEGE OF ENGINEERING & TECHNOLOGY

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

KALASALINGAM UNIVERSITY

Total No. of Questions : 09 ] [ Total No.of Pages : 02

Computer Networking. What is network security? Chapter 7: Network security. Symmetric key cryptography. The language of cryptography

Textbook Charles Petzold, Programming Windows, 5th edition, Microsoft Press. References - other textbooks or materials none

Cryptography and Network Security

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to

BS Electrical Engineering Program Assessment Plan By Dan Trudnowski Spring 2018

Understanding Cisco Cybersecurity Fundamentals

CSCE 715: Network Systems Security

The Internet community has developed application-specific security mechanisms in a number of application areas, including electronic mail (S/MIME,

14. Internet Security (J. Kurose)

CS 356 Internet Security Protocols. Fall 2013

PESIT SOUTH CAMPUS 10IS835: INFORMATION AND NETWORK SECURITY. Faculty Name: Aisha Begam No. of Hours: 52

Academic Course Description

Transport Level Security

Cryptography and Network Security

COURSE DESCRIPTION FORM. Level Credits Periods/ Week Prerequisites

HOLY ANGEL UNIVERSITY COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY CYBER SECURITY COURSE SYLLABUS

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :

CRYPTOGRAPHY AND NETWORK SECURITY

Information Security: Principles and Practice Second Edition. Mark Stamp

BCA III Network security and Cryptography Examination-2016 Model Paper 1

Department of Computer Science and Engineering NITK, Surathkal IS703 - Network Security [M. Tech-ISE] (Syllabus and Assessment Plan)

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

School of Engineering & Computational Sciences

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

Ethical Hacker Foundation and Security Analysts Course Semester 2

Introduction to Network Security Missouri S&T University CPE 5420 Exam 2 Logistics

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

INSTITUTE OF AERONAUTICAL ENGINEERING

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II

Systems and Network Security (NETW-1002)

Introduction to information Security

CS 134: Elements of Cryptography and Computer + Network Security Winter sconce.ics.uci.edu/134-w16/ CS 134 Background

Cryptography and secure channel. May 17, Networks and Security. Thibault Debatty. Outline. Cryptography. Public-key encryption

Chapter 6. IP Security. Dr. BHARGAVI H. GOSWAMI Department of Computer Science Christ University

CSCE 813 Internet Security Final Exam Preview

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

Implementing Cisco Network Security (IINS) 3.0

CS System Security 2nd-Half Semester Review

Course Intended Learning Outcomes (CILOs): Upon successful completion of this course, students should be able to:

Network Security and Cryptography. December Sample Exam Marking Scheme

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

Cryptography and Network Security. Sixth Edition by William Stallings

M.D UNIVERSITY SCHEME OF STUDIES AND EXAMINATION M.TECH 2nd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER 3rd CBCS Scheme effective from

Transcription:

MLR Institute of Technology Laxma Reddy Avenue, Dundigal, Quthbullapur (M), Hyderabad 500 043 Phone Nos: 08418 204066 / 204088, Fax: 08418 204088 COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION Course Title : NETWORK SECURITY Course Code : 56030 Regulation : R09(JNTUH) Lectures Tutorials Practical s Credits Course Structure : 4 0-4 Course Coordinator : Ms N.SHIRISHA Assistant Professor Team of Instructors : Mr Ch. Subba Reddy, Assistant Professor I. COURSE OVERVIEW: This course provides an introduction to the field of network security. Specific topics to be examined include threats and vulnerabilities to network architectures and protocols. The course is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop security policies that will protect an organization s information. Students will learn how to evaluate network and Internet security issues and design. II. PREREQUISITES: Level Credits Periods / Week Prerequisites UG 3 4 Data Communication and Computer Networks III. MARKS DISTRIBUTION: Sessional Marks Mid Semester Test There shall be two midterm examinations. Each midterm examination consists of subjective type and objective type tests. The subjective test is for 10 marks of 60 minutes duration. Subjective test of shall contain 4 questions; the student has to answer 2 questions, each carrying 5 marks. The objective type test is for 10 marks of 20 minutes duration. It consists of 10 Multiple choice and 10 objective type questions, the student has to answer all the questions and each carries half mark. First midterm examination shall be conducted for the first two and half units of syllabus and second midterm examination shall be conducted for the remaining portion. Assignment Five marks are earmarked for assignments. There shall be two assignments in every theory course. Marks shall be awarded considering the average of two assignments in each course. University End Exam marks Total marks 75 100 1 P a g e

