B.Tech. IV (CO) Semester - 8 |
L |
T |
P |
C |
CO406 : NETWORK & SYSTEM SECURITY (ELECTIVE-I) |
3 |
0 |
0 |
3 |
COURSE OBJECTIVES |
- Introduce students to the concepts, technologies, practices and challenges associated with Information Security and Privacy.
- Introduce the principles and practice of cryptography and network security.
- Examine schemes in different standards, and evaluate their use in different situations.
|
COURSE OUTCOMES |
After successful completion of this course, student will be able to
- Understand the concepts related to the basics of network security like cryptography
- Apply the concept of security services and mechanisms from the application developers and network administrator’s perspective
- Correlate the protection mechanisms of access control lists (ACLs) and of capabilities.
|
COURSE CONTENT |
Introduction: Network & System Security |
(02 Hours) |
SKC and Key management issues, PKC, Hash functions and Digital Signatures |
(02 Hours) |
Key Exchange and PKI |
(02 Hours) |
Channel Security and Side Channel Attacks |
(02 Hours) |
Authentication and Authentication Protocols, CAPTCHA |
(02 Hours) |
Identity management, Biometrics and UIDAI |
(03 Hours) |
Vulnerabilities, Web App Security, VAPT and NVD |
(02 Hours) |
Protecting against programmed threats, intruders, threats, viruses and worms |
(02 Hours) |
Database Security and RBAC/ACL |
(02 Hours) |
Security issues in OS |
(02 Hours) |
Firewalls, VPN and Filters, IPSec |
(03 Hours) |
SSL/TLS and Kerberos |
(02 Hours) |
Malware detection, Black listing and White listing |
(02 Hours) |
IDS/IPS, Signature based and Anomaly based detection |
(03 Hours) |
Tools: Wireshark, SNORT, Scapy, Nesus .. |
(06 Hours) |
Advanced Topics |
(04 Hours) |
(Total Contact Time: 42 Hours) |
BOOKS RECOMMENDED |
- Dhiren Patel, Information Security: Theory and Practice, PHI, 2008/2010.
- William Stallings, "Cryptography and Network Security - Principles and Practice", 6/E, Pearson Education, 2013.
- Menezes Bernard, Network Security and Cryptography, Cengage Learning India, 2010.
- C. P. Fleeger and S. L. Fleeger, "Security in Computing," 4/E, Pearson Education, 2006.
- Burns, Bryan, Dave Killion, Nicolas Beauchesne, Eric Moret, JulienSobrier, Michael Lynn, Eric Markham et al. "Security power tools," O'Reilly Media, Inc., 2007.
|