0% found this document useful (0 votes)
136 views3 pages

CSD4003 Network-And-System-Security LP 1.0 6 CSD4003

This 3-credit course aims to teach students about network and system security. The course objectives are to learn about vulnerabilities, perform security assessments, and secure communication and computer systems. The course outcomes are for students to understand network security threats, cryptography concepts, and how to secure computer networks. The course contains 6 units covering topics such as network security concepts, security threats, vulnerabilities, hashing algorithms, intrusion detection/prevention systems, and a guest lecture. Student learning is assessed through exams, quizzes, and portfolios.

Uploaded by

Vibhu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
136 views3 pages

CSD4003 Network-And-System-Security LP 1.0 6 CSD4003

This 3-credit course aims to teach students about network and system security. The course objectives are to learn about vulnerabilities, perform security assessments, and secure communication and computer systems. The course outcomes are for students to understand network security threats, cryptography concepts, and how to secure computer networks. The course contains 6 units covering topics such as network security concepts, security threats, vulnerabilities, hashing algorithms, intrusion detection/prevention systems, and a guest lecture. Student learning is assessed through exams, quizzes, and portfolios.

Uploaded by

Vibhu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Course Code Course Type Credits

Network and System Security


CSD4003 LP 3
Course Objectives:
 To learn about types of possible vulnerabilities for Network and System
 To be able to perform security assessment of Computer Network and System
 To know about methods and techniques to secure communication
 To learn and apply methods for securing Computer
System.

Course Outcomes:
At the completion of this course, students should be able to do the following:
 Understanding of network security threats.
 Understanding of concepts related to applied cryptography, including plaintext,
cipher text, symmetric
 Cryptography, asymmetric cryptography, and digital signatures.
 Students will be able to understand the security mechanisms to secure a
Computer Network System

Student Outcomes (SO): a, b, i


a. An ability to apply the knowledge of mathematics, science and computing appropriate
to the discipline
b. An ability to analyze a problem, identify and define the computing requirements
appropriate to its solution.
i. Design and conduct experiments as well as analyze and interpret data
Unit No. of
Unit Content SOs
No hours
1 Network Security Concept 7 a,b
Network security definition, Security Services: Access
Control, Authentication, Confidentiality, Integrity, Non-
repudiation, Elements of Security: The Security Policy,
Access Control, Strong Encryption Algorithms,
Authentication Techniques, Auditing

2 Security Threats to Computer Network 10 a,b


Introduction, Sources of Security Threats: Weakness in
Network Infrastructure and Communication Protocols,
Rapid Growth of Cyberspace, Growth of Hacker
Community, Vulnerability in operating system protocol,
Physical theft, Security Threat Management, Security
Threat Motives, Security Threat Correlation, Security
Threat Awareness
3 Computer Network Vulnerabilities 10 b,i
Sources of Vulnerabilities : Design Flaws, Poor Security
Management, Incorrect Implementation, Internet
Technologies Vulnerabilities, Changing nature of Hacker
Technologies and Activities, Difficulty of Fixing
Vulnerable Systems, Limits of Effectiveness of Reactive
Solutions, Social Engineering, Vulnerability Assessment :
Vulnerability Assessment, Advantages of Vulnerability
Assessment Services
4 Hashing algorithms and Digital Signature: Hashing 07 a,b,i
algorithms and digital signature, Symmetric and
asymmetric encryption algorithms, Public key
infrastructure, Digital certificates and key management
Applications of cryptography in network security
5 Intrusion Detection and Prevention Systems 09 a,b
Categories of IDS and IPS, Components and deployment
of IDS, Maintenance and performance evaluation ,
Organizational Security Issues, Risk analysis and network
modeling, Assessing the security needs of an enterprise,
Security policies for network operations, Disaster recovery
and business continuity

6 Guest Lecture on Contemporary Topics 02


Total Hours: 45
Mode of Teaching and Learning: Flipped Class Room, Activity Based
Teaching/Learning, Digital/Computer based models, wherever possible to augment
lecture for practice/tutorial and minimum 2 hours lectures by industry experts on
contemporary topics
Mode of Evaluation and assessment:
The assessment and evaluation components may consist of unannounced open book
examinations, quizzes, student’s portfolio generation and assessment, and any other
innovative assessment practices followed by faculty, in addition to the Continuous
Assessment Tests and Final Examinations.
Text Books:
1. Kizza, Joseph Migga, Computer Network Security, 2005, Spinger, ISBN: 0-387-
20473-3
2. Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: Private
Communication in a Public World, 2nd Edition, Prentice Hall, 2002, ISBN: 0-13-
046019-2
Reference Books:
1. John R. Vacca, 'Network and System Security' 2nd Edition, Syngress Publishers,
ISBN:9780124166899

Recommendation by the Board of Studies 17 January 2020


on
Approval by Academic council on 20.01.2020
Compiled by Dr. Kanchanlata Kashyap

You might also like