IV. EVALUATION SCHEME: S. No Component Duration Marks 1. I Mid Examination 80 minutes 20 2. I Assignment - 5 3. II Mid Examination 80 minutes 20 4. II Assignment - 5 5. External Examination 3 hours 75 V. COURSE OBJECTIVES: i. Understand the basic categories of threats to computers and networks. ii. List various cryptographic algorithms. iii. Describe public-key cryptography. iv. Analyze PGP key pair and use the PGP package to send an encrypted e-mail message. v. Understand how IP protocol provides security through IPSec protocols that provide web security. vi. State how network management is provided by SNMP and firewall secures the data in the network. VI. COURSE OUTCOMES: At the end of the course the students are able to: 1. Differentiate network security and computer security. 2. Understand various attacks on network. 3. List various conventional cryptography algorithms. 4. Analyze key management and approaches to message authentication. 5. List various asymmetric encryption algorithms. 6. State various authentication services. 7. Analyze how PGP is used to protect messages transmitted through e-mail. 8. Analyze how S/MIME is used to protect messages transmitted through e-mail. 9. State how IPSec provides security for IP protocol. 10. Understand the process of combining security association and key management. 11. State various requirements for web security and implementing security through SSL/TLS. 12. Understand how credit card transactions are protected through SET. 13. Analyze how security is provided for many applications through SNMP. 14. List various intruders. 15. Understand various firewall design principles. 16. State intrusion detection system. 2 P a g e

VII. HOW PROGRAM OUTCOMES ARE ASSESSED: a b c Program Outcomes Level Proficiency assessed by An ability to apply knowledge of computing, mathematical S Assignments foundations, algorithmic principles, and computer science and and Tutorials engineering theory in the modeling and design of computer-based systems to real-world problems (fundamental engineering analysis skills). An ability to design and conduct experiments, as well as to N ----- analyze and interpret data (information retrieval skills). An ability to design, implement, and evaluate a computer-based system, process, component, or program to meet desired needs, within realistic constraints such as economic, environmental, social, political, health and safety, manufacturability, and sustainability (creative skills). H Designing Network d An ability to function effectively on multi-disciplinary teams H Experiments (teamwork). e An ability to analyze a problem, and identify, formulate and use the appropriate computing and engineering requirements for H Assignments, Exams obtaining its solution (engineering problem solving skills). f An understanding of professional, ethical, legal, security and N ----- social issues and responsibilities (professional integrity). g An ability to communicate effectively both in writing and N ----- orally(speaking /writing skills) h The broad education necessary to analyze the local and global S Experiments impact of computing and engineering solutions on individuals, organizations, and society (engineering impact assessment skills). i Recognition of the need for, and an ability to engage in continuing professional development and life-long learning (continuing education awareness). H Assignments, Tutorials and Exams j A knowledge of contemporary issues (social awareness). ----- k An ability to use current techniques, skills, and tools necessary for H Lab, Exams computing and engineering practice (practical engineering analysis skills). l An ability to apply design and development principles in the construction of software and hardware systems of varying complexity (software hardware interface). N ----- m An ability to recognize the importance of professional N ----- development by pursuing postgraduate studies or face competitive examinations that offer challenging and rewarding careers in computing (successful career and immediate employment). N= None S= Supportive H = Highly Related VIII. SYLLABUS: UNIT I Security Attacks (Interruption, Interception, Modification and Fabrication), Security Services (Confidentiality, Authentication, Integrity, Non-repudiation, access Control and Availability) and Mechanisms, A model for Internetwork security, Internet Standards and RFCs, Buffer overflow & format string vulnerabilities, TCP session hijacking, ARP attacks, route table modification, UDP hijacking, and man-in-the-middle attacks. 3 P a g e

UNIT-II Conventional Encryption Principles, Conventional Encryption Algorithms, Cipher block modes of operation, Location of encryption devices, Key distribution, Approaches of message authentication, secure Hash functions and HMAC UNIT-III Public key cryptography principles, public key cryptography algorithms, digital signatures, digital certificates, Certificate Authority and key management Kerberos, X.509 Directory Authentication Services. UNIT-IV Email privacy: Pretty Good Privacy (PGP) and S/MIME. UNIT-V IP security Overview, IP Security Architecture, Authentication Header, Encapsulation Security Payload, Combining Security Associations and Key Management. UNIT-VI Web Security Requirements, Secure Socket Layer (SSL) and Transport Layer Security (TLS), Secure Electronic Transaction (SET). UNIT-VII Basic concepts of SNMP, SNMPv1 Community facility and SNMPv3. Intruders, Viruses and threats. UNIT-VIII Firewall Design principles, Trusted Systems. Intrusion Detection Systems TEXT BOOKS 1. Network Security Essentials (Application and Standards) by William Stallings Pearson Education. 2. Hack Proofing your network by Ryan Russell, Dan Kaminski, Rain Forest Puppy, Joe Grand, David Ahmad, Hal Flynn Ido Dubrawsky.. REFERENCES 1. Fundamentals of Network Security by Eric Maiwald (Dreamtech press). 2. Network Security-Private Communication in a public World by Charlie Kaufman, Radia Perlman and Mike Speciner, Pearson/PHI.. 3. Cryptography and network security, Third edition, Stallings, PHI/Pearson. 4. Principles of Information Security, Whitman, Thomson. 5. Network Security: The complete reference, Robert Bragg, Mark Rhodes. 6. Introduction to Cryptography, Bachmann, Springr. IX. COURSE PLAN: At the end of the course, students are able to achieve the following learning outcomes Lecture No. 1 2 3 4 Course Learning Outcomes Topics to be covered Reference Understand the importance of identifying threats to network Analyze how network model is Designed Understand how internet standards are standardized using RFC s Evaluate various types of attacks on the network. Security Attacks, Services, Mechanisms A model for internetwork security Internet Standards and RFCs Buffer overflow, Format string vulnerabilities T1:1.3-1.7 R2, R3 4 P a g e

Lecture No. 5 6 7 8 9 10 11 12 13 14 15 16 17 18 Course Learning Outcomes Topics to be covered Reference Understand how routing tables are modified by attackers Understand how sessions are hijacked in UDP Understand how Unauthorized person acquires data in middle of transmission of data in network Classify various algorithms used for sending data securely in network Understand how plaintext is Processed Analyze how security depends on location of encryption devices in network Evaluate how security keys are being used in network Understand how secret keys are being distributed Analyze various methods for authenticating messages Understand public key cryptography principles Understand various public key cryptography algorithms Understand various key exchange Algorithms Solve secret key using Diffie Hellman Illustrate how security provided through signature 19 Compare various security aspects for entering into secure network 20 Understand Kerberos authentication Service 21 Understand X.509 authentication Service 22 Compare all authentication services 23 Understand how provide security to data sending through email 24 Understand PGP functionality 25 Analyze how MIME is used 26 27 Analyze the importance of secured architecture for internet protocol Understand how authentication header provides authentication TCP session hijacking, ARP attack Route table modification UDP hijacking Man-in the middle attacks Conventional encryption principles, Conventional encryption algorithms(des, AES) Cipher block modes of operation, Location of encryption devices Key distribution, Approaches of message authentication Public key cryptography principles, Public key cryptography algorithms(rsa, security aspects of RSA, Diffie Hellman key exchange, elliptic curve cryptography) Digital signatures and certificates, Certificate authority and key management, Kerberos, X.509 directory authentication services, Authentication procedures in X.509 E-mail, PGP(authentication, confidentiality, authentication and confidentiality) PGP(compression, E-mail compatibility, segmentation and reassembling) S/MIME content types, S/MIME transfer encodings Functionality of S/MIME, S/MIME message IP security overview, Architecture Authentication header T1:2.1-2.2,2.4 T1:2.5-2.6,3.1 T1:3.3-3.4 T1:3.5,3.6, 4.1-4.2 T1:5.1 T1:5.2 T1:6.1-6.3 5 P a g e

Lecture No. 28 Analyze where to place the AH in IP Packet 29 Understand AH in IP packet 30 Understand ESP protocol to secure IP packets 31 Understand key management Process 32 Analyze OAKLEY key exchange Method 33 Analyze ISAKMP key exchange Method 34 Understand web security requirements 35 Analyze how SSL provides security in www 36 Analyze how TLS standardized SSL 37 Understand various protocols of SSL 38 Analyze different layered security in Web 39 Understand various protocols of SSL 40 Understand how credit card 41 42 Course Learning Outcomes Topics to be covered Reference transactions are secured Analyze securing data/money in online transaction though SET Understand how devices are managed on IP network 43 Analyze how many applications are processed and secured 44 Understand how SNMP is used 45 Explain the process of VACM 46 Analyze key localization process 47 Analyze the process of identifying malicious activity in network 48 Understand various types of threats 49 Understand various types of viruses 50-54 Understand firewall design Principles 55 Evaluate different techniques which inspects network traffic 56 Understand how systems are Trusted 57 Analyze different malicious software s 58 Understand how Trojan horse is Detected 59 Understand how data is protected from Trojan horse Encapsulation security payload, Combining security association Key management(oakley), ISAKMP, ISAKMP exchanges Web security introduction, Requirements, Secure socket layer(architecture, record protocol, change cipher spec protocol) SSL(alert protocol, handshake protocol), Transport layer security(tls), Secure electronic transaction(set) Basic concepts of SNMP, SNMP V1 community facility, SNMP V3(architecture, manager, agent) SNMP V3(applications, key localization, VACM) Intruders Viruses and related threats Firewall design principles- application gateway, Firewall configurations Trusted systems- data access, control, concepts Intrusion detection system, Trojan horse defense T1:6.4-6.6 T1:7.1-7.2 T1:7.2-7.3 T1:8.1-8.3 T1:9.1,10.1-10.2 T:11.1-11.2 T1:11.2, 9.2 6 P a g e

X. MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT OF THE PROGRAM OUTCOMES: Program Outcomes Course Objectives a b c d e f g h i j k l m I H S II H S III H S IV S H V H S VI S H S = Supportive H = Highly Related XI. MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT OF THE PROGRAM OUTCOMES: Program Outcomes Course Outcomes a b c d e f g h i j k l m 1 S 2 H 3 S 4 S H 5 S 6 S 7 S 8 H 9 S 10 H 11 S 12 S 13 S 14 H 15 S 16 S S = Supportive H = Highly Related Prepared by: Ms. D. Rajani Bai, Assistant Professor; Mr. N. Bashwanth, Assistant Professor HOD, COMPUTER SCIENCE AND ENGINEERING 7 P a g e