0% found this document useful (0 votes)
98 views18 pages

CCS354 Network Security

The document is a question bank for the course CCS354 - Network Security at J. J. College of Engineering and Technology, outlining the course objectives, program educational objectives, outcomes, and specific outcomes. It includes detailed content on cryptography, key management, access control, application layer security, and security practices. Additionally, it provides a mapping of course outcomes to program outcomes and specific outcomes, along with references for further reading.

Uploaded by

nowfaldgl
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
98 views18 pages

CCS354 Network Security

The document is a question bank for the course CCS354 - Network Security at J. J. College of Engineering and Technology, outlining the course objectives, program educational objectives, outcomes, and specific outcomes. It includes detailed content on cryptography, key management, access control, application layer security, and security practices. Additionally, it provides a mapping of course outcomes to program outcomes and specific outcomes, along with references for further reading.

Uploaded by

nowfaldgl
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

CCS354 - NETWORK SECURITY

QUESTION BANK

R - 2021
Prepared by
Dr. P. Chellammal Page 1
J. J. College of Engineering and Technology, Trichy - 09
DEPARTMENT OFCOMPUTER SCIENCE AND ENGINEERING

III YEAR / VI SEMESTER


REGULATION - 2021

CCS354 – NETWORK SECURITY

Faculty In charge Head of the Department


Dr. P. Chellammal, M.E., Ph.D., Dr. K .Suresh, M.E., Ph.D.,
Professor Associate Professor
Department of CSE Department of CSE

Prepared by
Dr. P. Chellammal Page 2
J. J. College of Engineering and Technology, Trichy - 09
INSTITUTE VISION & MISSION

VISION:

To become a globally recognized “Centre of Academic Excellence” providing Quality


Education to all students.

MISSION:

To provide Quality Education in the fields of Engineering, Management, Information,


Technology and other Engineering areas.

DEPARTMENT VISION & MISSION

VISION:

To provide the quality education in Computer Science and Engineering and to mould the
students into self-confident and professionally competent individuals.

MISSION:

To produce successful graduates enriched with professional and leadership


M1
capabilities.
M2 To impart the skills necessary to continue education and to grow professionally.
M3 To inculcate strong ethical and human values.
M4 To establish a research Centre in Computer science and Engineering.
M5 To contribute towards empowering the rural youth with computer education.

Prepared by
Dr. P. Chellammal Page 3
J. J. College of Engineering and Technology, Trichy - 09
PROGRAM EDUCATIONAL OBJECTIVES (PEOs)

Apply their technical competence in computer science to solve real world problems, with
PEO1
technical and people leadership.
PEO2 Conduct cutting edge research and develop solutions on problems of social relevance.
Work in a business environment, exhibiting team skills, work ethics, adaptability and
PEO3
lifelong learning.

PROGRAM OUTCOMES (POs)

Engineering knowledge: Apply the knowledge of mathematics, science, engineering


PO1 fundamentals and an engineering specialization to the solution of complex engineering
problems.
Problem analysis: Identify, formulate, review research literature, and analyze complex
PO2 engineering problems reaching substantiated conclusions using first principles of
mathematics, natural sciences, and engineering sciences.
Design/development of solutions: Design solutions for complex engineering problems
and design system components or processes that meet the specified needs with
PO3
appropriate consideration for the public health and safety, and the cultural, societal, and
environmental considerations.
Conduct investigations of complex problems: Use research-based knowledge and
PO4 research methods including design of experiments, analysis and interpretation of data,
and synthesis of the information to provide valid conclusions.
Modern tool usage: Create, select, and apply appropriate techniques, resources, and
PO5 modern engineering and IT tools including prediction and modeling to complex
engineering activities with an understanding of the limitations.
The engineer and society: Apply reasoning informed by the contextual knowledge to
PO6 assess societal, health, safety, legal and cultural issues and the consequent responsibilities
relevant to the professional engineering practice.
Environment and sustainability: Understand the impact of the professional engineering
PO7 solutions in societal and environmental contexts, and demonstrate the knowledge of, and
need for sustainable development.
Ethics: Apply ethical principles and commit to professional ethics and responsibilities
PO8
and norms of the engineering practice.
Individual and team work: Function effectively as an individual, and as a member or
PO9
leader in diverse teams, and in multidisciplinary settings.
Communication: Communicate effectively on complex engineering activities with the
engineering community and with society at large, such as, being able to comprehend and
PO10
write effective reports and design documentation, make effective presentations, and give
and receive clear instructions.

Prepared by
Dr. P. Chellammal Page 4
J. J. College of Engineering and Technology, Trichy - 09
Project management and finance: Demonstrate knowledge and understanding of the
PO11 engineering and management principles and apply these to one‘s own work, as a member
and leader in a team, to manage projects and in multidisciplinary environments.
Life-long learning: Recognize the need for, and have the preparation and ability to
PO12 engage in independent and life-long learning in the broadest context of technological
change.

PROGRAM SPECIFIC OUTCOMES (PSOs)

Exhibit design and programming skills to build and automate business solutions using
PSO1
cutting edge technologies.

Strong theoretical foundation leading to excellence and excitement towards research,


PSO2
to provide elegant solutions to complex problems.

Ability to work effectively with various engineering fields as a team to design, build
PSO3
and develop system applications.

Prepared by
Dr. P. Chellammal Page 5
J. J. College of Engineering and Technology, Trichy - 09
CCS354 NETWORK SECURITY L T P C
2 0 2 3
COURSE OBJECTIVES:

 To learn the fundamentals of cryptography.


 To learn the key management techniques and authentication approaches.
 To explore the network and transport layer security techniques.
 To understand the application layer security standards.
 To learn the real time security practices.

UNIT I INTRODUCTION 8
Basics of cryptography, conventional and public-key cryptography, hash functions, authentication, and
digital signatures.

UNIT II KEY MANAGEMENT AND AUTHENTICATION 7


Key Management and Distribution: Symmetric Key Distribution, Distribution of Public Keys, X.509
Certificates, Public-Key Infrastructure. User Authentication: Remote User-Authentication Principles,
Remote User-Authentication Using Symmetric Encryption, Kerberos Systems, Remote User
Authentication Using Asymmetric Encryption.

UNIT III ACCESS CONTROL AND SECURITY 4


Network Access Control: Network Access Control, Extensible Authentication Protocol, IEEE 802.1X
Port-Based Network Access Control - IP Security - Internet Key Exchange (IKE). Transport-Level
Security: Web Security Considerations, Secure Sockets Layer, Transport Layer Security, HTTPS
standard, Secure Shell (SSH) application.

UNIT IV APPLICATION LAYER SECURITY 5


Electronic Mail Security: Pretty Good Privacy, S/MIME, Domain Keys Identified Mail. Wireless
Network Security: Mobile Device Security

UNIT V SECURITY PRACTICES 6


Firewalls and Intrusion Detection Systems: Intrusion Detection Password Management, Firewall
Characteristics Types of Firewalls, Firewall Basing, Firewall Location and Configurations. Blockchains,
Cloud Security and IoT security.

Total: 30 PERIODS

Prepared by
Dr. P. Chellammal Page 6
J. J. College of Engineering and Technology, Trichy - 09
COURSEOUTCOMES

On completion of this course, the students expected to be able to:

CO1 Classify the encryption techniques.

CO2 Illustrate the key management technique and authentication.

CO3 Evaluate the security techniques applied to network and transport layer.

CO4 Discuss the application layer security standards.

CO5 Apply security practices for real time applications.

CO’s–PO’s & PSO’s MAPPING

COs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3

CO1 3 3 2 2 2 - - - 2 1 2 1 2 3 1

CO2 1 1 3 2 2 - - - 2 2 1 1 3 1 2

CO3 1 2 1 1 2 - - - 3 3 1 3 2 1 3

CO4 2 2 3 2 3 - - - 3 3 2 1 2 1 3

CO5 2 1 3 2 2 - - - 2 1 1 3 2 1 1

AVG 1.8 1.8 2.4 1.8 2.2 - - - 2.4 2 1.4 1.8 2.2 1.4 2

TEXT BOOK

1. Cryptography and Network Security: Principles and Practice, 6th Edition, William Stallings, 2014,
Pearson, ISBN 13:9780133354690.

REFERENCE BOOKS

1. Network Security: Private Communications in a Public World, M. Speciner, R. Perlman, C.


Kaufman, Prentice Hall, 2002.
2. Linux iptables Pocket Reference, Gregory N. Purdy, O'Reilly, 2004, ISBN-13: 978-596005696.
3. Linux Firewalls, by Michael Rash, No Starch Press, October 2007, ISBN: 978-1-59327-141-1.
4. Network Security, Firewalls And VPNs, J. Michael Stewart, Jones & Bartlett Learning, 2013,
ISBN-10: 1284031675, ISBN-13: 978-1284031676.
5. The Network Security Test Lab: A Step-By-Step Guide, Michael Gregg, Dreamtech Press, 2015,
ISBN-10:8126558148, ISBN-13: 978-8126558148.
Prepared by
Dr. P. Chellammal Page 7
J. J. College of Engineering and Technology, Trichy - 09
UNIT I
INTRODUCTION

PART- A

CO Comple
Q.No Question BT Level
Mapping xity
1 Define cryptography. CO1 Remember Low
Differentiate between symmetric and asymmetric
2 CO1 Understand Low
encryption.
3 What is a hash function? CO1 Understand Low
4 List any two applications of cryptography. CO1 Remember Low
Mention the role of authentication in network
5 CO1 Remember Low
security.
6 Define digital signature. CO1 Remember Low
7 What are the advantages of public-key cryptography? CO1 Understand Low
How does message integrity differ from
8 CO1 Understand Low
confidentiality?
What is the purpose of key exchange in
9 CO1 Understand Low
cryptography?
10 Compare block and stream ciphers. CO1 Evaluate High
Mention the characteristics of a good encryption
11 CO1 Remember Low
algorithm.
12 What is a brute force attack? CO1 Understand Low
Specify the role of the sender and receiver in digital
13 CO1 Understand Low
signature verification.
Differentiate between substitution and transposition
14 CO1 Understand Low
ciphers.
Calculate the ciphertext for the following using one-
time pad cipher.
15 CO1 Create High
Plaintext: R O C K
Keyword: B O T S
Connect the given text “anna university” into cipher
16 CO1 Apply Medium
text using Rail fence technique.
How substitution cipher is different from
17 CO1 Understand Low
transposition cipher. Give example for each method?
What is the difference between authentication and
18 CO1 Understand Low
authorization?
State the importance of confidentiality in network
19 CO1 Remember Low
security.

Prepared by
Dr. P. Chellammal Page 8
J. J. College of Engineering and Technology, Trichy - 09
Which cryptographic technique is used for digital
20 CO1 Understand Low
signatures?
What is the main use of a hash function in network
21 CO1 Understand Low
security?
22 What is the primary purpose of a digital signature? CO1 Understand Low
23 What is the role of Kerberos in authentication? CO1 Understand Low
Determine the GCD of (24140,16762) using Euclid‟s
24 CO1 Create High
algorithm.
Determine the GCD of (1970,1066) using Euclid‟s
25 CO1 Create High
algorithm.

PART- B

Describe the Security trends like Legal, Ethical and


Professional Aspects of Security and discuss about the
1 CO1 Understand Medium
Security at multiple levels and explain Security
Policies.
(i) Discuss the various security mechanisms.
2 (ii) Summarize OSI security architecture model with CO1 Understand Medium
neat diagram.
Explain the differences between conventional and
3 CO1 Understand Medium
public-key cryptography with examples.
(i) Given Cipher text
“YMJTYMJWXNIJTKXNQJSHJ”, the message is
encrypted by Caesar cipher and k=5. Try to decrypt
4 CO1 Apply Medium
the message.
(ii) Using Vigenere cipher, encrypt the word
“explanation” using the Key leg.
Encrypt the following using play fair cipher using the
5 keyword MONARCHY. Use X for blank spaces CO1 Apply Medium
“SWARAJ IS MY BIRTH RIGHT”.
Using Hill Cipher for the following. Message: PEN
6 and Key: ACTIVATED perform encryption and CO1 Apply Medium
decryption.
Encrypt the message “PAY” using hill cipher with the
7 following key matrix and show the decryption to get CO1 Apply Medium
original plain text.
Using Playfair cipher method. Encrypt the word
8 “Semester Result” with the keyword “Examination”. CO1 Apply Medium
and discuss the rules to be followed.
Describe various types of cryptographic hash
9 CO1 Understand Medium
functions and their applications.
Explain the concept of digital signatures and their role
10 CO1 Understand Medium
in authentication.
Prepared by
Dr. P. Chellammal Page 9
J. J. College of Engineering and Technology, Trichy - 09
Compare and contrast different authentication
11 CO1 Evaluate High
techniques in cryptography.
Illustrate how cryptographic techniques ensure data
12 CO1 Analyze Medium
integrity and confidentiality.
Discuss the working of the RSA algorithm with an
13 CO1 Understand Medium
example.
Describe the properties and applications of Message
14 CO1 Understand Medium
Authentication Codes (MAC).
Explain symmetric and asymmetric encryption
15 CO1 Understand Medium
techniques with real-world applications.
Evaluate the security strength of different
16 CO1 Evaluate High
cryptographic algorithms.
How does cryptography help in securing modern
17 CO1 Understand Medium
communication? Justify with examples.
Explain the working of the Diffie-Hellman key
18 CO1 Understand Medium
exchange algorithm with an example.
Perform encryption for the plaintext M=88 using the
19 CO1 Analyze Medium
RSA algorithm. P=17, q=11 & public component e=7.
Perform encryption and decryption using the RSA
20 CO1 Analyze Medium
algorithm for the following:P=7,q=11, e=17 and M=8.
Describe the Digital Signature Algorithm (DSA) and
21 CO1 Understand Medium
its working.
Explain the working of the Kerberos authentication
22 CO1 Understand Medium
system.
Find X for the given set of congruent equations using
23 Chinese Remainder Theorem X = 2 (mod 3) X = 3 CO1 Apply Medium
(mod 5) X = 2 (mod 7) .
Discuss the working of SHA-256 with a detailed
24 CO1 Understand Medium
explanation.
Describe RSA algorithm & Perform encryption and
25 decryption using RSA algorithm for the following: CO1 Apply Medium
p=7, q=11, e=7, M=9.
Demonstrate encryption and decryption for the RSA
26 CO1 Apply Medium
algorithm: Parameters – p=3, q=11, e=7, d=? M=5.
Demonstrate encryption and decryption for the RSA
27 CO1 Apply Medium
algorithm: Parameters – p=7, q=13, e=5, d=?, M=10.
In a public-key system using RSA, you intercept the
28 ciphertext C = 10 sent to a user whose public key is e CO1 Apply Medium
= 5, n = 35. What is the plaintext M.
Given prime number q=17, Primitive root a=6, private
key of A, XA =5, message m=13, random number
29 CO1 Analyze Medium
k=10. Perform encryption & decryption using Elgamal
cryptosystem.

Prepared by
Dr. P. Chellammal Page 10
J. J. College of Engineering and Technology, Trichy - 09
Find n and (n)by using e RSA encryption method
30 CO1 Apply Medium
with p  11 and q  17 as the two primes.

UNIT II

KEY MANAGEMENT AND AUTHENTICATION

PART- A

CO Comple
Q.No Question BT Level
Mapping xity
1 Define key management. CO2 Remember Low
2 What is the purpose of key distribution? CO2 Understand Low
3 State the X.509 certificates. CO2 Remember Low
List the components of a Public Key Infrastructure
4 CO2 Remember Low
(PKI).
5 How does symmetric key distribution work? CO2 Understand Low
6 What is Kerberos, and why is it used? CO2 Understand Low
Compare symmetric and asymmetric key
7 CO2 Evaluate High
authentication.
8 What is the purpose of remote user authentication? CO2 Understand Low
9 Define an authentication protocol. CO2 Remember Low
How does asymmetric encryption support
10 CO2 Understand Low
authentication?
11 What are the advantages of using PKI? CO2 Understand Low
12 Define digital certificate. CO2 Remember Low
13 What is the role of a Certification Authority (CA)? CO2 Understand Low

14 How does Kerberos prevent replay attacks? CO2 Understand Low


Describe the importance of authentication in secure
15 CO2 Understand Low
communication.

PART- B

Explain the process of symmetric key distribution and


1 CO2 Understand Medium
its challenges.
Describe the role of Public Key Infrastructure (PKI)
2 CO2 Understand Medium
in key management.

Prepared by
Dr. P. Chellammal Page 11
J. J. College of Engineering and Technology, Trichy - 09
Compare and contrast X.509 Certificates and
3 CO2 Evaluate High
Kerberos Authentication.
Illustrate the working of the Kerberos authentication
4 CO2 Analyze Medium
system.
How does asymmetric encryption help in remote user
5 CO2 Understand Medium
authentication?
Discuss the challenges in key distribution in wireless
6 CO2 Understand Medium
networks.
Explain the importance of certificate authorities
7 CO2 Understand Medium
(CAs) in public key management.
Compare various user authentication techniques used
8 CO2 Evaluate High
in modern security systems.
Explain the role of digital certificates in securing
9 CO2 Understand Medium
network communications.
Evaluate the effectiveness of multi-factor
10 CO2 Evaluate High
authentication techniques.
Users Alice and Bob use the Diffie-Hellman key
exchange technique with a common prime q=83 and
a primitive root α=5.
i. If Alice has a private key XA=6, what is
11 CO2 Apply Medium
Alice‟s public key YA?
ii. If Bob has a private key XB=10, what is
Bob‟s public key YB?
iii. What is the shared secret key?
State Chinese Remainder Theorem and find X for the
given set of congruent equations using CRT X=1
12 CO2 Apply Medium
(mod 5) X=2 (mod 7) X=3 (mod 9)
X=4 (mod 11).

UNIT III
ACCESS CONTROL AND SECURITY

PART- A

CO Comple
Q.No Question BT Level
Mapping xity
1 Define network access control. CO3 Remember Low
What is the purpose of the Extensible Authentication
2 CO3 Understand Low
Protocol (EAP)?

Prepared by
Dr. P. Chellammal Page 12
J. J. College of Engineering and Technology, Trichy - 09
3 Define IEEE 802.1X. CO3 Remember Low
4 What are the components of IP Security (IPSec)? CO3 Understand Low
5 Define Internet Key Exchange (IKE). CO3 Remember Low
How does Transport Layer Security (TLS) improve
6 CO3 Understand Low
web security?
7 What is HTTPS? CO3 Remember Low
8 Differentiate between SSL and TLS. CO3 Understand Low
9 What are the benefits of using Secure Shell (SSH)? CO3 Understand Low
10 Define the role of digital certificates in TLS. CO3 Remember Low
11 Define VPN and its security benefits. CO3 Remember Low
12 What is meant by end-to-end encryption? CO3 Understand Low
13 How does IPsec ensure secure communication? CO3 Understand Low
Mention any two limitations of network access
14 CO3 Remember Low
control.
15 How does SSH ensure secure communication? CO3 Understand Low

PART- B

CO Comple
Q.No Question BT Level
Mapping xity
Explain the working of IEEE 802.1X port-based
1 CO3 Understand Medium
network access control.
Discuss the role of the Internet Key Exchange (IKE)
2 CO3 Understand Medium
in IP security.
Compare and contrast SSL and TLS protocols with
3 CO3 Evaluate High
their security features.
Explain how HTTPS ensures secure web
4 CO3 Understand Medium
communication.
5 Describe the working of Secure Shell (SSH) protocol. CO3 Understand Medium
Analyze the security vulnerabilities in transport layer
6 CO3 Analyze High
protocols.
Discuss the role of Network Access Control (NAC) in
7 CO3 Understand Medium
enterprise security.
Illustrate how IPsec provides confidentiality and
8 CO3 Analyze Medium
integrity in network communication.
Compare the effectiveness of different transport-layer
9 CO3 Evaluate High
security mechanisms.
Evaluate the importance of end-to-end encryption in
10 CO3 Evaluate High
transport layer security.

Prepared by
Dr. P. Chellammal Page 13
J. J. College of Engineering and Technology, Trichy - 09
UNIT IV
APPLICATION LAYER SECURITY

PART- A

CO Comple
Q.No Question BT Level
Mapping xity
1 Define email security. CO4 Remember Low
2 What is Pretty Good Privacy (PGP)? CO4 Understand Low
3 State S/MIME. CO4 Remember Low
What is the purpose of Domain Keys Identified Mail
4 CO4 Understand Low
(DKIM)?
5 How does email encryption work? CO4 Understand Low
6 Define mobile device security. CO4 Remember Low
7 How does PGP provide authentication? CO4 Understand Low
8 What is the role of digital signatures in email security? CO4 Understand Low
Mention the importance of email authentication
9 CO4 Remember Low
protocols.
10 List two advantages of S/MIME over PGP. CO4 Remember Low
11 Define spam filtering in email security. CO4 Remember Low
12 What are the security threats in wireless networks? CO4 Understand Low
How does multi-factor authentication improve mobile
13 CO4 Understand Low
security?
14 List the impact of phishing attacks on email security. CO4 Remember Low
How does SSL/TLS contribute to secure web
15 CO4 Understand Low
browsing?

PART- B

CO Comple
Q.No Question BT Level
Mapping xity
Explain how Pretty Good Privacy (PGP) provides
1 CO4 Understand Medium
secure email communication.
Discuss the security features of S/MIME and its role
2 CO4 Understand Medium
in email security.
Compare Domain Keys Identified Mail (DKIM) with
3 CO4 Evaluate Medium
other email security techniques.
Describe the major security threats to mobile devices
4 CO4 Understand Medium
and their countermeasures.
Prepared by
Dr. P. Chellammal Page 14
J. J. College of Engineering and Technology, Trichy - 09
Analyze the challenges in implementing wireless
5 CO4 Analyze Medium
network security.
Evaluate different email security standards used in
6 CO4 Evaluate High
enterprises.
Illustrate the role of encryption in securing wireless
7 CO4 Analyze Medium
networks.
Discuss the impact of phishing and spoofing on
8 CO4 Understand Medium
application layer security.
Explain how secure email protocols protect against
9 CO4 Understand Medium
cyber threats.
Compare the effectiveness of security mechanisms in
10 CO4 Evaluate High
protecting email communications.

UNIT V
SECURITY PRACTICES

PART- A

CO Comple
Q.No Question BT Level
Mapping xity
1 Define firewall. CO5 Remember Low
2 List different types of firewalls. CO5 Remember Low
Give the purpose of an Intrusion Detection System
3 CO5 Understand Low
(IDS).
4 Define the term Intrusion Detection System. CO5 Remember Low
5 How does a firewall enhance security? CO5 Understand Low
6 What is blockchain security? CO5 Understand Low
7 Name the key characteristics of blockchain technology CO5 Remember Low
What is the primary function of a firewall in network
8 CO5 Understand Low
security?
Mention the role of an Intrusion Detection System
9 CO5 Remember Low
(IDS) in preventing network attacks.
How does a stateful firewall differ from a stateless
10 CO5 Understand Low
firewall in handling network traffic?
Differentiate Network-Based IDS (NIDS) and Host-
11 CO5 Understand Low
Based IDS (HIDS).
How would you assess the effectiveness of a firewall
12 CO5 Understand Low
in securing a corporate network?

