0% found this document useful (0 votes)
77 views4 pages

Computer Network Security Syllabus

The document outlines the syllabus for the Computer Network and Security course for the Bachelor of Vocation (B.Voc.) program at Gujarat Technological University. It covers essential topics such as security threats, organizational security, cryptography, network security, and web security, along with their respective teaching and examination schemes. The course aims to equip students with knowledge of security mechanisms and cryptographic techniques to protect data integrity, confidentiality, and availability.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
77 views4 pages

Computer Network Security Syllabus

The document outlines the syllabus for the Computer Network and Security course for the Bachelor of Vocation (B.Voc.) program at Gujarat Technological University. It covers essential topics such as security threats, organizational security, cryptography, network security, and web security, along with their respective teaching and examination schemes. The course aims to equip students with knowledge of security mechanisms and cryptographic techniques to protect data integrity, confidentiality, and availability.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

GUJARAT TECHNOLOGICAL UNIVERSITY

Syllabus for Bachelor of Vocation (B.Voc.), 4th Semester


Branch: Information Technology
Subject Name: Computer Network and Security
Subject Code: 1140502

Type of subject: Core

Prerequisite: Basic knowledge of the Internet and peripherals.

Rationale: Present computing era is based on the internet and networking is an essential
requirements prime concern is that in the current advanced digital world required to prevent various
security threats for the data confidentiality, integrity and availability. This subject is aims learning
basic cryptography techniques and applying security mechanisms for users, systems, operating
systems as well as for the private and public networks.

Teaching and Examination Scheme:


Teaching Scheme Credit Examination Marks
Total
Theory Marks Practical Marks Marks
L T P C
ESE (E) PA (M) ESE (V) PA (I)
3 0 0 3 50 0 0 0 50
L-Lecture; T – Tutorial/Teacher Guided Theory Practice; P -Practical; C – Credit ESE -End
Semester Examination; PA - Progressive Assessment.

Course Content Details:


Total Module %
Sr. No. Content
Hrs. Weightage
Unit – 1 Introduction and Security Threats:
 Threats to security: Viruses and Worms, Intruders, Insiders,
Criminal organizations, Terrorists, Information warfare
 Avenues of Attack, steps in attack
1  Security Basics Confidentiality, Integrity, Availability 10 25
 Types of attack: Denial of service (DOS), backdoors and
trapdoors, sniffing, spoofing, man in the middle, replay,
TCP/IP Hacking, Phishing attacks, Distributed DOS, SQL
Injection. Malware: Viruses, Logic
Unit – 2 Organizational Security
 Password selection, Piggybacking, Shoulder surfing,
Dumpster diving, installing unauthorized software/hardware,
Access by non-employees.
 People as Security Tool: Security awareness, and Individual
user responsibilities.
2 10 25
 Physical security: Access controls Biometrics: finger prints,
hand prints, Retina, Patterns, voice patterns, signature and
Writing patterns, keystrokes, Physical barriers
 Password Management, vulnerability of password, password
protection, password selection strategies, components of a
good password.

w.e.f. 2023-24 http://syllabus.gtu.ac.in/ Page no. 1 of 4


GUJARAT TECHNOLOGICAL UNIVERSITY
Syllabus for Bachelor of Vocation (B.Voc.), 4th Semester
Branch: Information Technology
Subject Name: Computer Network and Security
Subject Code: 1140502

Unit – 3 Cryptography and Public key Infrastructure


 Introduction to Symmetric encryption & Asymmetric
encryption.
 Encryption algorithm / Cipher, Encryption and Decryption
using: Caesar’s cipher, playfair cipher, shift cipher, shift
cipher, Vigenere cipher, one time pad (vermin cipher), hill
cipher (for practice use small matrix and apply encryption
only).
 Transposition techniques (rail fence), steganography
3 8 20
 Hashing function: SHA1 (only)
 Asymmetric encryption: Digital Signatures, Key escrow
 Public key infrastructures: basics, digital signatures, digital
certificates, certificate authorities, registration authorities,
steps for obtaining a digital certificate, steps for verifying
authenticity and integrity of a certificate
 Centralized or decentralized infrastructure, private key
protection
 Trust Models: Hierarchical, peer to peer, hybrid
Unit - 4 Network security
 Firewalls working, design principles, trusted systems,
Kerberos.
 Security topologies – security zones, DMZ, Internet,
4 Intranet, VLAN, security implication, tunneling. 8 20
 IP security: overview, architecture, IPSec configurations,
IPSec security
 Email security: security of email transmission, malicious
code, spam, mail encryption.
Unit - 5 Web Security
 Intruders, Intrusion detection systems (IDS): host-based
IDS, network-based IDS, logical components of IDS,
signature-based IDS, anomaly-based IDS, network IDS
components, advantages and disadvantages of NIDS, host-
5 based IDS components, advantages and Disadvantage of 6 10
HIDS.
 Web security threats, web traffic security approaches,
Introduction to Secure Socket Layer (SSL) & Transport
Layer Security (TLS), Concepts of secure electronic
transaction
TOTAL 42 100

