Skip to content

Latest commit

 

History

History
123 lines (99 loc) · 5.2 KB

PE506-Network-and-Server-Security.org

File metadata and controls

123 lines (99 loc) · 5.2 KB

<<<PE506>>> NETWORK AND SERVER SECURITY

{{{credits}}}

LTPC
3003

COURSE OBJECTIVES

  • To study about the essentials of computer security
  • To acquire knowledge on TCP/IP security, firewalls, IPSec, Virtual Private Networks, and intrusion detection systems
  • To understand how various security mechanisms work, and correlate these security mechanisms with security principles
  • To learn the security aspects of data center
  • To learn the security protocols and technologies with respect to infrastructure.

{{{unit}}}

UNIT IINTRODUCTION9

Computer Security Concepts – Security Attacks – Security Services - Security Mechanisms - A Model for Network Security- Standards. Attack on Public Key Cryptography – Public Key Certificates: X.509 Authentication services – Attacks on PKI – Types of Digital Certificates.

{{{unit}}}

UNIT IISECURITY PRACTICES & SYSTEM SECURITY9

Internet Firewalls for Trusted System: Roles of Firewalls – Types of Firewalls – Netfilter – IPtables – Firewall design Principles – DNS Attacks – Cache Poisoning – SET (Secure Electronic Transaction) for E-Commerce Transactions. Intruder – Intrusion detection system – Virus and related threats – Countermeasures.

{{{unit}}}

UNIT IIIE-MAIL, IP & WEB SECURITY9

E-mail Security: Security Services for E-mail-attacks possible through E-mail – Establishing keys privacyauthentication of the source – Message Integrity-Non-repudiation – Pretty Good Privacy – S/MIME; IPSecurity: Overview of IPSec – IP and IPv6 – Authentication Header – Encapsulation Security Payload (ESP) – Internet Key Exchange; Web Security: SSL/TLS Basic Protocol – Computing the keys – Client authentication – PKI as deployed by SSLAttacks fixed in v3 – Exportability-Encoding - SET.

{{{unit}}}

UNIT IVDATA CENTER SECURITY OVERVIEW9

Data center security overview: Need for a secure data center – Vulnerabilities and common attacks; Network Security Infrastructure; Security Fundamentals; Data center security frameworks: Security policies – Security lifecycle; Secure Management Framework.

{{{unit}}}

UNIT VSECURITY PROTOCOLS AND TECHNOLOGIES9

Security Protocols and Technologies: Cryptography – PKI – Transport Security – Authentication Protocols and Technologies; Network management security; Integrating security into the infrastructure: Defining security zone – Internet Edge – Intranet Server Farm – Server-Farm Design Alternative – Management Network.

\hfill Total Periods: 45

COURSE OUTCOMES

After the completion of this course, students will be able to:

  • Understand the essentials of computer security (K2)
  • Understand various applications of network security (K2)
  • Understand the essentials of security practices and system security (K2)
  • Explain the security aspects in designing a datacenter (K2)
  • Design the security protocols for the infrastructure (K3)

TEXT BOOKS

  1. William Stallings, “Network Security Essentials: Applications and Standards”, Sixth Edition, Pearson, 2017.
  2. Mauricio Arregoces, Maurizio Portolani, “Data Center Fundamentals”, Cisco Press, 2003.

REFERENCES

  1. Charlie Kaufman, Radia Perlman and Mike Speciner , “Network Security: Private Communication in a Public World”, Second Edition, Pearson Education, 2017.
  2. Wenliang Du, “Computer Security: A Hands-on Approach”, CreateSpace Independent Publishing Platform, First Edition, 2017.
PO1PO2PO3PO4PO5PO6PO7PO8PO9PO10PO11PO12PSO1PSO2PSO3
K3K6K6K6K6K6K5K6
CO1K2211
CO2K2211
CO3K2211
CO4K2211
CO5K3222
Score1166
Course Mapping322