Course Code Course Type Credits
Network and System Security
CSD4003 LP 3
Course Objectives:
To learn about types of possible vulnerabilities for Network and System
To be able to perform security assessment of Computer Network and System
To know about methods and techniques to secure communication
To learn and apply methods for securing Computer
System.
Course Outcomes:
At the completion of this course, students should be able to do the following:
Understanding of network security threats.
Understanding of concepts related to applied cryptography, including plaintext,
cipher text, symmetric
Cryptography, asymmetric cryptography, and digital signatures.
Students will be able to understand the security mechanisms to secure a
Computer Network System
Student Outcomes (SO): a, b, i
a. An ability to apply the knowledge of mathematics, science and computing appropriate
to the discipline
b. An ability to analyze a problem, identify and define the computing requirements
appropriate to its solution.
i. Design and conduct experiments as well as analyze and interpret data
Unit No. of
Unit Content SOs
No hours
1 Network Security Concept 7 a,b
Network security definition, Security Services: Access
Control, Authentication, Confidentiality, Integrity, Non-
repudiation, Elements of Security: The Security Policy,
Access Control, Strong Encryption Algorithms,
Authentication Techniques, Auditing
2 Security Threats to Computer Network 10 a,b
Introduction, Sources of Security Threats: Weakness in
Network Infrastructure and Communication Protocols,
Rapid Growth of Cyberspace, Growth of Hacker
Community, Vulnerability in operating system protocol,
Physical theft, Security Threat Management, Security
Threat Motives, Security Threat Correlation, Security
Threat Awareness
3 Computer Network Vulnerabilities 10 b,i
Sources of Vulnerabilities : Design Flaws, Poor Security
Management, Incorrect Implementation, Internet
Technologies Vulnerabilities, Changing nature of Hacker
Technologies and Activities, Difficulty of Fixing
Vulnerable Systems, Limits of Effectiveness of Reactive
Solutions, Social Engineering, Vulnerability Assessment :
Vulnerability Assessment, Advantages of Vulnerability
Assessment Services
4 Hashing algorithms and Digital Signature: Hashing 07 a,b,i
algorithms and digital signature, Symmetric and
asymmetric encryption algorithms, Public key
infrastructure, Digital certificates and key management
Applications of cryptography in network security
5 Intrusion Detection and Prevention Systems 09 a,b
Categories of IDS and IPS, Components and deployment
of IDS, Maintenance and performance evaluation ,
Organizational Security Issues, Risk analysis and network
modeling, Assessing the security needs of an enterprise,
Security policies for network operations, Disaster recovery
and business continuity
6 Guest Lecture on Contemporary Topics 02
Total Hours: 45
Mode of Teaching and Learning: Flipped Class Room, Activity Based
Teaching/Learning, Digital/Computer based models, wherever possible to augment
lecture for practice/tutorial and minimum 2 hours lectures by industry experts on
contemporary topics
Mode of Evaluation and assessment:
The assessment and evaluation components may consist of unannounced open book
examinations, quizzes, student’s portfolio generation and assessment, and any other
innovative assessment practices followed by faculty, in addition to the Continuous
Assessment Tests and Final Examinations.
Text Books:
1. Kizza, Joseph Migga, Computer Network Security, 2005, Spinger, ISBN: 0-387-
20473-3
2. Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: Private
Communication in a Public World, 2nd Edition, Prentice Hall, 2002, ISBN: 0-13-
046019-2
Reference Books:
1. John R. Vacca, 'Network and System Security' 2nd Edition, Syngress Publishers,
ISBN:9780124166899
Recommendation by the Board of Studies 17 January 2020
on
Approval by Academic council on 20.01.2020
Compiled by Dr. Kanchanlata Kashyap