Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Course Description
UE15EC413:
NETWORK SECURITY - II (4-0-0-0-4)
Course Objectives:
This course provides a sound conceptual foundation in the area of Network Security with
emphasis on design aspects.
This course introduces the concepts related to design, build and analysis of simple network
security architectures and systems.
Course outcomes
At the end of the course, the student should be able to
1. Comprehend system and application design aspects of network security.
2. Analyse network systems through cryptographic, systemic and computational security
aspects.
3. Design a framework for verification and assessment of a network system
4. Identify vulnerabilities in a given network.
Course content:
1. Introduction to Network Security, Systems and Cryptographic approaches. Elements and aspects
of Network Security, Network Security Architectures. An overview of types of Security attacks and
breaches, Concept of Security services, Associated Security Mechanisms, Models of Network
Security, Examples.
2. Security at the Network / IP level. IP-level Security, Need, Implications, Mechanisms, Choices,
Applications, Examples. Security in IPv4 and IPv6, Trade-offs involved, Points to take-away
Virtual Private Networks, Purpose, Types, Principles involved, Applications.
3. Security at the Transport and Application level. Need for Application-level and Transport-level
security, Mechanisms, Techniques, Applications, Examples. Security for the Web-based
Transactions, SSL and TLS Of HTTPS and Secure Shell (SSH) E-mail Security, Need,
Mechanisms, Choices, Examples.
4. Designing secure networks and internetworks, Basic idea, Process involved, Devices,
Positioning, Configuration and Trade-offs, Examples, Firewalls. More on Firewalls, Intrusion
Detection Systems and Perimeter Security of Virus, Worms, other malware and Spyware. Security
in Clouds: Facts and Myths, Current Status, Emerging trends, Examples Recent Advances in
Network Security technology, Emerging trends, Best practices, Take-away points.
Reference Books:
4. Jie Wang, Zachary Kissel, Introduction to Network Security – Theory and Practice,
Wiley Publication
NETWORK SECURITY - II
LESSON PLAN
UNIT-5
Designing secure Software Security, Buffer Overflow. Malicious 20 100
networks and Software, IDS, IPS, Firewalls, Security Audit,
internetworks IT Security Management, Ethics, Case Studies
41-52
Textbook 3
Textbook 4
Textbook 1
Literature: