Module 1
Module 1
(18EC821)
Course Code : 18EC821
CIE Marks :40
Lecture Hours/Week : 3
SEE Marks : 60
Total Number of Lecture
Hours (08 Hrs / Module)
Exam Hours :03
CREDITS — 03
Module-1
Attacks on Computers and Computer Security: Need for Security, Security
Approaches, Principles of Security Types of Attacks. (Chapterl-Teth) L1, L2
Module-2
Transport Level Security: Web Security Considerations, Secure Sockets
Layer, Transport Layer Security, HTTPS, Secure Shell (SSH) (ChapterlS-
Textl) L1,L2
Module-3
IP Security: Overview of IP Security (IPSec),IP
SecurityArchitecture, Modes of Operation, Security
Associations (SA), Authentication Header (AH), Encapsulating
Security Payload (ESP), Internet Key Exchange. (Chapter19-
Text1) L1,L2
Module-4
Intruders, Intrusion Detection.(Chapter2 0-Text1) MALICIOUS
SOFTWARE: Viruses and Related Threats, Virus Counter
measures, (Chapter21-Text1) L1,L2
Module-5
Firewalls: The Need for firewalls, Firewall Characteristics,
Types of Firewalls, Firewall Biasing, Firewall location and
configuration (ChapterZZ-Text 1) L1, L2
• Text Books:
• Cryptography and Network Security Principles and Practice!,
Pearson Education Inc., William Stallings, 5th Edition, 2014,
ISBN: 978-81-317- 6166-3.
• Cryptography and Network Security, Atul Kahate, TMH, 2003.
Explain network security services and mechanisms and
C410.1
security concepts
LEGALITY – MEETS
THE LEGAL
REQUIREMENTS?
Principles of security
Confidentiality Integrity
• Access control:
• It specifies and
controls who can
access what
Attack on
availability
Types of attacks
• Classification
• Common person’s
view
• Technologist’s view
Fraud
Scams
Destructions
Identity theft
Brand theft
Passive attacks and Active attacks
Practical side of attacks
• Cookies – born as a
result of specific
characteristic of the
internet.
• Maintaining the
state information
(i.e., identifying a
client to a server)
Creation of cookies
Usage of Cookies
Java script, VBScript and JScript