COMPUTER AND NETWORK SECURITY (3350704)  

7
Credit
3 + 0 + 4
Lect + Tuto + Pract
Teaching Scheme
70 + 30 + 0
ESE + PA + ALA
Theory Marks
40 + 0 + 60
ESE + OEP + PA
Practical Marks
ESE - End Semester Examination, PA - Progress Assessment, ALA - Active Learning Assignments, OEP -Open Ended Problem


Rationale
Present computing era is based on internet and hence networking is an essential part of course. Prime concern is that in current advanced digital world various security threats are increasing day by day posing problems to data confidentiality, integrity and availability. This course aims at learning basic cryptography techniques and applying security mechanisms for operating systems as well as private and public network to protect them from various threats.
Course Outcome
The theory should be taught and practical should be carried out in such a manner that students are able to acquire different learning out comes in cognitive, psychomotor and affective domain to demonstrate following course outcomes.

i. Identify and describe the common types of security threats are risks to the Computer Systems and the nature of common Information hazards.
ii. Identify the potential threats to confidentiality, integrity and availability of Computer Systems.
iii. Describe the working of standard security mechanisms and applied to the external and internal network.
iv. Define cryptography, describe the elements of the encryption process and select best algorithm to encrypt data and protocols to achieve Computer Security.
v. Apply accepted security policies, procedures are necessary to secure Operating Systems and applications.

Active Learning
i. Software: Wireshark Traffic Analysis/Packet Sniffing Tool, Snort Packet Sniffing tool
ii. www.securityplusolc.com.
iii. http://mercury.webster.edu/aleshunas/COSC%205130/COSC%205130%20Home.htm
iv. http://williamstallings.com/Cryptography/
v. http://mercury.webster.edu/aleshunas/COSC%205130/Chapter-22.pdf
vi. http://nptel.iitm.ac.in/courses.php?disciplineId=106
vii. Network Simulator Tool: GNS3 v0.8.5, NetSimK
viii. http://www.snort.org/docs
ix. http://manual.snort.org/node27.html
x. http://www.wireshark.org/docs/wsug_html_chunked/
xi. http://www.pearsonhighered.com/assets/hip/us/hip_us_pearsonhighered/samplechapter/0131407333.pdf
xii. http://www.cs.nyu.edu/courses/fall04/G22.2262-01/assignments/assignment4_files/Ethereal_TCP.pdf