Вы находитесь на странице: 1из 4

DAYANANDA SAGAR ACADEMY OF TECHNOLOGY AND MANAGEMENT

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


LESSON PLAN

Course Title: Information and Network Security


L-T-P 4-1 Duration of Exam 3 HOURS

-0
Internal 25 marks External 100 marks
Contact hours 52 HOURS Course Code 10CS835
Class VIII Sem ‘B’ Sec Name of the Faculty Dr. C. Nandini

Course Description
Outcome
CO1 Explain Information & networks security issues, standards, policies and practices
CO2 To analyze various security technologies and tools depending on the security levels and
application
CO3 Analyze various cryptography fundamentals, private and public Cryptographic algorithms
CO4 Recognize network security designs, security requirements such as SSL and TSL for
Application developments.

Sl. Course
Date Unit Topics
No. Outcomes
Planning for Security: Introduction to information security, Goals of Information CO1
1. 05-02-2018 I Security Governance
05-02-2018 Information Security Policy, EISP and ISSP Elements and Components, Standards,
2. I and Practices, Issue specific Policy
3. 06-02-2018 I System Specific policy, policy management
4. 06-02-2018 I IS Blue Print, ISO 27000,ISO/IEC 27001:2005 information security system and
standards
07-02-2018 BS 7799 Plan Do Act cycle, NIST security models, IETF security architecture,
5. I design of security architecture
12-02-2018 Contingency plan, Incident response, Disaster recovery and Business continuity
6. I components of contingency plan
12-02-2018 Disaster recovery and Business continuity components of contingency plan
7. I (continued)
14-02-2018 Disaster recovery and Business continuity components of contingency plan
8. I (continued)
9. 19-02-2018 I Model for a consolidated contingency plan
10. 19-02-2018 II Security Technology 1: Introduction
11. 20-02-2018 II Mechanisms on which access control depends
20-02-2018 Firewalls types-based on processing modes, IP packet TCP packet, UDP datagram
12. II structure
13. 21-02-2018 II Firewall categorized by Generation, Firewall types based on structure
26-02-2018 Firewall Architectures-packet filtering, screened host, dual-homed and screened CO2
14. II subnet firewalls, selecting the right firewall, configuring and managing firewalls
15. 26-02-2018 II Firewall rules, Protecting remote connections, content filters

16. 27-02-2018 II
Protecting Remote Connections, Remote Access, Radius and TACACS, Securing
Authentication with Kerberos.
17. 27-02-2018 II VPN-Transport mode and Tunnel mode
28-02-2018 Security Technology 2: Introduction to Intrusion Detection & prevention systems,
18. III IDPS Terminology
IDPS types –i) Network and Host Based -Network Behavior Analysis System ii)
19. 05-03-2018 III Host-Based IDPS
05-03-2018 IDPS Detection methods –Signature-Based IDPS, Statistical Anomaly-Based IDPS,
20. III Stateful protocol Analysis IDPS, IDPS response behavior
06-03-2018 Strengths and Limitations of IDPSs, Deploying and implementing an IDPS-IDPS
21. III Control Strategies, IDPS Deployment, Measuring the Effectiveness of IDPSs. CO2
06-03-2018 Honey Pots and Honey Nets, Padded Cell systems, advantages and disadvantages of
22. III using the honeypot or padded cell approach.
07-03-2018 Scanning and analysis tool- Port Scanners, Firewall Analysis Tools, Operating
23. III System Detection Tools.
12-03-2018 Scanning and analysis tool -Vulnerability Scanners, Vulnerability Scanners, Packet
24. III Sniffers, Wireless Security Tools
12-03-2018 Cryptography: Introduction to Cryptography, Foundations of Cryptology, An
25. IV overview of the history of cryptosystems

13-03-2018 Terminology, Cipher Methods- bit stream and block cipher Method. Substitution
26. IV Cipher, transposition cipher (permutation cipher), Exclusive OR, Vernam Cipher,
Book or Running Key Cipher, Hash Functions
27. 13-02-2018 IV Cryptographic Algorithms -Symmetric Encryption, Asymmetric Encryption
CO3
28. 14-03-2018 IV Cryptographic Tools- Public-key Infrastructure (PKI), Digital Signatures
29. 19-03-2018 IV Digital Certificates, Hybrid Cryptography Systems, Steganography
19-03-2018 Attacks on Crypto systems- Man-in-the-Middle Attack, Correlation Attacks,
30. IV Dictionary Attacks, Timing Attacks
31. 20-03-2018 IV Attacks on Crypto systems(continued)
20-03-2018 Network Security: Introduction to network security, Authentication
32. V
33. 21-03-2018 V Security Attacks, Security Services & Mechanisms
34. 26-03-2018 V Network Security Model, standards
35. 26-0-2018 V RFC, Kerberos
36. 27-03-2018 V X.509 framework
CO4
37. 27-03-2018 V X.509 framework(Continued)
38. 28-03-2018 V Directory Authentication service
39. 02-04-2018 V Authentication and Revocation procedures
40. 02-04-2018 V PKIX
41. 03-04-2018 V PKIX(Continued)
42. 03-04-2018 VI Email Security: Pretty Good Privacy (PGP)
43. 04-04-2018 VI Cryptographic keys and rings
44. 09-04-2018 VI Message generation
45. 09-04-2018 VI Reception
46. 10-04-2018 VI public key management CO4
47. 10-04-2018 VI S/MIME
48. 16-04-2018 VI MIME Message structure and functionality
49. 16-04-2018 VI Certificate processing
50. 17-04-2018 VI Enhanced security services
51. 17-04-2018 VII IP Security: IP Security Overview
52. 23-04-2018 VII IP Security Architecture
53. 23-04-2018 VII Authentication Header
54. 24-04-2018 VII Encapsulating Security Payload CO4
55. 24-04-2018 VII Encapsulating Security Payload(Continued)
56. 25-04-2018 VII Combining Security Associations
57. 30-04-2018 VII Key Management
58. 30-04-2018 VIII Web Security: Web Security Overview
59. 02-05-2018 VIII Threats
60. 07-05-2018 VIII Approaches
61. 07-05-2018 VIII Secure Socket Layer
62. 08-05-2018 VIII SSL - protocols
CO4
63. 08-05-2018 VIII Transport Layer Security (TLS)
64. 09-05-2018 VIII Transport Layer Security (TLS)(Continued)
65. 14-05-2018 VIII Secure Electronic Transaction (SET)
66. 14-05-2018 VIII SET Participants, Process example
67. 15-05-2018 VIII Dual signature, SET types
68. 15-05-2018 Revision
69. 21-05-2018 Revision
70. 21-05-2018 Revision
71. 22-05-2018 Discussing previous year question papers.
72. 22-05-2018 Discussing previous year question papers.
73. 23-05-2018 Discussing previous year question papers.

Text Books:
1. Michael E. Whitman and Herbert J. Mattord: Principles of Information Security, 2nd Edition, Cengage
Learning, 2005. (Chapters 5, 6, 7, 8; Exclude the topics not mentioned in the syllabus)
2. William Stallings: Network Security Essentials: Applications and Standards, 3rd Edition, Pearson
Education, 2007. (Chapters: 1, 4, 5, 6, 7, 8)

Reference Books:
1. 1. E. Behrouz A. Forouzan: Cryptography and Network Security, Special Indian Edition, TMH, 2007.

Question Paper Pattern:

1. Eight questions with 20 marks each to be set selecting one question based on each of the units 1 to 8
containing two parts.
2. Any five full questions are to be answered choosing at least two from each part.

Test dates:

1st TEST 2nd TEST 3rd TEST


08-03-2018 11-04-2018 16-05-2018
09-03-2018 12-04-2018 17-05-2018
10-03-2018 13-04-2018 18-05-2018

Signature of the Staff Signature of the HOD Signature of the Principal


(Dr. C. Nandini) (Dr. C. Nandini) (Dr. B.R Lakshmikantha)

Вам также может понравиться