054001-COMPUTER NETWORK AND SECURITY

• Understand the concept of data communication.
• Discuss the advantages and disadvantages of different network topologies.
• Know different network classification based on different category.
• Study about different networking devices and their practical usages.
• Understand the different layers of OSI and their functions.
• Compare different LAN protocols.
• Study about ISDN and FDDI concepts and its applications.
• Identify the protocols used in TCP /IP and compare with OSI model. Understand the basic concepts of network security.
• Identify the attacks and threats.
• Study about Cryptography and different Cryptography Algorithms.
• Discuss about Network Security Applications.
• Know the applications of Network Security.
• Discuss about VPN and Firewalls.
• Identify the Wireless Security Issues.

Types of security threat- Describe security threats. • virus; • malware; • DDoS attacks; • Trojan; • worm; • spyware; • social engineering; • phishing attacks; • man-in-the-middle; • DNS poisoning. Describe vulnerabilities. • ports; • services; • code

Describe security procedures. • Security policy; • securing the perimeter; • physical security; • securing the network; • securing devices; • securing applications; • O/S updates. Describe common ways to protect data. • file and folder permissions; • encryption; • group policy. Describe protection against malicious software. • anti-virus; • anti-malware Describe types of firewalls. • packet filter; • stateful; • application level; • intrusion detection systems; • intrusion prevention systems.

Definition – Symmetric Encryption principle – Encryption Algorithms – DES, AES – Stream ciphers – RC4 – Digest function – Public key Cryptography Principles – RSA - Diffe - Hellman algorithm – Digital Signature (Definition Only) Network Security Application: Authentication applications –Encryption Techniques; Internet Security: Email security - IP security – Overview – Web security - SSL, TLS, SET ( Concepts only)

Basic concepts of RAID levels, Hackers Techniques: Ethical hacking, hacking techniques, worms-Trojan horses-SPAM Security Mechanism: Introduction – Types of Fire walls – Packet filters – Application gateways– Limitations of fire walls. Intrusion: Intruders – Intruder detection – Classification of Intruder Detection systems – Honey pots. Wireless Security Issues: Definition and Types - Transmission Security, Authentication, WLAN Detection, Active Attacks and Passive Attacks

What is cyber Security, Why cyber security is required, Cyber terrorism, Cyber war fare, Cyber espionage, How to Maintain Effective Cyber security, What is IT Act 2000, Features of I.T Act, Scheme of I.T Act, Application of the I.T Act, Amendments Brought in the I.T Act, Intermediary Liability.

1. Data Communication and networking, Behrouz A. Forouzen Tata McGrawHill, New Delhi Fifth Edition
2. NetworkSecurity Essentials, William Stallings Pearson Publications. Fifth Edition
3. CRYPTOGRAPHY AND NETWORK SECURITY William Stallings Pearson Publications. Sixth Edition
Contributions are welcome!
If you find any issues or want to add new features, feel free to submit a pull request on GITHUB

To Download Privious Year Question Papers of all Semester (CSE) Follow and DM on -



Website Developed by