Netwrk Security - Less Plan
Netwrk Security - Less Plan
Netwrk Security - Less Plan
Year: 2016
IA Marks: 25
Checked By:
Prerequisites: The student should have undergone the course on the following topics
Basic knowledge of networking concepts.
Basics of cryptography.
OSI Model and its specifications.
Virus attacks information.
Illustrate the basic fundamental networking concepts and OSI model for security.
Understand the different types of cryptographies.
Introduce authentication techniques.
Discuss various types of virus and construction of firewalls.
Subject/Course Outcomes:
After completing this course the student must demonstrate the knowledge and ability to:
1. Build a fundamental understanding of the objectives of cryptography and network security.
2. Become familiar with the cryptographic techniques that provides information and network security.
3. Impart knowledge on Encryption techniques, Design Principles and Modes of operation.
4. Analyze a given system with respect to security of the system.
5. Understand the Key Management techniques and Number Theory.
6. Create an understanding of Authentication functions the manner in which Message Authentication
Codes and Hash Functions works.
7. Examine the issues and structure of Authentication Service and Electronic Mail Security
8. Provide familiarity in Intrusion detection and Firewall Design Principles.
Page 1 of 19
Course code:10EC832
Year: 2015 - 2016 (Even Sem)
Life-long learning
3. Impart knowledge on
Encryption techniques,
Design Principles and
Modes of operation.
H
H
6. Create an understanding
of Authentication functions
the manner in which
Message Authentication
Codes and Hash Functions
works.
12
11
Communication
10
Individual and team work
9
Ethics
8
Environment and sustainability
7
The engineer and society:
6
Modern tool usage:
5
Conduct investigations of complex problems
cryptographic techniques
that provides information
and network security.
4
Design/development of solutions
1. Build a fundamental
understanding of the
objectives of cryptography
and network security.
2. Become familiar with the
3
Problem analysis
Subject/Course Learning
Objectives-SLO/CLO
2
Engineering knowledge
L
L
8.Provide familiarity in
M
L
L
Intrusion detection and
Firewall Design Principles.
Degree of compliance L: Low M: Medium
H: High
Page 2 of 19
H
L
Syllabus Content
Subject Code: 10EC832
Subject Name:Network Security
Teaching Hours: 52
IA: 25
Exam Marks: 100
Part A
UNIT 1
Services,mechanisms and attacks,The OSI security achitecture,A model for network
security
UNIT 2
SYMMETRIC
CIPHERS:
Symmetric
Cipher
Model,
6 hours
Substitution Techniques,
7 hours
and Modes of Operation, Evaluation Criteria for Advanced Encryption Standard, The
AES Cipher.
UNIT 3
Principles of Public-Key Cryptasystems, The RSA algorithm, Key Management, Diffie
Hellman Key Exchange, Elliptic Curve Arithmetic, Authentication functions, Hash
Functions.
UNIT 4
Digital signatures, Authentication Protocols, Digital Signature Standard.
6 hours
7 hours
PartB
UNIT 5
Web Security Consideration, Security socket layer (SSL) and Transport layer security,
Secure Electronic Transaction.
6 hours
UNIT 6
6 hours
7 hours
UNIT 8
MALICIOUS SOFTWARE: Viruses and Related Threats, Virus Countermeasures.
6 hours
TEXT BOOKS:
Page 3 of 19
Evaluation Scheme
IA Scheme
Assessment
Weightage in Marks
25
25
25
Assignments
00
Total
25
Part- A
Part- B
Chapter
Teaching
Hours
Overview
06
Symmetric Ciphers
07
06
07
Web Security
06
Inruders
06
Malicious Software
07
Firewalls
06
No. of Questions in
IA Exam I
VTU Exam
Pattern
(Answer
any
two questions)
No. of Questions
in ImprovementIA Exam III
IA Exam II
VTU Exam
Pattern
(Answer
any
two questions)
VTU Exam
Pattern
(Answer any 2
questions from
part A, Part B
and 1 from either
Part A or Part B)
Note:
Answer 5 full questions of 20 marks each (two full questions from Part A, Part BI, and 1 full question
from Either Part A of Part B) out of 8 in Semester Exam.
