GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT COURSE CURRICULUM COURSE TITLE: ESSENTIALS OF NETWORK SECURITY (COURSE CODE: 3351602)



Similar documents
GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT. COURSE CURRICULUM COURSE TITLE: DATABASE MANAGEMENT (Code: ) Information Technology

GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT. COURSE CURRICULUM COURSE TITLE: FUNDAMENTALS OF SOFTWARE DEVELOPMENT (Code: )

GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT

GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT COURSE CURRICULUM COURSE TITLE: NETWORK MANAGEMENT AND ADMINISTRATION (COURSECODE: )

GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT. COURSE CURRICULUM COURSE TITLE: COMPUTER ORGANIZATION AND ARCHITECTURE (Code: )

COURSE CURRICULUM COURSE TITLE: WEB PROGRAMMING USING ASP.NET (COURSE CODE: )

GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT. COURSE CURRICULUM COURSE TITLE: INFORMATION COMMUNICATION TECHNOLOGY (Code: )

GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT. Course Curriculum. DATA STRUCTURES (Code: )

GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT COURSE CURRICULUM COURSE TITLE: ADVANCE WEB TECHNOLOGY (COURSE CODE: )

GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT COURSE CURRICULUM. Course Title: Advanced Computer Programming (Code: )

COURSE CURRICULUM COURSE TITLE: ESTIMATING, COSTING AND ENGINEERING CONTRACTING (COURSE CODE: )

GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT COURSE CURRICULUM COURSE TITLE: ADVANCE JAVA PROGRAMMING (COURSE CODE: )

GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT Course Curriculum ADVANCE PATTERN MAKING (Code: )

GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT COURSE CURRICULUM. Course Title: Basic Graphic Design (Code: )

CRYPTOG NETWORK SECURITY

GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT COURSE CURRICULUM COURSE TITLE: CONSTRUCTION PROJECT MANAGEMENT (COURSE CODE: )

GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT COURSE CURRICULUM COURSE TITLE: ENERGY CONSERVATION & AUDIT (COURSE CODE: )

Split Based Encryption in Secure File Transfer

CRYPTOGRAPHY AND NETWORK SECURITY

Data Encryption and Network Security

Table of Contents. Bibliografische Informationen digitalisiert durch

Information Security Course Specifications

VALLIAMMAI ENGINEERING COLLEGE

Course Title: Architectural Drawing I (Code: )

GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT. Course Curriculum. ELECTRONIC COMPONENTS AND CIRCUITS (Code: ) Electrical Engineering

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

e-code Academy Information Security Diploma Training Discerption

Lectures for the course: Electronic Commerce Technology (IT 60104)

Chapter 8. Network Security

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

NETWORK ADMINISTRATION AND SECURITY

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

SCP - Strategic Infrastructure Security

Network Security Essentials:

The Encryption Technology of Automatic Teller Machine Networks

Cryptography & Network Security

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

EXAM questions for the course TTM Information Security May Part 1

Keywords Web Service, security, DES, cryptography.

Curran, K. Tutorials. Independent study (including assessment) N/A

Prerequisites: Fundamentals of Networking, Knowledge of Operating Systems

Security for Computer Networks

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Computer Security Curriculum at the Univ. of Wisconsin Eau Claire. Paul J. Wagner

IT Networks & Security CERT Luncheon Series: Cryptography

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

Weighted Total Mark. Weighted Exam Mark

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Chapter 10. Network Security

1) Explain the following evolutionary process models: a) The spiral model. b) The concurrent development model.

SFWR ENG 4C03 - Computer Networks & Computer Security

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Keywords- Cloud Computing, Android Platform, Encryption, Decryption, NTRU, RSA, DES, throughput.

A SOFTWARE COMPARISON OF RSA AND ECC

A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR

Symmetric Key cryptosystem

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

How To Understand And Understand The History Of Cryptography

Cryptography and Network Security Chapter 3

Lecture 1: Introduction. CS 6903: Modern Cryptography Spring Nitesh Saxena Polytechnic University

GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT COURSE CURRICULUM COURSE TITLE:COMPUTER MAINTENANCE AND TROUBLE SHOOTING (COURSE CODE: )

Computer Security (EDA263 / DIT 641)

University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Network Security Technology Network Management

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Outline of the Tutorial

Computer and Network Security PG Unit Outline School of Information Sciences and Engineering

B.TECH. CSE with Specialization in Cyber Security and Hacking

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

CrypTool Claudia Eckert / Thorsten Clausius Bernd Esslinger / Jörg Schneider / Henrik Koy

Sandeep Mahapatra Department of Computer Science and Engineering PEC, University of Technology

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

Cryptography and network security CNET4523

Network Security: Cryptography CS/SS G513 S.K. Sahay

SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE

Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Network Security Course Specifications

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security

SE 4472a / ECE 9064a: Information Security

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur

Course Outline Computing Science Department Faculty of Science. COMP Credits Computer Network Security (3,1,0) Fall 2015

Priyanka et al. Page 17

Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Message Authentication Codes

Transcription:

GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT 1. RATIONALE COURSE CURRICULUM COURSE TITLE: ESSENTIALS OF NETWORK SECURITY (COURSE CODE: 3351602) Diploma Program in which this course is offered Information Technology The objective of Information is to upgrade fundamentals of security over network. This course covers basic cryptography concepts, techniques and encryption algorithms. After going through this course student will be able to configure security policy in OS. 2. LIST OF COMPETENCY The course content should be taught and implemented with the aim to develop required f skills in students so that they are able to acquire following competencies: Explain basics of Information. Identify and explain functioning of various Encryption Algorithms. Apply the security techniques for information protection. Semester in which offered 5 th Semester 3. COURSE OUTCOMES The theory should be taught and practical should be carried out in such a manner that students are able to acquire different learning out comes in cognitive, psychomotor and affective domain to demonstrate following course outcomes. i. Describe importance of in Communication. ii. Explain basic concept of Encryption Algorithm. iii. Elaborate Firewall Techniques. iv. Explain latest trends in OS Assessment Tools. v. Install various firewalls for information security. vi. Apply/Use anti malware and Cleanup Tools for betterment of information security. vii. Apply/Use antivirus effectively for the security of OS. 4. TEACHING AND EXAMINATION SCHEME Teaching Scheme Total Credits Examination Scheme (In Hours) (L+T+P) Theory Marks Practical Marks Total Marks L T P C ESE PA ESE PA 200 3 0 4 7 70 30 40 60 1

Legends: L - Lecture; T - Tutorial/Teacher Guided Student Activity; P - Practical; C - Credit; ESE - End Semester Examination; PA - Progressive Assessment 5. COURSE DETAILS I Introduction of Information II System III Basic Arithmetics in Encryption IV Symmetric Encryption Algorithm Major Learning Outcomes (in cognitive domain) 1a.Explain basic concepts related to Information 2a. Define Symmetric Key and Cryptography 2b. Define Classical Encryption Techniques. 2c. Identify various ciphers techniques available. 2d. Define steganography along with its usage. 3a. Describe basic concept in Number theory and finite fields 4a. Discuss Block Cipher principle. 4b. Define data encryption standards commonly used. 4c. Identify Block cipher modes of Topics and Sub-topics 1.1 Need of Information 1.2 Trends 1.3 What is Information 1.4 Overview of Information 1.5 Services 1.6 Mechanism 1.7 Attacks 1.8 The OSI Architecture 1.9 A Model for Network 2.1 Symmetric Cipher Model 2.2 Cryptography 2.3 Cryptanalysis 2.4 Substitution Techniques 2.4.1 Caesar Cipher 2.4.2 Monoalphabetic Cipher 2.4.3 Polyalphabetic Cipher 2.4.4 Playfair Cipher 2.4.5 Hill Cipher 2.5 Problems with Symmetric Cipher Algorithms 2.6 Diffie-Hellman Key exchange algorithm 2.5 Transposition Techniques 2.6 Steganography 3.1 Divisibility and The Division Algorithm 3.2 The Euclidean Algorithm 3.3 Modular Arithmetic 3.4 Random Number 3.4 Groups, Rings, and Fields 3.5 Finite Fields of the Form GF(p) 4.1 Block Cipher Principal 4.2 The Data Encryption Standard 4.3 Fiestel Structure 4.4 First Round of DES 4.5 Strength of DES 4.5.1 Double DES 4.5.2 Man in the Middle Attack 2

- V Asymmetric Key Encryption - VI Operating System Major Learning Outcomes (in cognitive domain) operations available. 5a. State the limitations of symmetric encryption 5b. Describe asymmetric key encryption. 5c. Identify confidentiality and authentication. 6a. Configure different firewalls for OS security. 6b. Describe antivirus approaches available. 6c. Use antivirus available for the information security. 6d. Use the security assessment tools on different OS viz. Windows, Linux. 6e. Describe the importance of OS updates. 6f. Use updates available in open source for different operation systems. Topics and Sub-topics 4.6 Block Cipher Modes of Operation 4.6.1 Electronic Code Book 4.6.2 Cipher Block Chaining Mode 4.6.3 Cipher Feedback Mode 4.6.4 Output Feedback Mode 4.6.5 Counter Mode 5.1 Limitations of Symmetric Key Encryption 5.2 Asymmetric Key Encryption 5.2.1 Maintaining Confidentiality 5.2.2 Maintaining Authentication 5.2.3 Managing confidentiality and authentication together 6.1 Windows OS Hardening 6.1.1 Configure Policy 6.1.2 Configure Firewall (Win XP, Win 7) 6.2 Anti Malware and Cleanup Tools 6.2.1 Windows AVG 6.2.2 ClamAV (Open source) 6.2.3 Avast 6.3 OS Assessment Tools 6.3.1 Nessus (Windows, Linux) 6.3.2 SAINT (Linux, Open Source) 6.4 OS Updates 6.4.1 Windows Patches 6.4.2 Windows Upgrades 6.4.3 Linux Updates, upgrades 3

6. SUGGESTED SPECIFICATION TABLE WITH HOURS & MARKS (THEORY) Title Teachin Distribution of Theory Marks g Hours R Level U Level A Level Total Marks 05 4 4 2 10 I Introduction of Information II System 12 4 6 6 16 III Basic Arithmetic in Encryption 05 2 2 4 08 IV Symmetric Encryption Algorithm 10 4 4 8 16 V Asymmetric Key Encryption 05 2 4 4 10 VI Operating System 05 2 4 4 10 Total 42 18 24 28 70 Legends: R = Remember; U = Understand; A = Apply and above levels (Bloom s Revised Taxonomy) Note: This specification table shall be treated as a general guideline for students and teachers. The actual distribution of marks in the question paper may vary slightly from above table. 7. SUGGESTED LIST OF EXERCISES/PRACTICAL The practical/exercises should be properly designed and implemented with an attempt to develop different types of skills (outcomes in psychomotor and affective domain) so that students are able to acquire the competencies/programme outcomes. Following is the list of practical exercises for guidance. Note: Here only outcomes in psychomotor domain are listed as practical/exercises. However, if these practical/exercises are completed appropriately, they would also lead to development of certain outcomes in affective domain which would in turn lead to development of Course Outcomes related to affective domain. Thus over all development of Programme Outcomes (as given in a common list at the beginning of curriculum document for this programme) would be assured. Faculty should refer to that common list and should ensure that students also acquire outcomes in affective domain which are required for overall achievement of Programme Outcomes/Course Outcomes. Sr. Practical Exercises Hrs. (Outcomes in Psychomotor Domain) required 1 Prepare report on various security trends and security 4 services. 2 I Prepare report on various security attacks and security 2 mechanism. 3 Prepare report on OSI Architecture. 2 4 Prepare report on various cryptographic technique. 4 II 5 Prepare report on cryptanalysis. 4 6 Perform encryption of a plain text and decryption of cipher 4 III text using one time pad method 7 Perform encryption of plain text and decryption of cipher text of a using caesar cipher. 4 4

Sr. Practical Exercises Hrs. (Outcomes in Psychomotor Domain) required 8 Perform encryption of a plain text and decryption of cipher 4 text using Monoaplhabetic cipher. 9 Perform encryption of a plain text and decryption of cipher 2 text using play fair cipher. 10 Perform decryption of a cipher text using polyalphabetic 2 cipher 11 Perform encryption of a plain text and decryption of cipher 4 text using rectangular cipher 12 Perform encryption of a plain text and decryption of cipher 4 text using columnar cipher 13 Perform encryption of a plain text and decryption of cipher 4 text using Hill cipher 14 Prepare report on block cipher modes of operation. 2 IV 15 Prepare report on single round of DES. 2 16 V Prepare report on Asymmetric encryption. 2 17 Configure in OS (Win XP / Win 7) 4 18 VI Configure firewall of (Winx XP/ Win 7) 4 Total Hours 58 8. SUGGESTED LIST OF STUDENT ACTIVITIES Following is the list of proposed student activities such as: i. Seminar with power point presentation ii. iii. Configure firewall on a network. Design a model of Network 9. SPECIAL INSTRUCTIONAL STRATEGIES (if any) Assignment can be given based on above topics. Students should be allowed to work on their own and show their creativity, faculty should provide help only when students have tried their best. 10. SUGGESTED LEARNING RESOURCES S. A) List of Books Title of Book Author Publication 1 Cryptography and Network : William Stallings Prentice Hall Principles and Practice 2 Cryptography: An Introduction Nigel Smart Mcgraw-Hill College 3 Cryptography and Network Forouzan McGraw Hill 4 Network Essentials William Stallings Pearson 5 Network Tools: Writing, Hacking, and Modifying Tools Justin Clarke, Nitesh Dhanjani O'Reilly Media; 5

- See more 6 Network Atul Kahate Tata McGraw Hill 7 Cryptography and in Computing Jaydip Sen B) List of major equipment with major Specification Desktop computer P-IV processor or higher LINUX Electronic Teaching Slides (Power Point Slides)- CD/DVD Data Encryption Standard Feistel Structure Block cipher modes of Opeartion Laboratory Charts Attacks Mechanisms OSI Architecture C) List of Software/Learning Websites i. www.cryptography.com ii. http://searchsecurity.techtarget.com iii. cse.iitkgp.ac.in/ In Tech 11. COURSE CURRICULUM DEVELOPMENT COMMITTEE Faculty Members from Polytechnics Prof Parvez K. Faruki, In charge Head ( IT ), BPTI, Bhavnagar Prof Manoj P. Parmar, In charge Head ( IT ), G. P. Himatnagar. Prof. Manish D. Patel, In charge Head ( IT ), R C T I Ahmedabad Prof Sunil Paryani, Lecturer, IT, G P Himatnagar Prof (Ms.) Darshana Trivedi, Lecturer, IT, RCTI, Ahmedabad Coordinator and Faculty Members from NITTTR Bhopal Dr. M. A. Rizvi, Associate Professor, Dept. of Computer Engineering and Applications. Dr. Priyanka Tripathi, Associate Professor, Dept. of Computer Engineering and Applications, NITTTR. 6