0% found this document useful (0 votes)
10 views

Computer and Network Security

The syllabus for the Computer and Network Security course (CE716) outlines key learning outcomes, including understanding fundamental security concepts, analyzing cryptographic algorithms, and identifying system threats. The course is divided into two sections covering topics such as encryption techniques, IP security, firewalls, and intrusion detection, with a total of 42 hours of instruction. Instructional methods include lectures, simulations, and assignments, with recommended reference books and additional resources provided for further study.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Computer and Network Security

The syllabus for the Computer and Network Security course (CE716) outlines key learning outcomes, including understanding fundamental security concepts, analyzing cryptographic algorithms, and identifying system threats. The course is divided into two sections covering topics such as encryption techniques, IP security, firewalls, and intrusion detection, with a total of 42 hours of instruction. Instructional methods include lectures, simulations, and assignments, with recommended reference books and additional resources provided for further study.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

SYLLABUS

Course Title Computer and Network Security


Course Code CE716
Theory :3
Practical :1
Course Credits
Tutorial :0
Credits :4
Course Learning Outcomes:
On the completion of the course, students will be able to:
 Understand the fundamental concepts of computer networks and security
 Make a comparative study and analysis of various cryptographic algorithms
 Develop a “security mindset:” learn how to critically analyze situations of computer
and network usage from a security perspective, identifying the salient issues,
viewpoints, and trade-offs
 Understand working pattern of Firewall
 Identify andinvestigate system threats
 Understand network security’s importance in our increasingly computer-driven world

Detailed Syllabus
Sr. Hours
Name of chapter and details
No. Allotted

SECTION-I

1. Introduction
Security Trends, Security Attacks, Security services, Security Mechanisms, 03
A Model for Network Security

2. Classical Encryption Techniques


Symmetric Cipher Model, Substitution Techniques, Transposition 04
Techniques, Steganography

3. Private Key Cryptography


Introduction to Symmetric Key Cryptography, Diffie-Hellman Key Exchange
04
Algorithm, Types of Algorithms, Modes of Algorithms, Data Encryption
Standard (DES), Double DES, Triple DES, AES

4. Public Key Cryptography


Introduction to Asymmetric Key Cryptography, Overview of Asymmetric
04
Key Cryptography, RSA Algorithm, Comparison of Symmetric Key
Cryptography and Asymmetric Key Cryptography

2019-20B.TECH7TH SEM COMPUTER ENGINEERING (2016-20 BATCH) Page 1


SYLLABUS

5. Message Authentication and Hash Functions


Authentication, Requirement, functions, Message Authentication code,
06
Hash Functions, Security of Hash Functions and Macs, MD5 Message
Digest Algorithm, Secure Hash Algorithm

Total 21

SECTION-II

6. Systems Threats and Risks


Software-Based Attacks, Infection Malware, Concealing Malware (Trojan
Horses-Root kits-Logic Bombs), Privilege Escalation, Malware for Profit
(Spam-Spyware-Key loggers, Bonnets, Internet Relay Chat, Hardware- 06
Based Attacks, Bios-USB Devices, Network Attached Storage (NAS), Cell
Phones, Attacks on Virtualized Systems, What is Virtualized Systems?
Attacks on Virtual systems

7. IP Security
IP Security Overview, Architecture, Authentication Header, Encapsulation 05
Security payload, Combining Security Association, Key Management

8. Screening Router and Firewall


Definition and Design of a Screening Router, Packet Filtering, Theory and
Main Firewall Architectures: Multi Homed Host, Bastion Host, DMZ. Circuit 06
Level Gateways, Application Level Gateways. Proxy Server. Example of a
Commercial Firewall: Firewall 1

9. Intrusion
Intruders, Audit Records, Intrusion Detection, Distributed Intrusion 04
Detection, Honeyports

Total 21

Instructional Method and Pedagogy:


 Lectures will be conducted based on Classroom Response Systems with the use of
multimedia projector and black board.
 Various simulators will be used inside the class-room.
 Assignments based on course contents will be given at the end of each unit/topic and
will be evaluated at regular interval.
 Computer network security tools will be used to understand various concepts of
computer networks and security.

2019-20B.TECH7TH SEM COMPUTER ENGINEERING (2016-20 BATCH) Page 2


SYLLABUS

Reference Books:
 Title: “Security + Guide to Network Security Fundamentals”, Fourth Edition, Cengage
Learning.
Author(s): Mark Ciampa.
 Title: “Cryptography and Network Security”, Fourth Edition, Pearson.
Author(s):William Stallings.
 Title: “Cryptography and Data Security”, Second Edition, Addison-Wesley.
Author(s): D. Denning.
 Title: “RSA securities official Guide to cryptography”, First Edition, McGraw-Hill.
Author(s):S Bueert and Stephen Paine.
 Title: “Internet Security Protocols”, Second Edition, Pearson Education.
Author(s):Uyless Black.
 Title: “Firewalls and Internet Security”, Second Edition, Addison Wesley, 1998.
Author(s):W.R. Cheswick, S.M. Bellovin.

Additional Resources
 NPTEL video lectures of Cryptography and Network Security course of Computer
Science and Engineering by Dr. DebdeepMukhopadhyay, IIT Kharagpur.
 NPTEL video lectures of Computer Security and Cryptography – course of Computer
Science and Engineering by Prof. Bernard Menezes, IIT Bombay.
 www.interhack.net
 www.potaroo.net
 www.apnic.net

2019-20B.TECH7TH SEM COMPUTER ENGINEERING (2016-20 BATCH) Page 3

You might also like