• Understand the concept of data communication.
• Discuss the advantages and disadvantages of different network topologies.
• Know different network classification based on different category.
• Study about different networking devices and their practical usages.
• Understand the different layers of OSI and their functions.
• Compare different LAN protocols.
• Study about ISDN and FDDI concepts and its applications.
• Identify the protocols used in TCP /IP and compare with OSI model.
Understand the basic concepts of network security.
• Identify the attacks and threats.
• Study about Cryptography and different Cryptography Algorithms.
• Discuss about Network Security Applications.
• Know the applications of Network Security.
• Discuss about VPN and Firewalls.
• Identify the Wireless Security Issues.
Describe security procedures. • Security policy; • securing the perimeter; •
physical security; • securing the network; • securing devices; • securing
applications; • O/S updates.
Describe common ways to protect data. • file and folder permissions; •
encryption; • group policy.
Describe protection against malicious software. • anti-virus; • anti-malware
Describe types of firewalls. • packet filter; • stateful; • application level; •
intrusion detection systems; • intrusion prevention systems.
Definition – Symmetric Encryption principle – Encryption Algorithms –
DES, AES – Stream ciphers – RC4 – Digest function – Public key
Cryptography Principles – RSA - Diffe - Hellman algorithm – Digital
Signature (Definition Only) Network Security Application: Authentication
applications –Encryption Techniques; Internet Security: Email security - IP
security – Overview – Web security - SSL, TLS, SET ( Concepts only)
Basic concepts of RAID levels, Hackers Techniques: Ethical hacking,
hacking techniques, worms-Trojan horses-SPAM Security Mechanism:
Introduction – Types of Fire walls – Packet filters – Application gateways–
Limitations of fire walls. Intrusion: Intruders – Intruder detection –
Classification of Intruder Detection systems – Honey pots. Wireless Security
Issues: Definition and Types - Transmission Security, Authentication,
WLAN Detection, Active Attacks and Passive Attacks
What is cyber Security, Why cyber security is required, Cyber terrorism,
Cyber war fare, Cyber espionage, How to Maintain Effective Cyber security,
What is IT Act 2000, Features of I.T Act, Scheme of I.T Act, Application of the
I.T Act, Amendments Brought in the I.T Act, Intermediary Liability.
1. Data Communication and networking, Behrouz A. Forouzen Tata McGrawHill, New Delhi Fifth Edition
2. NetworkSecurity Essentials, William Stallings Pearson Publications. Fifth
Edition
3. CRYPTOGRAPHY AND NETWORK SECURITY William Stallings Pearson
Publications. Sixth Edition
Contributions are welcome! If you find any issues or want to add new features, feel free
to
submit a pull request on
GITHUB
To Download Privious Year Question Papers of all Semester (CSE) Follow and
DM on -
Website Developed by
Sandeep Petwal
👋 Hello i'm Sandeep, i am student of computer science.