Sei sulla pagina 1di 4

PES University

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING

Course Description
UE15EC413:
NETWORK SECURITY - II (4-0-0-0-4)
Course Objectives:
 This course provides a sound conceptual foundation in the area of Network Security with
emphasis on design aspects.
 This course introduces the concepts related to design, build and analysis of simple network
security architectures and systems.

Course outcomes
At the end of the course, the student should be able to
1. Comprehend system and application design aspects of network security.
2. Analyse network systems through cryptographic, systemic and computational security
aspects.
3. Design a framework for verification and assessment of a network system
4. Identify vulnerabilities in a given network.

Course content:

1. Introduction to Network Security, Systems and Cryptographic approaches. Elements and aspects
of Network Security, Network Security Architectures. An overview of types of Security attacks and
breaches, Concept of Security services, Associated Security Mechanisms, Models of Network
Security, Examples.

2. Security at the Network / IP level. IP-level Security, Need, Implications, Mechanisms, Choices,
Applications, Examples. Security in IPv4 and IPv6, Trade-offs involved, Points to take-away
Virtual Private Networks, Purpose, Types, Principles involved, Applications.

3. Security at the Transport and Application level. Need for Application-level and Transport-level
security, Mechanisms, Techniques, Applications, Examples. Security for the Web-based
Transactions, SSL and TLS Of HTTPS and Secure Shell (SSH) E-mail Security, Need,
Mechanisms, Choices, Examples.

4. Designing secure networks and internetworks, Basic idea, Process involved, Devices,
Positioning, Configuration and Trade-offs, Examples, Firewalls. More on Firewalls, Intrusion
Detection Systems and Perimeter Security of Virus, Worms, other malware and Spyware. Security
in Clouds: Facts and Myths, Current Status, Emerging trends, Examples Recent Advances in
Network Security technology, Emerging trends, Best practices, Take-away points.

5. Security in the context of E-commerce / m-commerce, document interchange, e-Voting


Authentication of Remote Users, Issues, Mechanisms, Examples, Kerberos-based security
scenarios. Certification Process and Agencies involved. Biometrics in Network and Internet
Security, e-Passports, e-VISA and more. Security in Wireless Networks, Basic problems, Issues,
Techniques, Examples
Case-Studies on: Firewalls, Intrusion Detection Systems and Perimeter Security, Anti-Virus, Anti-
Worms, Anti-Spyware and other Anti-malware systems, State-of-the-art practices in Modern
Network and Internetwork Security

Pre-requisite Courses: Network Security, Computer Networks

Reference Books:

1. Douglas Jacobson: Introduction to Network Security, Chapman & Hall/CRC


Computer and Information Series. 2008

2. William Stallings, Lawrie Brown: Computer Security- Principles and Practice,


Pearson, Third or Fourth Edition

3. William Stallings, Lawrie Brown: Computer Security Essentials- Applications and


Standards, Prentice Hall, Fourth Edition

4. Jie Wang, Zachary Kissel, Introduction to Network Security – Theory and Practice,
Wiley Publication
NETWORK SECURITY - II

Subject Code: 15EC413 No. of Hours: 52

LESSON PLAN

Class Chapter % of Portion Covered


# Title/Reference Topics to be Covered Individual Cumulative
Literature
UNIT-1
Introduction to Overview of Network Layers and Protocols. 20 10
Network Security, Review of Network Concepts and Threats,
Systems and Network Protocols, Addressing in Internet,
Cryptographic Taxonomy of Network Based Vulnerabilities,
1-10
approaches Key Distribution and Authentication in
Internet
Textbook 3
Textbook 1
UNIT-2
Security at the Security in various Network Layers- Security 20 40
Network / IP level at Physical Layer, Network Layer, Transport
and Transport Layer.
Layer Physical Network Layer Overview- Common
Attack methods, Wired Network Protocols,
11-20 Wireless Network Protocols
Network Layer Protocols- IPV4 Protocol,
Textbook 1 IPV6 Protocol, ARP, ICMP, BOOTP, DHCP
Textbook 2 Transport Layer Protocols- TCP, UDP, DNS,
TLS
Common Countermeasures
UNIT-3
Application Layer Application Layer Security, Web Security, 20 60
Security Remote Access Security
Vulnerabilities and Attacks in Sockets, Email
21-30
Textbook 1 security, HTTP, HTML, Server/Client
Textbook 2 Security, TELNET, P2P, FTP
Common Countermeasures
UNIT-4
Security Issues in User Authentication, Access Control, Cloud 20 80
Cloud and and Database Security.
Databases Principles, modes and vulnerabilities of
Access control, Database and Cloud
31-40 Textbook 2 architectures- Vulnerabilities and
Textbook 4 Countermeasures, Security in Databases and
Cloud

UNIT-5
Designing secure Software Security, Buffer Overflow. Malicious 20 100
networks and Software, IDS, IPS, Firewalls, Security Audit,
internetworks IT Security Management, Ethics, Case Studies
41-52
Textbook 3
Textbook 4
Textbook 1

Literature:

Book Type Title & Author Publication info


Publisher Edition
Text Book 1 Introduction to Network Security, Chapman & Hall/CRC 2008
Douglas Jacobson Computer and
Information Series
Text Book 2 Computer Security- Principles and Pearson Education Third or
Practice, William Stallings, Lawrie Fourth
Brown Edition
Text Book 3 Introduction to Network Security Wiley Publication
Theory and Practice , Jie Wang,
Zachary Kissel
Text Book 4 Computer Security Essentials- Prentice Hall Fourth
Applications and Standards, Edition

Internal Assessment : (40 Marks):

Test 1 (T1) – 20 Marks


Test 2 (T2) - 20 Marks

End Semester Assessment : (60 Marks):

Potrebbero piacerti anche