System Security

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Subject

Code Subject Name Teaching Scheme Credits Assigned


Theory Practical Tutorial Theory Practical Tutorial Total
ECC
DO802 System Security 03 02 -- 03 -- 3

Examination Scheme

Subject Subject Theory Marks


Code Name Exam Term Prac
Internal assessment End duratio Work tical Oral Total
Test Test Avg of Test 1 Sem. n
1 2 and Test 2 Exam Hours
ECC System 20 20 20 80 03 -- 100
DO802 Security

Course Pre-requisite: Computer Networks

Course Objectives:

1. To understand the fundamentals of system security.


2. To explore the working principles and utilities of various crypto algorithms
including Secret key Cryptography and public key algorithms
3. To understand the various controls available for protection against internet attacks,
including integrity check, firewalls, intruder detection systems.
4. To understand, and evaluate different attacks on Open Web Applications and Web
services
5. To describe the mechanisms used to provide security in different infrastructure and
networks.
6. To perform Security Auditing and Analysis

Course Outcomes:

After successful completion of the course students will be able to:

1. Understand the concept of vulnerabilities, attacks and protection mechanisms.


2. Understand theworkingof various crypto algorithms.
3. Analyzevarious controls available for protection against internet attacks.
4. Evaluate different attacks on Open Web Applications and Web services
5. Analyze mechanisms used to provide security in different infrastructure and networks
6. Perform security monitoring and testing of system

Module Unit
Contents Hrs.
No. No.

1 The Need for System Security 4


1.1 Risks, Threats, and Vulnerabilities, Tenets of Information Systems

Security (Confidentiality,Integrity ,Availability )


1.2 Malicious Attack
Birthday Attacks ,Brute-Force Password Attacks ,
Dictionary Password Attacks, IP Address Spoofing
Hijacking ,Replay Attacks ,Man-in-the-Middle Attacks
Masquerading ,Eavesdropping ,Social Engineering, Phreaking ,Phishing
,Pharming .
2 Cryptography 6
2.1 Cryptography : Overview of Cryptography : What is cryptography ,
encryption and decryption techniques ,Symmetric and asymmetric key
cryptography : AES, DES, RSA, Knapsack cryptosystem.
3 Network Security 9
3.1 Firewall: Need of Firewall, types of firewall- Packet Filters, Stateful Packet
Filters, Application Gateways, Circuit gateways. Firewall Policies,
Configuration, limitations, DMZ, VPN.
3.2 Intrusion Detection System Vulnerability Assessment, Misuse detection,
Anomaly Detection, Network Based IDS, Host-Based IDS, Honeypots
3.3 Kerberos: Working, AS, TGS, SS
3.4 IP Security- Overview, Protocols- AH, ESP, Modes- transport and Tunnel.
3.5 Public key infrastructure Introduction, Certificates, (PKI): Certificate Authority,
authority, Registration
3.6 X.509/PKIX certificate format.
3.7 Basic concepts of SNMP, SNMPv1 Community facility and SNMPv3
4 Web Security 7
4.1 Web Security Considerations, User Authentication and Session Management,
Cookies, SSL, HTTPS, SSH, Privacy on Web, Web Browser Attacks, Account
Harvesting, Web Bugs, Clickjacking, CrossSite Request Forgery, Session
Hijacking and Management, Secure Electronic Transaction, Email Attacks,
DNS Attacks, Web Service Security.
5 5 Infrastructure Security 9

5.1 Physical Security: Managerial, Technical And Physical


Controls,
Environmental Exposures And Controls, Physical Access Controls
5.2 Wireless network Security: IEEE 802.11xWireless LAN Security, Wireless
Intrusion Detection System (WIDS)
5.3 Mobile Security: Security Threats, Device Security, Cloud Security: Cloud Security
Risks and Countermeasures, Cloud Identity and Access Management, Cloud Security
as a Service, SAML, OAuth

5.4 IOT Security: IoT Concepts, IoT Attacks, IoT Hacking Methodology, IoT
Hacking Tools, IoT Countermeasures

6 Security Auditing and Analysis 4


6.1
How to define your audit plan?
What auditing benchmarks are
? How to collect audit data?
Which post-audit activities you need to
perform? How to perform security monitoring?
Which types of log information you should
capture? How to verify security controls ?
• How to monitor and test your security systems?

Total 39

Text Books:
1. Computer Security Principles and Practice, William Stallings, Sixth Edition, Pearson
Education
2. Security in Computing, Charles P. Pfleeger, Fifth Edition, Pearson Education .
3. Fundamentals of Information system security, Third Edition, David Kim,Michael G.
Solomon Jones & Bartlett Learning
4. Network Security and Cryptography, Bernard Menezes, Cengage Learning
5. Network Security Bible, Eric Cole, Second Edition, Wiley
https://docplayer.net/18146681-Network-security-bible-dr-eric-cole-dr-ronald-krutz-
and-james-w-conley-wiley.html

Reference Books:
1. Web Application Hackers Handbook by Wiley.
2. Information Security The Complete Reference, 2nd Edition ,Mark Rhodes-
Ousley,McGraw Hill Education
3. Computer Security, Dieter Gollman, Third Edition, Wiley
4. CCNA Security Study Guide, Tim Boyle, WileyFlipcart 582/-
5. Introduction to Computer Security, Matt Bishop, Pearson.
6. Cloud Security and Privacy, Tim Mather, Subra Kumaraswamy, Shahed Latif
,O’Reilly

Internal Assessment (IA):

Two tests must be conducted which should cover at least 80% of syllabus. The average
marks of both the test will be considered as final IA marks

End Semester Examination:

1. Question paper will comprise of 6 questions, each of 20 marks.


2. Total 4 questions need to be solved.
3. Question No.1 will be compulsory and based on entire syllabus wherein sub
questions of 2 to 5 marks will be asked.
4. Remaining questions will be selected from all the modules.

You might also like