Network Security and Management detail DTE Kar Diploma syllabus for Computer Science And Engineering (CS), C15 scheme is extracted from DTE Karnataka official website and presented for diploma students. The course code (15CS62T), and for exam duration, Teaching Hr/week, Practical Hr/week, Total Marks, internal marks, theory marks, duration and credits do visit complete sem subjects post given below. The syllabus PDFs can be downloaded from official website.
For all other computers 6th sem syllabus for diploma c15 scheme dte karnataka you can visit Computers 6th Sem Syllabus for Diploma C15 Scheme DTE Karnataka Subjects. The detail syllabus for network security and management is as follows.
Pre-requisites:
Knowledge of Computer Networks.
Course Objectives:
To study the concepts of network security and various cryptographic algorithms, hardware and software security, IDS, wireless security, web security, security laws with Internet Governance & Email policy.
Course Outcomes:
For complete syllabus and results, class timetable and more pls download iStudy Syllabus App. Its a light weight, easy to use, no images, no pdfs platform to make students life easier.
UNIT I: Introduction and Cryptography 16 Hrs
Introduction:
Computer security concepts, The OSI security architecture, Security attacks, Security services, Security mechanisms, A model for network security, Standards
Cryptography:
Symmetric Encryption Principles, Symmetric Block Encryption Algorithms, Random and Pseudorandom Numbers, Stream Ciphers and RC4, Cipher Block Modes of Operation, Approaches to Message Authentication, Secure Hash Function, Message Authentication Codes, Public Key Cryptography Principles, Public-Key Cryptography Algorithms, Digital Signatures.
UNIT II: Hardware and Software Security 06 Hrs
Hardware Security, Smart Cards, Biometrics, Virtual Private Networks, Types of VPN’s, Trusted Operating Systems, Pretty Good Privacy (PGP), Security Protocols, Security Socket Layer, