0% found this document useful (0 votes)
12 views

Class Notes 2

This document outlines the course details for a Digital Cyber Security paper. It includes 4 units covering topics like introduction to internet security, computer security, safer tools and services, and cryptography and VPNs. It also lists some recommended books and references.

Uploaded by

SP
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Class Notes 2

This document outlines the course details for a Digital Cyber Security paper. It includes 4 units covering topics like introduction to internet security, computer security, safer tools and services, and cryptography and VPNs. It also lists some recommended books and references.

Uploaded by

SP
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Master of Computer Application – II (Semester III)

Paper Code: PSMCAT302


Paper 2: Digital Cyber Security

Credit: 4] [Max. Marks: 80

Unit-I: Introduction to Internet Security


Need for Internet Security, Adopting Security Policies, Strategies for a Secure Network, Ethics of
Computer Security, Security Threats and Levels, Security Plan (RFC 2196). Classes of Attacks:
Stealing Passwords, Social Engineering, Bugs and Backdoors, Authentication Failures, Protocol
Failures, Information Leakage, Exponential Attacks – Virus and Worms, Denial-of-Service-Attacks,
Botnets, Active Attacks.

Unit-II: Computer Security


Introduction to Virus, Trojan Horses, Worms, Bombs, Protection against Virus, Structure of Virus.
Firewalls: Introduction to Firewalls, Kinds of Firewalls: Packet Filters, Application-Level Filtering,
Circuit-Level Gateways, Dynamic Packet Filters, Distributed Firewalls, Firewall Engineering: Rule
sets, Proxies, Building a Firewall from Scratch, Firewall Problems and Testing Firewalls.

Unit-III: Safer Tools and Services


Authentication: Passwords, Smart Cards, Biometrics, RADIUS, SASL, Host-To-Host
Authentication, PKI. Some Tools and Services: Ined-Network Services, Ssh-Terminal And File
Access, Syslog, Network Administration Tools, Chroot-Caging Suspect Software, Jailing The Apache
Web Server, Aftpd-A Simple Anonymous FTP Daemon, Mail Transfer Agents, POP3 And IMAP,
Samba: An SMB Implementation, Taming Named, Adding SSL Support with Sslwrap.

Unit-IV: Cryptography and VPNs


Introduction to Cryptography, Notation, Secret-Key Cryptography, Modes of Operation, Public Key
Cryptography, Exponential Key Exchange, Digital Signatures, Secure Hash Functions, Timestamps,
Basic Encryption and Decryption. Introduction to VPNs, Advantages, Disadvantages of VPN,
VPN Authentication and Authorization, VPN Threats and Exploits, Personal and Network VPNs,
Hardware and Software VPNs, Differences between Layer2 and Layer3 VPNs

Books:
1) W. R. Cheswick, S. M. Bellovin, A. D. Rubin, “Firewalls and Internet Security-Repelling the Wily
Hacker”, Addison-Wesley Publication, “2nd Edition”, Year- 2003, ISBN No- 0-201- 63466-X
2) J. Michael Stewart, “Network Security, Firewalls, and VPNs”, Jones & Bartlett Publication, Year-
2011, ISBN N- 978-0-7637-9130-8

References:
1) Kenneth Einar Himma, “Internet Security: Hacking, Counter Hacking and Society”, Jones &
Bartlett Publication, “1st Edition”, Year- 2007, ISBN No– 978-0-7637-3536-4
2) Man Young Rhee, “Internet Security: Cryptographic Principles, Algorithms and Protocols”, J.
Wiley Publication, Year- 2003, ISBN No- 978-0-4708-5285-9

[MCA - Gondwana University, Gadchiroli] Page 21

You might also like