Date:
Head of Department
Page 4 of 19
Planned Hours: 06
Learning Objectives
At the end of this chapter student should be able to:
1. Provide an introduction to the fundamental principles of cryptography and its applications on the
network security domain.
2. Illustrate the concepts of cryptography.
Learning Outcomes
1. Explain the model of network security.
2. Distinguish between various kinds of attacks.
Lesson Schedule
1. Introduction to Cryptography
2. Security Services
3. Security mechanisms and attacks
4. The OSI security architecture
5. A model for network security
Review Questions:
1.What is the OSI security architecture?
2 What is the difference between passive and active security threats?
3 List and briefly define categories of passive and active security attacks.
4 List and briefly define categories of security services.
Page 5 of 19
4. DoS is a
A
.
B.
C.
Disk operating
system
Denial of service
attack
Detected on-going
service
Critical Questions:
1.Explain the working of the playfair cipher with an example.
2 List and briefly define categories of security mechanisms.
Challenging Questions:
1. Consider an automated teller machine (ATM) in which users provide a personal identification number (PIN) and a
card for account access. Give examples of confidentiality, integrity, and availability requirements associated with the
system and, in each case, indicate the degree of importance of the requirement.
Unit - 2
Subject Code and Name: 10EC832 Network Security
2.Symmetric Ciphers
Planned Hours: 07
Learning Objectives
At the end of this chapter student should be able to:
1. Study various approaches to Encryption techniques, strengths of Traffic Confidentiality
2. Analyze security and structure of Data Encryption Standard.
Learning Outcomes
1.Perform encryption on different data
2.Distinguish betweeen block cipher and stream cipher.
3.Describe about steganography.
Lesson Schedule
1. Symmetric Ciphers:Symmetric Cipher Model
2. Substitution Techniques
3. Transposition Techniques
4. Simplified DES, Data encryption standard (DES)
5. The strength of DES
6. Differential and Linear Cryptanalysis
7. Block Cipher Design Principles and Modes of Operation
8. Evaluation Criteria for Advanced Encryption Standard
9. The AES Cipher
Page 6 of 19
1. Which of the following network operating system logon restrictions is most likely to stop a hacker who is
attempting to discover someone's password through a brute force or dictionary attack?
Total time
logged on
Time
of day
C.
Period of time after which a password
expires
D.
Number of unsuccessful logon
attempts
2. You need to use multiple antivirus applications on the same computer.
A
T
.
r
u
e
B.
F
a
l
s
e
3. What is the main problem of a modern
antivirus?
A
High price and the absence of free telephone
.
support
B.
False
positives
C.
Dependence on antivirus
signatures
D.
High memory
and cpu
4. What is a hash?
A
An encrypted
.
value
B.
A
decryption
key
C.
Code used to compress
data
5. Which of the following is most likely to steal your
identity?
A
T
.
r
oj
a
n
B.
W
o
r
A
.
B.
Page 7 of 19
C.
D.
E.
Critical Questions:
1.
2.
3.
Challenging Questions:
1. A ciphertext has been generated with an affine cipher.The most frequent letter of the ciphertext is
B, and the second most frequent letter of the ciphertext is U. Break this code.
2.The following ciphertext was generated using a simple substitution algorithm.
53305))6*;4826)4.)4);806*;48860))85;;]8*;:*883
(88)5*;46(;88*96*?;8)*(;485);5*2:*(;4956*2(5*4)88*;
4069285);)68)4;1(9;48081;8:81;4885;4)485528806*81(9;48;(88;4(?
34;48)4;161;:188;?;
Decrypt this message.
Unit - 3
Subject Code and Name: 10EC832 Network Security
3.Asymmetric Ciphers
Planned Hours: 06
Learning Objectives
At the end of this chapter student should be able to:
1. To be familiar with cryptographic techniques for secure (confidential) communication of two parties over an
insecure (public) channel.
Learning Outcomes
1. Illustrate Deffie Hellman key exchange algorithm.
2. Distinguish between conventional and public key encryption methods.
Lesson Schedule
1. Principles of Public-Key Cryptasystems
2. The RSA algorithm
Page 8 of 19
Review Questions:
1. What are the principal elements of a public-key cryptosystem?
2 What are the roles of the public and private key?
3 What are three broad categories of applications of public-key cryptosystems?
as:
B.
C.
D.
Mal
war
e
Malicious
code
Malicious
software
All of the above
network.
T
r
u
e
B.
False
3.
Which of the following is true regarding access lists applied to an interface?
A
.
A.
You can place as many access lists as you want on any interface until you run out of
memory.
B.
C.
One access list may be configured, per direction, for each layer 3 protocol configured on an
interface.
D.
Critical Questions:
1.
2.
3.
4.
Challenging Questions:
1. In using the RSA algorithm, if a small number of repeated encodings give back the plaintext, what is the likely
cause?
Page 9 of 19
Unit 4
Subject Code and Name: 10EC832 Network Security
4.Digital Sigantures
Planned Hours: 07
Learning Objectives
At the end of this chapter student should be able to:
1. Be familiar with verification of the authenticity of the source of a message.
Learning Outcomes
1. Discuss RSA and DSS approaches of digital siganture standards.
2. Define the classes of message authentication functions.
Lesson Schedule
1. Digital signatures
2. Direct Digital Signature,Arbitrated Digital Signature
3. Authentication Protocols
4. Mutual Authentication
5. One-Way Authentication
6. Digital Signature Standard
7. Digital Signature Algorithm
Review Questions:
1. List two disputes that can arise in the context of message authentication.
2 What are the properties a digital signature should have?
Page 10 of 19
Critical Questions:
1. What is the difference between direct and arbitrated digital signature?
2.In what order should the signature function and the confidentiality function be applied to a message, and why?
3. What are some threats associated with a direct digital signature scheme?
Challenging Questions:
1.DSA specifies that if the signature generation process results in a value of s=0 , a new value of k should be
generated and the signature should be recalculated.Why?
2 What happens if a value used in creating a DSA signature is compromised?
Unit 5
Subject Code and Name: 10EC832 Network security
Unit Number and Title: 5.Web Security Consideration
Planned Hours: 06
Learning Objectives
At the end of this chapter student should be able to:
1. Discuss SSL record protocol.
2. Discuss Secure Electronic Transaction protocol.
Learning Outcomes
1. Explain the SET requirements.
2. Exlain various phases of SSL handshake protocol.
Lesson Schedule
1. Web Security Consideration
2. Security socket layer (SSL)
3. SSL Record Protocol
4. Handshake Protocol
Page 11 of 19
Review Questions:
1.What are the advantages of each of the three approaches?
2 What protocols comprise SSL?
3 What is the difference between an SSL connection and an SSL session?
4 What steps are involved in the SSL Record Protocol transmission?
Page 12 of 19
5.
A
.
B.
C.
D.
6.
A
.
B.
C.
D.
l
s
e
What IDS identifies intrusions based on a preset database that identifies known attack
signatures?
Host
Based IDS
Behavior
Based IDS
Knowledge
Based IDS
Network
Based IDS
__________ is a method used by firewalls to filter and block unauthorized traffic.
Heuristic
Scanning
Stateful/Packet
Inspection
Intrusion
Detection
Active
Scripting
Critical Questions:
1. List and briefly define the parameters that define an SSL session state.
2. List and briefly define the parameters that define an SSL session connection.
3. What services are provided by the SSL Record Protocol?
Challenging Questions:
1. What is the purpose of HTTPS?
2.For what applications is SSH useful?
3.List and briefly define the SSH protocols.
Unit 6
Subject Code and Name: 10EC832 Network Security
Unit Number and Title: 6.Intruders
Planned Hours: 06
Learning Objectives
At the end of this chapter student should be able to:
1. Describe Intrusion detection mechanisms.
2. Explain the architecture of distributed intrusion detection system.
Page 13 of 19
Review Questions:
1. List and briefly define three classes of intruders.
2 What are two common techniques used to protect a password file?
3 What are three benefits that can be provided by an intrusion detection system?
4 What is the difference between statistical anomaly detection and rule-based intrusion
detection?
B.
18.
A
.
B.
C.
D.
19.
A
.
B.
C.
D.
20.
routers.
