Subject code CB3602 deals with the Network Security subject. In this article, we try to provide the syllabus of the CB3602 Network Security syllabus based on the Affiliated Institutions of Anna University 2021 Regulation syllabus.
If you see nowadays, students are requesting brief descriptions of anything they want to know. Today social media platforms and search engines are running information throughout the world, just by searching the concept by the people. Especially when it comes to education, every subject in any field has been provided. There is a lot of demand to provide accurate education information in the market. Among them is aplustopper.com tries to give the best of its content for students. In this article, the CB3602 – Network Security Syllabus is given briefly without getting rid of a single concept of the subject from the Anna University B.E Computer Science and Engineering (Cyber security) syllabus.
If you want to know more about the syllabus of B.E Computer Science and Engineering (Cyber security) Syllabus connected to an affiliated institution’s four-year undergraduate degree program. We provide you with a detailed Year-wise, semester-wise, and Subject-wise syllabus in the following link B.E Computer Science and Engineering (Cyber security) Syllabus Anna University, Regulation 2021.
Aim Of Concept:
- To understand the basic concepts of security
- To understand the concept of authentication protocols and digital signatures.
- To learn various methods and protocols to understand the cryptography.
- To learn various network security attacks.
- To understand the IP and Web security.
CB3602 – Network Security Syllabus
Unit I: Fundamendals Of Networking Security
Overview of networking security- Security Services -Confidentiality, Authentication, Integrity, Nonrepudiation, access Control – Availability and Mechanisms- Security Attacks -Interruption, Interception, Modification and Fabrication.
Unit II: Authentication And Security
Authentication overview – Authentication protocols – Authentication and key establishment – key exchange – mediated key exchange – User Authentication – password-based authentication password security – Certificate Authority and key management – digital signatures – digital Certificates.
Unit III: Public-Key Cryptography And Message Authentication
Basics of cryptography -cryptographic hash functions – symmetric and public-key encryption public key cryptography principles & algorithms – cipher block modes of operation – Secure Hash Functions – HMAC
Unit IV: Security Attacks
Buffer overflow attacks & format string vulnerabilities – Denial-of-Service Attacks -Hijacking attacks: exploits and defenses – Internet worms – viruses – spyware –phishing – botnets – TCP session hijacking – ARP attacks – route table modification – UDP hijacking – man-in-the-middle attacks.
Unit V: IP Security And Web Security
Network defense tools: Firewalls, VPNs, Intrusion Detection, and filters – Email privacy: Pretty Good Privacy (PGP) and S/MIME – Network security protocols in practice- Introduction to Wireshark – SSL – IPsec, and IKE -DNS security- Secure Socket Layer (SSL) and Transport Layer Security (TLS) – Secure Electronic Transaction (SET)
Practical Exercises:
- Using Wireshark explore the different layer protocol headers.
- Demonstrate two different Certificates producing the same MD5 hash
- Computing MACs, HASH and HMAC for messages
- Implement and demonstrate Buffer overflow attack
- Implement and demonstrate Denial of service attacks (DoS ) and DDoS
- Implement the ARP attack and MITM
- Implement the Botnet attack detection using publically available dataset
- Explore and install Snort intrusion detection tool
- Implement Firewall rules using snort
- Generate the network attack and Detect the attack using Snort
Text Books:
- Network Security Essentials (Applications and Standards) by William Stallings Pearson Education.
References:
- Hack Proofing your network by Ryan Russell, Dan Kaminsky, Rain Forest Puppy, Joe Grand, David Ahmad, Hal Flynn Ido Dubrawsky, Steve W.Manzuik and Ryan Permeh, Wiley Dreamtech
- Cryptography and network Security, Third edition, Stallings, PHI/Pearson
- A look back at Security Problems in the TCP/IP Protocol Suite, S. Bellovin, ACSAC 2004.
Related Posts On Semester VI:
Must Read For More: