SVES C&NS Course-Descriptor
SVES C&NS Course-Descriptor
SURYAPET-508213
I. COURSE OVERVIEW:
This course provides an introduction to the field of network security. Specific topics to be
examined include threats and vulnerabilities to network architectures and protocols. The course is
designed to provide fundamental skills needed to analyze the internal and external security
threats against a network, and to develop security policies that will protect an organization’s
information. Students will learn how to evaluate network and Internet security issues and design.
III. MARKSDISTRIBUTION:
IV.
Subject SEE Examination Internal Total Marks
Examination
Cryptography and Network 75 Marks 25 Marks 100
Security
Page | 3
CO’S COURSE OUTCOMES CLO’S COURSE LEARNING OUTCOMES
and hash functions. CLO 12 Explain the need of digital signature in
message transmission.
CLO 13 Explain and demonstrate the role of
different types of hash functions for
providing security.
CLO 14 Understand the differences between the
symmetric and symmetric cryptography
algorithms for providing security.
CO 4 Understand the concepts of CLO 15 Explain S/MIME and PGP for
e-mail security. transmitting mail from sender to receiver.
CLO 16 Explain IP security for internet protocol
and analyze how it provides security.
CO 5 Understand the concepts of CLO 17 Describe the security socket layer and
web security. transport layer security for web security.
CLO 18 Demonstrate various types of intrusion
detection techniques.
CLO 19 Understand various types of viruses and
its vulnerabilities.
CLO 20 Describe various types of firewalls and
analyze the security levels of these.
Page | 4
CLO At the end of the course, the student will have the PO’s Strength of
Code CLO’s Mapped
ability to: Mapping
ACS013.14 CLO 14 Understand the differences between the symmetric PO1, PO2 3
and symmetric cryptography algorithms for
providing security.
ACS013.15 CLO 15 Explain S/MIME and PGP for transmitting mail PO2, PO3 2
from sender to receiver.
ACS013.16 CLO 16 Explain IP security for internet protocol and PO2 3
analyze how it provides security.
ACS013.17 CLO 17 Describe the security socket layer and transport PO2 2
layer security for web security.
ACS013.18 CLO 18 Demonstrate various types of intrusion detection PO1, PO2 3
techniques.
ACS013.19 CLO 19 Understand various types of viruses and its PO2, PO3 2
vulnerabilities.
ACS013.20 CLO 20 Describe various types of firewalls and analyze the PO4 2
security levels of these.
3 = High; 2 = Medium; 1 = Low
CO 1 3 3 3 3 2
CO 2 2 2 2 2
CO 3 3 2 3 2 2
CO 4 2 3 2 2
CO 5 3 2 3 3 2 2 2
Page | 5
Program Specific
Program Outcomes (POs)
CLOs Outcomes (PSOs)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CLO 14 3 2 2
CLO 15 2 3 2 3
CLO 16 2 2
CLO 17 2 2
CLO 18 3 3 2
CLO 19 2 3 2
CLO 20 3 2
3 = High; 2 = Medium; 1 = Low
XVI. SYLLABUS
ATTACKS ON COMPUTERS AND COMPUTER
UNIT-I Classes: 14
SECURITY
Security Concepts: Introduction, The need for security, Security approaches, Principles of
security, Types of Security attacks, Security services, Security Mechanisms, A model for
Network Security Cryptography Concepts and Techniques: Introduction, plain text and cipher
text, substitution techniques, transposition techniques, encryption and decryption, symmetric and
asymmetric key cryptography, steganography, key range and key size, possible types of attacks.
Page | 6
UNIT -IV E-MAIL SECURITY Classes: 10
Transport-level Security: Web security considerations, Secure Socket Layer and Transport
Layer Security, HTTPS, Secure Shell (SSH) Wireless Network Security: Wireless Security,
Mobile Device Security, IEEE 802.11 Wireless LAN, IEEE 802.11i Wireless LAN Security
XVII.COURSE PLAN:
The course plan is meant as a guideline. Probably there may be changes.
Course
Lecture Topics to be covered Learning
Reference
No Outcomes
(CLOs)
1 Understand and explore the basics of security and the need for CLO 1 T1:1.1,1.
security. 2
Understand security approaches, principles of security, types of T1:1.3,1.4,
2-4 CLO 1
security attacks, security services and security mechanisms. 1.5,1.6
5-6 Discuss substitution and transposition techniques. CLO2 T1:2.2,2.3
Understands the security depends on location of encryption devices
7 CLO3 T1:2.5
in network
8 Discuss various public and private cryptography encryption and CLO 4 T1: 3.1
decryption, key size.
Page | 7
Discuss various symmetric cryptography encryption and decryption CLO5 T1: 3.2-3.5,
9-11
algorithms 5.1,5.2, 6.1.
Demonstrate the various asymmetric cryptography encryption and CLO6 T1:
12-14 decryption algorithms 9.1,9.2,10.
1, 10.4
Demonstrate various security aspects of block ciphers for entering CLO7 T1:6.2
15
into secure network
16 Discuss various security aspects of stream ciphers for entering into CLO8 T1:6.3
Course
Lecture Topics to be covered Learning
Reference
No Outcomes
(CLOs)
secure network
Understand RSA algorithm encryption and decryption with CLO10 T1: 9.1,9.2
17
examples.
T1:
18 Illustrate elliptic curve cryptography with examples. CLO9
10.2,10.3
CLO 11 T1:11.1-
19-21 Understand various methods of message authentication algorithms
11.3
CLO12 T1:13.1-
22 Discuss the importance of digital signature for data transmission.
13.3
T1:11.4,11
23-24 Demonstrate various techniques of hash function with examples. CLO 13 .5
25-26 CLO 14 T1:12.1-
Discuss the importance of different hash algorithms
12.4
27-30 Understand PGP functionality and its importance. CLO 15 T1:15.1
31-33 Understand S/MIME functionality and its importance. CLO 15 T1:15.2
CLO 16 T1:16.1-
34-36 Discuss how devices are managed on IP network.
16.5
Demonstrate how SSL and TLS provides security in World Wide T1:17.1-
37-39 CLO 17
Web 17.3
CLO 20 T1:20.1-
40-41 Understand various types of firewalls and its importance. 20.2
CLO19 T1:19.1-
42-43 Understand various types of viruses and its vulnerabilities.
19.4
Discuss different Inter branch payment transactions cross site CLO 18 T1:18.1-
44-45
scripting. 18.3
Prepared by:
Mr. B.Ramji, Sr.Assistant Professor in CSE
Page | 8
HOD, CSE
Page | 9