18EC821 Network Security syllabus for EC



A d v e r t i s e m e n t

Module-1 Attacks on Computers and Computer Security 8 hours

Attacks on Computers and Computer Security:

Need for Security, Security Approaches, Principles of Security Types of Attacks.

Module-2 Transport Level Security 8 hours

Transport Level Security:

Web Security Considerations, Secure Sockets Layer, Transport Layer Security, HTTPS, Secure Shell (SSH)

Module-3 IP Security 8 hours

IP Security:

Overview of IP Security (IPSec),IP SecurityArchitecture, Modes of Operation, Security Associations (SA), Authentication Header (AH), Encapsulating Security Payload (ESP), Internet Key Exchange.

Module-4 Intruders 8 hours

Intruders, Intrusion Detection.

MALICIOUS SOFTWARE:

Viruses and Related Threats, Vrrus Counter measures,

Module-5 Firewalls 8 hours

Firewalls:

The Need for firewalls, Firewall Characteristics, Types of Firewalls, Firewall Biasing, Firewall location and configuration

 

Course Outcomes:

After studying this course, students will be able to:

1. Explain network security services andmechanisms and explain security concepts

2 Understand the concept of Transport Level Security and Secure Socket Layer.

3. Explain Security concerns in Internet Protocol security

4. Explain Intruders, Intrusion detection and Malicious Software

5. Describe Firewalls, Firewall Characteristics, Biasing and Configuration

 

Question paper pattern:

  • Examination will be conducted for 100 marks with question paper containing 10 full questions, each of 20 marks.
  • Each full question can have a maximum of 4 sub questions.
  • There will be 2 full questions from each module covering all the topics ofthe module.
  • Students will have to answer 5 full questions, selecting one full question from each module.
  • The total marks will be proportionally reduced to 60 marks as SEE marks is 60.

 

TEXT BOOKS:

1. Cryptography and Network Security Principles and Practice , Pearson Education Inc., William Stallings, Slh Edition, 2014, ISBN: 978-81- 317- 6166-3.

2. Cryptography and Network Security, Atul Kahate, TMH, 2003.

 

REFERENCE BOOKS:

1. Cryptography and Network Security, Behrouz A. Forouz.an, TMH, 2007.

Last Updated: Tuesday, January 24, 2023