T
r
u
e
F
a
l
s
e
Zone Alarm is an example of a ________ firewall.
Per
son
al
Corp
orate
I
D
S
None of the
above
How should you protect your wireless
network?
Don't broadcast your
SSID
Use
encryption
Only let known computers connect to your access
point.
All of the
above
Encrypting sensitive data on a hard drive
means
Page 14 of 19
Critical Questions:
1. What metrics are useful for profile-based intrusion detection?
2.What is the difference between rule-based anomaly detection and rule-based penetration
identification?
3. What is a honeypot?
4. What is a salt in the context of UNIX password management?
5.List and briefly define four techniques used to avoid guessable passwords.
Challenging Questions:
1.An example of a host-based intrusion detection tool is the tripwire program.This is a file integrity
checking tool that scans files and directories on the system on a regular basis and notifies the
administrator of any changes. It uses a protected database of cryptographic checksums for each file
checked and compares this value with that recomputed on each file as it is scanned. It must be
configured with a list of files and directories to check, and what changes, if any, are permissible to
each. It can allow, for example, log files to have new entries appended, but not for existing entries to
be changed.What are the advantages and disadvantages of using such a tool? Consider
the problem of determining which files should only change rarely, which files may change more often
and how, and which change frequently and hence cannot be checked. Hence consider the amount of
work in both the configuration of the program and on the system administrator monitoring the
responses generated.
Unit 7
Subject Code and Name: 10EC832 Network Security
7.Malicious Software
Planned Hours: 07
Learning Objectives
At the end of this chapter student should be able to:
1. Describe malicious program.
Learning Outcomes
1. Explain digital immune system.
2. List out different types of viruses and explain them.
Lesson Schedule
1. Malicious Software-Viruses and Related Threats,
2. Malicious Programs,The Nature of Viruses
3. Types of Viruses
4. Macro Viruses,Email Viruses,Worms
5. Virus Countermeasures-Antivirus Approaches
6. Advanced Antivirus Approaches
Page 15 of 19
7. Behaviour-Blocking Software
Review Questions:
1. What is the role of compression in the operation of a virus?
2 What is the role of encryption in the operation of a virus?
3 What are typical phases of operation of a virus or worm?
4 What is a digital immune system?
C.
D.
13.
A
.
B.
C.
D.
14.
A
.
B.
C.
15.
A
.
B.
16.
A
.
Page 16 of 19
B.
C.
D.
E.
oj
a
n
W
o
r
m
V
i
r
u
s
Spy
war
e
Ad
wa
re
Critical Questions:
1.
2.
3.
4.
Challenging Questions:
1.The list of passwords used by the Morris worm is provided at this books Web site.
a. The assumption has been expressed by many people that this list represents words commonly
used as passwords. Does this seem likely? Justify your answer.
b. If the list does not reflect commonly used passwords, suggest some approaches that Morris may
have used to construct the list.
Unit 8
Subject Code and Name: 10EC832 Network Security
8.Firewalls
Planned Hours: 06
Learning Objectives
At the end of this chapter student should be able to:
1. Expalin Firewall
2. Describe Multilevel security requirements and reference monitor functionality.
Learning Outcomes
1. Explain three types of firewall configurations.
2. List security rulesof reference monitor.
Lesson Schedule
1. Firewalls Design Principles
2. Firewall characteristics
3. Types of Firewalls
4. Firewall Configuration
Page 17 of 19
5. Trusted Systems
6. Data Access Control
7. The Concept of Trusted Systems
8. Trojan Horse Defense
Review Questions:
1.List three design goals for a firewall.
2 List four techniques used by firewalls to control access and enforce a security policy.
3 What information is used by a typical packet filtering firewall?
4 What are some weaknesses of a packet filtering firewall?
Critical Questions:
1.What is the difference between a packet filtering firewall and a stateful inspection firewall?
2.What is an application-level gateway?
3.What is a circuit-level gateway?
Challenging Questions:
1.What are the common characteristics of a bastion host?
2.Why is it useful to have host-based firewalls?
3. What is a DMZ network and what types of systems would you expect to find on such
2.
A
.
B.
C.
D.
3.
A
.
B.
to:
Page 18 of 19
Page 19 of 19