ICTEd_526_2nd semester

icted.org.np

Course Title: Network Security Course No. : ICTEd 526 Level: M.Ed. Semester: Second

Network Security

Nature of course: Theoretical + Practical Credit Hour: 3 (2+1) Teaching Hour: 80(32+48)

1. Course Description The course, Network Security, is a major course for students studying towards acquiring the Master of Education in Information Communication Technology (M. Ed. In ICT). This course is designed to provide fundamental skills needed to analyse the internal and external security threats against a network, and to develop security policies that will protect an organization’s information. The course objective is to impart fundamental understanding of every facet of information security, from the basics to advanced cryptography, authentication, secure web, email services and emerging best practices with security standards.

2. General Objectives The general objectives of this course are as follows:    

Develop an understanding of information assurance as practiced in computer operating systems, distributed systems, networks and representative applications. Gain familiarity with prevalent network and distributed system attacks, defences against them, and forensics to investigate the aftermath. Develop a basic understanding of cryptography, how it has evolved, and some key encryption techniques used today. Develop an understanding of security policies (such as authentication, integrity and confidentiality), as well as protocols to implement such policies in the form of message exchanges.

3. Course Outlines: Specific Objectives

Contents



1.Introduction 1.1 Security, 1.2 Attacks, Attack Types, Viruses, Worms, Trojan Horses, 1.3 Hacker Techniques 1.4 Security Services, Network Security Model, Security Levels, 1.5 Internet Standards and RFCs. 2. Conventional Encryption/Secret Key Cryptography 2.1 Cryptography, Cryptanalysis, Cipher Structure, 2.2 Encryption Algorithms, 2.3 Data Encryption Standard (DES),





Discuss the role and functionality of security and attacks Discuss different typesof security services and standards.

Clarify the concept of cryptography and cryptanalysis.

ICTEd_526_2nd semester

icted.org.np

Teaching Hours 10

Network Security

15

ICTEd_526_2nd semester



Discuss the different concepts of encryption standards

icted.org.np

Network Security

2.4 International Data Encryption Algorithm (IDEA), 2.5 Advanced Encryption Standard (AES), 2.6 Modes of Operation, Symmetric Block Ciphers, Cipher Block Chaining (CBC),

 

 

Analyse the role of hashes and its algorithm. Elucidate the role, responsibilities and structure of a public key cryptography. Review different types of authentication systems. Discuss the approaches used for authentication standards and real time security.



Discuss and analyse the different types of security models and their applications.



Discuss the different system wide securities and their implications.



Elucidate the issues related to legal, privacy, policy and risk management in terms of information security. Apply the network management policies



The practical aspect will security software.

ICTEd_526_2nd semester

2.7 Multiple Encryption DES. 3. Public Key Cryptography and Message Digests 3.1. Hashes, 3.2.Secure Hash Algorithm (SHA), 3.3.Encryption with Message Digest (MD), MD5, 3.4. Public Key Cryptography Principles, 3.5. Public Key Cryptography Algorithms, 3.6. RSA, 3.7. Digital Signature Standard (DSS). 4. Authentication and Public Key Infrastructure (PKI) 4.1 Overview of Authentication Systems (Password, Address, Cryptographic), 4.2 Security Handshake Pitfalls, 4.3 Authentication Standards, 4.4 Kerberos, PKI Trust Models, Revocation, 4.5 Realtime Communication Security. 5. Network Security 5.1 Email Security, PGP, S/MIME, 5.2 IPSecurity, Architecture, Authentication Header, Security Association, Key Management, 5.3 Web Security, 5.4 Secure Socket Layer(SSL), 5.5 Transport Layer Security(TLS), 5.6 Secure Electronic Transaction(SET), 5.7 Network Management Security, 5.8 Different versions of SNMPs. 6. System Wide Security 6.1. Intruders, 6.2. Malicious software, 6.3. Firewalls, 6.4. DMZ 7. Legal and Management issue 7.1 Legal Issues, 7.2 Various criminal laws related to Information Security, 7.3 Privacy Issues, 7.4 Policy, Importance of Policy, Various Policies, 7.5 Risk Management, Measure Risks, 7.6 Information Security. 7.7 Network Management Security: SNMP, SNMPv1,SNMPv3 focus on the uses and applications of information and network

icted.org.np

Network Security

15

10

12

10

8

ICTEd_526_2nd semester

icted.org.np

Network Security

4. Laboratory:

      

Analyse effects of different types of viruses and worms, Use encryption/decryption systems, Implementation of public/private key cryptography, Implementation of hash function, Issues of real time communication security Use and application of SSL Use network security tools

5. Instructional Techniques The instructional techniques for this course are divided into two groups. First group consists of general instructional techniques applicable to most of the units. The second group consists of specific instructional techniques applicable to specific units. 5.1 General Techniques

 

Providing the reading materials to the students to familiarize the units. Lecture, question-answer, discussion, brainstorming, practical, and buzz session.

5.2 Specific Instructional Techniques Unit Activity and instructional techniques I to VII

Teaching Hours(48)

Use network security tools to implement the algorithm

6. Evaluation (Internal Assessment and External Assessment): Nature of course Theory

Internal Assessment 40%

External Practical Exam/Viva 20%

Semester Examination 40%

Total Marks 100%

Note: Students must pass separately in internal assessment, external practical exam / viva and or semester examination. 6.1 Evaluation for Part I ( Theory)

6.1.1 Internal Evaluation 40% Internal evaluation will be conducted by course teacher based on following activities: 1) Attendance 5 points 2) Participation in learning activities 5 points 3) First assessment ( written assignment) 10 points 4) Second assessment ( Term examination ) 10 points 5) Third assessment ( Internal Practical Exam/Case Study) 10 points Total 40 points 6.1.2 External Evaluation (Final Examination) 40%

ICTEd_526_2nd semester

icted.org.np

Network Security

ICTEd_526_2nd semester

icted.org.np

Network Security

Examination Division, office of the Dean, Faculty of Education will conduct final examination at the end of semester. 1) Objective type question (Multiple choice 10questionsx1mark) 10 marks 2) Short answer questions (6 questions x 5 marks) 30 marks Total

40 marks

6.2 Evaluation for part II (practical) 20% Nature of the course Practical

Semester final examination by External Examiner 100%

Total percent 100

6.2.1 Practical Examination Evaluation Scheme a) External assessment …………………………100% i) Record book ………………………. 20% ii) Laboratory work exam/Case………..40% iii) VIVA………………………………..40%

7. Recommended books and reading materials (including relevant published articles in national and international journals) Stallings, W. (2011). Network security essentials: applications and standards (4th ed.). Delhi: Prentice Hall. Bishop, M. (2003). Computer security: art and science. Boston: AddisonWesley. Kaufman, C. (2002). Network security: private communication in a public world (2nd ed.). Delhi: Prentice Hall PTR. Maiwald, E. (2004). Fundamentals of network security. Delhi: McGraw-Hill Technology Education.

ICTEd_526_2nd semester

icted.org.np

Network Security

ICTEd_526_2nd semester Network Security.pdf

5.7 Network Management Security,. 5.8 Different versions of SNMPs. 12. Discuss the different. system wide securities. and their implications. 6. System Wide Security. 6.1. Intruders,. 6.2. Malicious software,. 6.3. Firewalls,. 6.4. DMZ. 10. Elucidate the issues. related to legal,. privacy, policy and risk. management in terms.

542KB Sizes 2 Downloads 94 Views

Recommend Documents

ICTEd_546_4th semester Network and System Administration.pdf ...
ICTEd_546_4th semester Network and System Administration.pdf. ICTEd_546_4th semester Network and System Administration.pdf. Open. Extract. Open with.

B. Tech III Year I Semester Examinations, December-2011 NETWORK ...
NETWORK THEORY · (ELECTRICAL AND ELECTRONICS ... Y parameters and h-parameters. b) Obtain hybrid parameters for the network shown in Fig – 2.

Instructions to Student-End Semester Examination (Higher Semester ...
Retrying... Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Instructions to Student-End Semester Examination (Higher Semester).pdf. Instructions to

Semester 1 Review Questions Semester 1 Review Questions
To help you prepare for the semester exam, please answer the questions below. ... List the steps of the Scientific Method. ... When and why do we collect data?

Instructions to Student-End Semester Examination (Higher Semester ...
Instructions to Student-End Semester Examination (Higher Semester).pdf. Instructions to Student-End Semester Examination (Higher Semester).pdf. Open.

Semester Structer
TECHNICAL EXAMINATIONS BOARD, GUJARAT STATE, GANDHINAGAR. PROGRAMME STRUCTURE FOR SEMESTER SYSTEM. DIPLOMA IN COMPUTER ...