Prepared by
Dr. P. Chellammal Page 15
J. J. College of Engineering and Technology, Trichy - 09
What is a blockchain, and how does it ensure data
13 CO5 Understand Low
integrity?
List the various types of firewalls used in
14 CO5 Remember Low
cybersecurity
What is the purpose of password management in
15 CO5 Understand Low
intrusion detection?
Mention common security challenges associated with
16 CO5 Remember Low
cloud computing
What are the typical vulnerabilities found in IoT
17 CO5 Understand Low
devices?
List the significance of firmware updates in
18 CO5 Remember Low
maintaining IoT security.

PART- B

CO Comple
Q.No Question BT Level
Mapping xity
Explain the working and types of firewalls used in
1 CO5 Understand Medium
network security.
Describe how Intrusion Detection Systems (IDS)
2 CO5 Understand Medium
detect and prevent cyber threats.
Compare various password management techniques
3 CO5 Evaluate Medium
for secure authentication.
Discuss the advantages and limitations of blockchain
4 CO5 Understand Medium
security.
Explain how cloud security mechanisms ensure data
5 CO5 Understand Medium
protection.
Evaluate the effectiveness of different intrusion
6 CO5 Evaluate High
detection systems.
Analyze the challenges in securing Internet of Things
7 CO5 Analyze Medium
(IoT) devices.
Illustrate the placement and configuration of firewalls
8 CO5 Analyze Medium
in enterprise networks.
Compare the security implications of traditional data
9 CO5 Evaluate High
storage versus cloud storage.
Evaluate the impact of weak password policies on
10 CO5 Evaluate High
organizational security.
Evaluate the role of artificial intelligence in enhancing
11 CO5 Evaluate High
cyber security.
Propose a new security framework to address
12 CO5 Analyze Medium
emerging threats in IoT ecosystems.
Design a simple firewall rule set for a small office
13 network, focusing on allowing web traffic and CO5 Analyze Medium
denying all other inbound traffic.

Prepared by
Dr. P. Chellammal Page 16
J. J. College of Engineering and Technology, Trichy - 09
Describe how a consensus mechanism works in a
14 CO5 Understand Medium
blockchain network.
How can blockchain technology be applied to improve
15 CO5 Understand Medium
the transparency of financial transactions?
Evaluate the potential security risks associated with
16 using blockchain in a supply chain management CO5 Evaluate High
system.
Develop a training program to educate employees on
17 CO5 Create High
effective password management techniques
Construct a blockchain-based system to enhance
18 CO5 Create High
supply chain transparency
Demonstrate a disaster recovery plan tailored for
19 CO5 Create High
cloud-hosted applications
Assess the risks associated with multi-tenancy in
20 CO5 Analyze Medium
cloud environments.
Analyze the differences between signature-based and
21 CO5 Analyze Medium
anomaly-based intrusion detection methods.
Apply blockchain principles to create a secure and
22 CO5 Apply Medium
transparent voting system.
Develop a security protocol for an IoT-based home
23 CO5 Create High
automation system.
Assess the effectiveness of IDS solutions in
24 CO5 Analyze Medium
preventing data breaches.
How can organizations ensure data confidentiality and
integrity when utilizing multi-tenant cloud
25 CO5 Understand Medium
environments where resources are shared among
multiple clients?

Prepared by
Dr. P. Chellammal Page 17
J. J. College of Engineering and Technology, Trichy - 09
THANKYOU

ALL THE BEST

Prepared by
Dr. P. Chellammal Page 18
J. J. College of Engineering and Technology, Trichy - 09

You might also like