0% found this document useful (0 votes)
49 views6 pages

Draft ICTEd468 Network Security

The document outlines a course on network security. It provides details on the course objectives, topics to be covered including security policies, cryptography, network security, threats and more. It lists specific topics in each section along with the number of hours to be spent on theory and practical work.

Uploaded by

Aaron Abraham
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views6 pages

Draft ICTEd468 Network Security

The document outlines a course on network security. It provides details on the course objectives, topics to be covered including security policies, cryptography, network security, threats and more. It lists specific topics in each section along with the number of hours to be spent on theory and practical work.

Uploaded by

Aaron Abraham
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Course Title: Network Security

Course No. : ICT. Ed 468 Nature of course: Theoretical + Practical


Level: Bachelor Credit Hour: 3 (2+1)
Semester: Sixth Teaching Hour: 64(32+32)

1. Course Description

The course, Network Security, is a major course for students studying towards acquiring the Bachelor in
Information Communication Technology Education (BICTE). This course aims to provide fundamental
skills needed to understand the internal and external security threats against a network, and to implement
security policies that will protect an organization’s information. The course objective is to impart
fundamental understanding of every facet of information security, security policies, cryptography,
authentication, security of network, system, user and program, identifying malware, perform vulnerability
analysis, auditing and attacks and responses to those attacks.

2. General Objectives

The general objectives of this course are as follows:


 Develop an understanding of computer security and its mechanism.
 Gain familiarity with prevalent network and system attacks, defenses against them, and
forensics to investigate the aftermath.
 Develop a basic understanding of cryptography, how it has evolved, and some key
encryption techniques used today.
 Develop an understanding of security policies (such as authentication, integrity and
confidentiality), as well as protocols to implement such policies in the form of message
exchanges.

3. Course Outlines:

Specific Objectives Contents Hours


(Th+Pr)
 Explain the concept of Computer 1. Introduction
Security. 1.1 The Basic Components
1.2 Threats
 Understand the basic terminologies 1.3 Policy and Mechanism 3
related to security. 1.4 Assumptions and Trust
1.5 Assurance
1.6 Operational and Human Issues
 Explain Security policies and its types 2. Policies 5+5
2.1 Security Policies
 Develop confidentiality, integrity, and
2.1.1 The Nature of Security Policies
availability policies 2.1.2 Types of Security Policies
2.1.3 The Role of Trust
2.1.4 Example: Academic Computer
Security Policy
2.2 Confidentiality Policies
2.2.1 The Bell-LaPudala Model
2.3 Integrity Policies
2.3.1 The Biba Model
2.4 Availability Policies
2.4.1 Goals of Availability Policies
2.4.2 Denial of Service Models
2.4.3 Example: Availability and
Network Flooding

Practical Works
 Visit an organization in your
local place and develop security
policies and procedures for that
organization. Present the
prepared report in front of your
classmates and the stakeholders
of that organization.
 Explain the Public-Key Encryption 3. Cryptography
3.1 Basic Cryptography
Structure.
3.1.1 Symmetric Cryptosystems
 Apply the Symmetric Cryptosystem. 3.1.2 Public Key Cryptography
3.1.3 Cryptographic Checksums
 Explain the requirements for digital 3.1.4 Digital Signature
signature. 3.1.5 Hashing
3.2 Key Management
 Explain the key management strategies. 3.2.1 Session and Interchange Keys
 Develop cipher text 3.2.2 Key Exchange and Generation
3.2.3 Cryptographic Key Infrastructures
 Identify and implement different types of 3.2.4 Storing and Revoking Keys
authentication methods 3.3 Cipher Techniques
3.3.1 Stream and Block Ciphers
7+5
3.3.2 Authenticated Encryption
3.4 Authentication
3.4.1 Authentication Basics
3.4.2 Passwords
3.4.3 Password Selection
3.4.4 Attacking Passwords
3.4.5 Password Aging
3.4.6 Biometrics
3.4.7 Multifactor Authentication

Practical Works
 Write program to create cipher text
 Write program to validate strong
password
 Analyze the network infrastructure. 4. Security and Protection 8+10
 Configure Network devices to enhance 4.1 Network Security
4.1.1 Network Infrastructure Analysis
security. 4.1.2 Encryption and Decryption in
 Explain the different types of encryption Network
4.1.3 Firewall and its types
and decryption techniques in network. 4.1.4 Wired and Wireless Security
 Identify and discuss the different 4.1.5 Virtual Private Network
4.2 System Security
strategies used to secure wired and 4.3 Email, Web and Database Security
wireless network. 4.4 User Security
4.4.1 Access
 Explain the mechanism of System, User, 4.4.2 Files and Devices
Program, Email, Web and Database 4.4.3 Electronic Communications
4.5 Program Security
Security. 4.5.1 Common Security-Related
 Install and configure the firewall to Programming Problems
Practical Works
achieve its benefits.  Configure routers, switches, and
 Make use of VPN to secure electronic other network devices to enhance
security.
communication.  Assess and secure web applications
against common security threats.
Use tools like OWASP ZAP or Burp
Suite for web application security
testing.
 Configure firewalls to control and
monitor network traffic.
 Explain the different methods of intrusion 5. Threats, Assessment and Solutions 9+12
5.1 Malware
detection. 5.1.1 Introduction
 Perform vulnerability analysis. 5.1.2 Trojan Horses
5.1.3 Computer Viruses
 Conduct penetration testing. 5.1.4 Computer Worms
 Know different types of Malicious 5.1.5 Bots and Botnets
5.1.6 Other Malware
Software. 5.1.7 Theory of Computer Viruses
 Design an auditing system. 5.1.8 Defenses
5.2 Vulnerability Analysis
 Engage in simulated attacks and develop 5.2.1 Penetration Studies
5.2.2 Vulnerability Classification
response techniques to overcome the
5.3 Auditing
attacks. 5.3.1 Definition
5.3.2 Designing an Auditing System
5.3.3 Examples: Auditing File Systems
5.4 Intrusion Detection
5.4.1 Principles
5.4.2 Basic Intrusion Detection
5.4.3 Organization of Intrusion Detection
Systems
5.5 Attacks and Responses
5.5.1 Attacks
5.5.2 Representing Attacks
5.5.3 Intrusion Response
5.5.4 Digital Forensics

Practical Works
 Conduct vulnerability assessments
on systems and networks using tools
such as Nessus or OpenVAS.
 Conduct security audits to assess the
overall security posture of an
organization.
 Develop and deliver security
awareness training programs for
naive users.
 Engage in simulated attacks on
systems to identify vulnerabilities.
Use tools like Metasploit or
Wireshark to analyze network traffic
and find potential security
weaknesses.

4. Instructional Techniques
The instructional techniques for this course are divided into two groups. First group consists of
general instructional techniques applicable to most of the units. The second group consists of specific
instructional techniques applicable to specific units.
4.1 General Techniques
 Providing the reading materials to the students to familiarize the units.
 Lecture, question-answer, discussion, brainstorming, practical, and buzz session.

4.2 Specific Instructional Techniques


Unit Activity and instructional techniques Teaching Hours(64)

1 to 5 Use network security tools to implement the algorithm


5. Evaluation (Internal Assessment and External Assessment):

Nature of Internal External Semester Total Marks


course Assessment Practical Examination
Exam/Viva
Theory 40% 20% 40% 100%
Note: Students must pass separately in internal assessment, external practical exam / viva and or
semester examination.

5.1 Evaluation for Part I ( Theory)


5.1.1 Internal Evaluation 40%
Internal evaluation will be conducted by course teacher based on following activities:
1) Attendance 5 points
2) Participation in learning activities 5 points
3) First assessment ( written assignment) 10 points
4) Second assessment ( Term examination ) 10 points
5) Third assessment ( Internal Practical Exam/Case Study) 10 points
Total 40 points

5.2 External Evaluation (Final Examination) 40%

Examination Division, office of the Dean, Faculty of Education will conduct final
examination at the end of semester.
1) Objective type question (Multiple choice 10questionsx1mark) 10 marks
2) Short answer questions (6 questions x 5 marks) 30 marks

Total 40 marks

6.1 Evaluation for part II (practical) 20%

Nature of the Semester final examination by External Total percent


course Examiner
Practical 100% 100

6.2.1 Practical Examination Evaluation Scheme


a) External assessment …………………………100%
i) Record book ………………………. 20%
ii) Laboratory work exam/Case………..40%
iii) VIVA………………………………..40%
6. Recommended books and reading materials (including relevant published articles in
national and international journals)

6.1 Prescribed Text Book

 Bishop, M. (2018). Computer Security: Art and Science, 2nd Edition. Addison-Wisely
Professional.

6.2 Reference Materials


 Elahi, A., & Cushman, A. (2024). Computer Networks: Data Communications,
Internet and Security. 1st Edition. Springer International Publishing.
https://doi.org/10.1007/978-3-031-42018-4

 Ortega, J.M. (2023). Python for Security and Networking: Leverage Python modules
and tools in securing your network and applications, 3rd Edition. Packt Publishing

 Kaufman, C. (2022). Network security: private communication in a public world, 3rd


Edition. Delhi: Prentice Hall PTR.

 Stinson, D.R., & Paterson M.B. (2018). Cryptography: Theory and Practice, 4th
Edition. CRC Press

 Stallings, W. (2013). Network security essentials: applications and standards, 6th


Edition. Delhi: Prentice Hall.

 Maiwald, E. (2017). Fundamentals of Network Security, 1st Edition. Delhi: McGraw-


Hill Technology Education.

You might also like