Semester - 8 -
Engineering. 11EI601 Process Control. 11MT601. 11MT602 Power Electronics and. Drives. 11MT011 Applied Finite. Element Analysis. 11ME604 Fluid Power ...

Semester -
14CET34 Concrete Technology 14CET33 Mechanics of Fluids. 14CET35 ... 14MET33 Fluid Mechanics and .... 14BCT31 Operating Systems 14BCT32 Computer.

City Semester
Like other semester programs, City Semester offers a .... two days in the field (including a bus tour of affordable housing in which we will speak to residents and ...

RPA SEMESTER II.pdf
PROVINSI SULAWESI BARAT : MENUJU PELAKSANAAN ANGGARAN. YANG EFEKTIF DAN EFISIEN. Page 3 of 43. RPA SEMESTER II.pdf. RPA SEMESTER ...

Mid Semester Exam
MATH-I, September 8, 2015. Part-II. Time: 90 minutes, Maximum Marks: 20. Instructions: You should attempt all questions. Your writing should be legible and ...

ICTEd_525_2nd semester Advanced Database Management ...
5.9 Distributed Serializability. 5.10 Classification of Concurrency Control Techniques ... 7.5 Global Query Optimization Algorithms. 7.6 Distributed Database Security. 7.7 View Management ... Laboratory Work with oracle latest version: Page 3 of 6. I

CS6401 Spring Semester 2016 Syllabus
course is the second in a two-course sequence on EC (the first course is COMP SCI 5401 (348) -. Evolutionary ... Implementation may be done in any and all programming languages. Course ... 315 Computer Science Building. Office hours.

Mid Semester Exam
MATH-I, September 8, 2015. Part-II. Time: 60 minutes, Maximum Marks: 25. Instructions: You should attempt all questions. Your writing should be legible and ...

Semester-6.pdf.pdf
The IT project development involves. part or all phases of System Development Life Cycle (SDLC), thus. providing student with experience of analyzing, ...

SEMESTER 1 REVIEW.pdf
Page 2 of 15. Chapter P. 1. Determine which numbers in the set are. natural number,. 16,16,15, 64,0, 6, 65. a). 16,15, 64,0, 65. b). 16,15, 64. c). 16,15,0. d). 16,15. e) 16,16,15,0, 6. 2. Which graph represents inequality. 6 1 x ? 3. Evaluate the ex

B.Pharm. Regular Exam Semester
WAGHODIA, VADODARA. Practical Exam. Page 1 of 1. Practical_Exam_Schedule_B_PHARM_Regular_Exam_Semester_1_Winter_2016_17_23_PIPR.pdf.

september 2013 semester -
Jan 4, 2014 - b. Appraise how a production engineer implements the Pareto Laws in order to improve the varÍous components of quality costs and strategy for reducing the quality cost in an organization. ln addition how would you link Joseph M, Juran,

IA Semester V.pdf
24 October 2017. Saheli Biswas. 19 September 2017. Nitoo Das (CT). Paper 4 DCE: Nineteenth Century. European Realism. 7 October 2017. Mantra Mukim (A). 20 October 2017. Rajorshi Das. Paper 5 DCE: Science Fiction and. Detective Literature. 9 October 2

BTech Supplementary Exam Semester
04-07-2017 03104203 Structural Analysis - I Viva. 05-07-2017 03104204 Concrete Technology Viva. Branch : COMPUTER SCIENCE AND ENGINEERING.

CS6401 Spring Semester 2016 Syllabus
course is the second in a two-course sequence on EC (the first course is COMP SCI 5401 (348) -. Evolutionary ... Implementation may be done in any and all programming languages. Course ... 315 Computer Science Building. Office hours.

SEMESTER 1 SEMESTER 2 Period1 Period 2 Period 3 Period 4 ...
Period 4. Period 1. Period 2. Period 3. Period 4. GRADE 9. ENG1Da. CGC1Da. FSF1Da. BTT10. ENG1Db. CGC1Db. PPL10Fa. ALC10a. ENG1La. CGC1Pa.

Semester at Sea Checklist.pdf
Download. Connect more apps... Try one of the apps below to open or edit this item. Semester at Sea Checklist.pdf. Semester at Sea Checklist.pdf. Open. Extract.

BTech Regular Exam Semester
Whoops! There was a problem loading this page. Practical_Exam_Schedule_BTech_Regular_Exam_Semester_4_Summer_2016_17_06_PIT_2.pdf.