Reference Books:
1. Principles Of Computer Security CompTIA Security+ And Beyond (Exam SY0-301), 3rd
Edition Books Conklin, Wm. Arthur Gregory White, Dwayne Williams, Roger Davis, Chuck
Cothren, Corey Schou McGraw Hill ISBN:9781259061196, 2012.
2. Cryptography and Network Security Principles and Practices Williams Stallings Pearson
w.e.f. 2023-24 http://syllabus.gtu.ac.in/ Page no. 2 of 4
GUJARAT TECHNOLOGICAL UNIVERSITY
Syllabus for Bachelor of Vocation (B.Voc.), 4th Semester
Branch: Information Technology
Subject Name: Computer Network and Security
Subject Code: 1140502

Education, Third Edition.


3. Principles of Computer Security CompTIA Security+ and Beyond Lab Manual Vincent Nestler,
Gregory White, Wm.Arthur Conklin, Matthew Hirsch, Corey Schou McGrawHill, 2010,
9780071748568
4. Cryptography and Network Security Principal and Practices Atul Kahate Tata-McGraw-Hill
Sixth reprint 2006
5. Cryptography and Network Security B A Forouzen TMH
6. Computer Security Basics Deborah Russell G.T. Gangenisr O’Reilly publication
7. Computer Security Dieter Gollman Wiley India Education, Second Edition

Suggested Specification Table with Marks (Theory): (For B.VOC. Only)


Distribution of Theory Marks
R Level U Level A Level N Level E Level
10 20 20 0 0
Legends: R: Remembrance; U: Understanding; A: Application, N: Analyze and E: Evaluate and
above Levels (Bloom’s Taxonomy)

Course Outcomes:

Sr. Co statements: %
No. Weightage
CO-1 Identify and describe the common types of security threats are risks to the
Computer Systems and the nature of common Information hazards. 25
CO-2 Identify the potential threats to confidentiality, integrity and availability of
Computer Systems. 25
CO-3 Describe the working of standard security mechanisms and applied to the
external and internal network. 20
CO-4 Define cryptography, describe the elements of the encryption process and
select the best algorithm to encrypt data and protocols to achieve Computer 20
Security.
CO-5 Apply accepted security policies, procedures are necessary to secure
Operating Systems and applications. 10
TOTAL 100

Laboratory work: NA

List of Software/Learning Websites:

1. Software: Wireshark Traffic Analysis/Packet Sniffing Tool, Snort Packet Sniffing tool
2. www.securityplusolc.com.
3. http://mercury.webster.edu/aleshunas/COSC%205130/COSC%205130%20Home.htm
4. http://williamstallings.com/Cryptography/
5. http://mercury.webster.edu/aleshunas/COSC%205130/Chapter-22.pdf
6. http://nptel.iitm.ac.in/courses.php?disciplineId=106
7. Network Simulator Tool: GNS3 v0.8.5, NetSimK
8. http://www.snort.org/docs

w.e.f. 2023-24 http://syllabus.gtu.ac.in/ Page no. 3 of 4


GUJARAT TECHNOLOGICAL UNIVERSITY
Syllabus for Bachelor of Vocation (B.Voc.), 4th Semester
Branch: Information Technology
Subject Name: Computer Network and Security
Subject Code: 1140502

9. http://manual.snort.org/node27.html
10. http://www.wireshark.org/docs/wsug_html_chunked/
11. http://www.pearsonhighered.com/assets/hip/us/hip_us_pearsonhighered/samplechapter/013
1407333.pdf
12. http://www.cs.nyu.edu/courses/fall04/G22.2262-
01/assignments/assignment4_files/Ethereal_TCP.pdf

w.e.f. 2023-24 http://syllabus.gtu.ac.in/ Page no. 4 of 4

You might also like