The course will enable the students to
Course Outcomes (COs).
Course Outcome (at course level)
| Learning and teaching strategies | Assessment Strategies |
---|---|---|
On completion of this course, the students will: CO275. Analyse the need to create a Network. CO276. Evaluate different layers and protocols present in communicating devices. CO277. Explain basic security services and network security model using cryptography. CO278. Identify security mechanisms at various layers. CO279. Analyse intrusion detection problems and their preventive measures. | Interactive Lectures, Discussion, Tutorials, reading assignments, Demonstrations, Team teaching, Teaching using advanced IT audio-video tools, G-suite. Self-learning assignments, Effective questions, Simulation, Seminar presentation | Class test, Semester end examinations, Quiz, Solving problems in tutorials, Assignments, Presentation, Individual and group projects |
Network Layer (Logical Addressing). IP v4 – Address Space, Notations, Classful addressing, classless addressing and Sub-netting and IP Distribution, IP v6 – Structure and Address space.
Network Layer (Internet Protocol) . Need for Network layer, IPv4 – Datagram, Fragmentation, Checksum, Options, IPv6 – Advantages, Packet Format, Extension Headers, Transition from IPv4 to IPv6 – Dual Stack, Tunneling and Header Translation.
Network Layer. Address Mapping, Error Reporting and Multicasting.
Network Layer. Direct and Indirect Delivery, Forwarding Process and Techniques, Routing Table, Unicast Routing Protocols – Optimization, Intra and Inter domain Routing, Distance vector routing, Link state routing, Path vector routing. Process to process delivery- Client server paradigm, Multiplexing and Demultiplexing, connectionless versus connection oriented services, reliable versus unreliable, User Datagram Protocol- Ports , User Datagram, Checksum, UDP operation and its use, TCP- services, features and segment, TCP connection, Flow control, Error control and congestion control.
Information Security. Introduction, History of Information security, what is Security, Components of Information System. Network Security. Services, Mechanism and Attacks, The OSI security Architecture, Model of Network Security.
Cryptography. Concepts and Techniques, symmetric and asymmetric key cryptography, steganography, Symmetric key Ciphers. DES structure, DES Analysis, Security of DES, variants of DES
Block cipher modes of operation, AES structure, Analysis of AES, Key distribution Asymmetric Key Ciphers. Principles of public key cryptosystems, RSA algorithm, Analysis of RSA, Diffie-Hellman Key exchange.
Key distribution Asymmetric Key Ciphers. Principles of public key cryptosystems, RSA algorithm, Analysis of RSA, Diffie-Hellman Key exchange.
Message Authentication and Hash Functions. Authentication requirements and functions, MAC and Hash Funtions, MAC Algorithms. Secure Hash Algorithm, Digital signatures, X.509, Kerberos.
Data base Security. Security requirements, Reliability and integrity, Sensitive data, Inference, multilevel database, proposals for multilevel security.
Security in Network. Threats in Network, Network Security Controls, Intruders, Virus and Firewalls. Intruders, Intrusion detection, password management, Virus and related threats, Countermeasures, Firewall design principles, Types of firewalls, Secure E-Mail.
Administering Security. Security Planning, Risk Analysis, Organizational Security policies, Physical Security
SUGGESTED READINGS:
E RESOURCE:
Journals: