{{{credits}}}
L | T | P | C |
3 | 0 | 0 | 3 |
- To study about the essentials of computer security
- To acquire knowledge on TCP/IP security, firewalls, IPSec, Virtual Private Networks, and intrusion detection systems
- To understand how various security mechanisms work, and correlate these security mechanisms with security principles
- To learn the security aspects of data center
- To learn the security protocols and technologies with respect to infrastructure.
{{{unit}}}
UNIT I | INTRODUCTION | 9 |
Computer Security Concepts – Security Attacks – Security Services - Security Mechanisms - A Model for Network Security- Standards. Attack on Public Key Cryptography – Public Key Certificates: X.509 Authentication services – Attacks on PKI – Types of Digital Certificates.
{{{unit}}}
UNIT II | SECURITY PRACTICES & SYSTEM SECURITY | 9 |
Internet Firewalls for Trusted System: Roles of Firewalls – Types of Firewalls – Netfilter – IPtables – Firewall design Principles – DNS Attacks – Cache Poisoning – SET (Secure Electronic Transaction) for E-Commerce Transactions. Intruder – Intrusion detection system – Virus and related threats – Countermeasures.
{{{unit}}}
UNIT III | E-MAIL, IP & WEB SECURITY | 9 |
E-mail Security: Security Services for E-mail-attacks possible through E-mail – Establishing keys privacyauthentication of the source – Message Integrity-Non-repudiation – Pretty Good Privacy – S/MIME; IPSecurity: Overview of IPSec – IP and IPv6 – Authentication Header – Encapsulation Security Payload (ESP) – Internet Key Exchange; Web Security: SSL/TLS Basic Protocol – Computing the keys – Client authentication – PKI as deployed by SSLAttacks fixed in v3 – Exportability-Encoding - SET.
{{{unit}}}
UNIT IV | DATA CENTER SECURITY OVERVIEW | 9 |
Data center security overview: Need for a secure data center – Vulnerabilities and common attacks; Network Security Infrastructure; Security Fundamentals; Data center security frameworks: Security policies – Security lifecycle; Secure Management Framework.
{{{unit}}}
UNIT V | SECURITY PROTOCOLS AND TECHNOLOGIES | 9 |
Security Protocols and Technologies: Cryptography – PKI – Transport Security – Authentication Protocols and Technologies; Network management security; Integrating security into the infrastructure: Defining security zone – Internet Edge – Intranet Server Farm – Server-Farm Design Alternative – Management Network.
\hfill Total Periods: 45
After the completion of this course, students will be able to:
- Understand the essentials of computer security (K2)
- Understand various applications of network security (K2)
- Understand the essentials of security practices and system security (K2)
- Explain the security aspects in designing a datacenter (K2)
- Design the security protocols for the infrastructure (K3)
- William Stallings, “Network Security Essentials: Applications and Standards”, Sixth Edition, Pearson, 2017.
- Mauricio Arregoces, Maurizio Portolani, “Data Center Fundamentals”, Cisco Press, 2003.
- Charlie Kaufman, Radia Perlman and Mike Speciner , “Network Security: Private Communication in a Public World”, Second Edition, Pearson Education, 2017.
- Wenliang Du, “Computer Security: A Hands-on Approach”, CreateSpace Independent Publishing Platform, First Edition, 2017.
PO1 | PO2 | PO3 | PO4 | PO5 | PO6 | PO7 | PO8 | PO9 | PO10 | PO11 | PO12 | PSO1 | PSO2 | PSO3 | ||
K3 | K6 | K6 | K6 | K6 | K6 | K5 | K6 | |||||||||
CO1 | K2 | 2 | 1 | 1 | ||||||||||||
CO2 | K2 | 2 | 1 | 1 | ||||||||||||
CO3 | K2 | 2 | 1 | 1 | ||||||||||||
CO4 | K2 | 2 | 1 | 1 | ||||||||||||
CO5 | K3 | 2 | 2 | 2 | ||||||||||||
Score | 11 | 6 | 6 | |||||||||||||
Course Mapping | 3 | 2 | 2 |