Hand Out Network Security
Hand Out Network Security
Hand Out Network Security
: SEWP ZG513
Course Title
: Network Security
Faculty details:
faculty_qry
name
mailid
Vagdevi S
Lohith J J
Mohammed
Tajuddin
Gururaja. H.S.
M. Rajeswari
saritha.chakrasali@gmai
l.com
Course Description
The primary goal of the course is to introduce the student to system and application design aspects of
network security including cryptographic, systemic and computational security aspects of the network /
internetwork systems.
Scope and Objectives
The course covers fundamental aspects of security in a modern networked environment with the focus on
system design aspects and cryptography in the specific context of network / internetwork security. It also
dwells into basics of cryptographic techniques, algorithms and protocols required to achieve these properties;
computational issues in implementing cryptographic protocols and algorithms; and system/application
design issues in building secure networked systems.
Prescribed Text Book
T1.
William Stallings: Cryptography and Network Security, Principles and Practices, Fifth Edition,
Pearson Education.
Reference Books
R1.
Writing Secure Code by Michael Howard and David Deblanc Microsoft Press
R2.
R3.
Kaufman, Perlman, and Speciner: Network Security, Private Communication in a Public World,
Second Edition, Pearson Education, 2006.
R4.
Sl
.
N
o
# of
Lectur
es
Reference
in
the book
Learning objectives
T1: Chapter
1
Overview of Network
Security: Services,
Mechanisms, Threats,
Vulnerabilities and
Attacks.
1.
2.
3.
4.
)
5.
Classical Encryption
Techniques
NIL
NIL
NIL
T1 Chapter 2
T1 Chapter
3, 6
T1 Chapter
6, 9
T1 Chapter
10, 11, 12
Important points to be
discussed
Security
Security
Security
Security
Trends
Attacks
Services ( X.800 )
Mechanisms ( X.800
Exercises to
be solved
1) Demo of
Nessus
2) Demo of
Nmap
Problems /
Assignments
to be given as
homework
See Assignment
Sheet 1
NIL
See Assignment
Sheet 2
R1: Chapter
8
T1 Chapter
14
T1 Chapter
15
Authenticaton
Applications,
E-Mail Security
1)
2)
3)
4)
10
11
NIL
REVIEW
Kerberos Version 4
X.509 Authinticaton Service
PGP
S-MIME
Example
programs will
be shown on
each of the
common
mistakes that
is being
discussed
IP Security,
Web Security
1) IPSec Archicture
2) AH & ESP
3) Security Associations
4) Secure Socket Layer ( SSL )
5) Secure Electronic
Transactions ( SET )
NIL
See Assignment
Sheet 3 & 4
T1 Chapter
18
T1 Chapter
19
Intruders,
Malicious Software
NIL
NIL
T1 Chapter
19
T1 Chapter
20
Distributed Denial of
service attacks, Firewall
Design considerations,
and Number theory.
NIL
NIL
T1 Chapter
16
T1 Chapter
17
12
13
14
15
Sample
programs to
highlight the
various points
of discussion
will be
discussed in
the class to
explain the
concepts. Also,
sample test
cases
specifically for
the validation
of the product
from a security
point of view
will be
discussed in
the class
NIL
R1: Chapter
15-17,19,
Reference
paper:
https://www
.cs.columbia.
edu/~smb/p
apers/acsacipext.pdf,
http://unixw
iz.net/techti
ps/iguidekaminskydnsvuln.html
Advanced secure
implementation
techniques as well as
verification techniques
Online
material:
http://www.f
aqs.org/docs
/iptables/
And
https://www
.cs.columbia.
edu/~smb/p
apers/distfw.
pdf
IPTables
firewall rules
will be demoed
and discussed
live in the class
NIL
Online
material:
http://lpilin
ux.com/snor
t-fulltutorial.html
SNORT will be
demonstrated
on Linux
machine and
IDS features
will be
demonstrated
NIL
Introduction to
wireshark for doing
network reconnaisance
activities
Example
wireshark
captured files
will be shown
and discussed
for the students
to understand
the concepts
discussed
NIL
R2: Chapter
10, 11.
Reference
paper
http://www.
phrack.com/
issues.html?
issue=51&id
=11&mode=t
xt
REVIEW
16
Evaluation Scheme:
EC No
Duration
Weightage
1.5 hrs
30%
--
10%
TBA
3 hrs
60%
Mid-Semester Test
1.
(Closed Book)
2.
3.
Assignment
Compre. Exam
(Open Book)
* TBA = To be announced
Instructor-in-charge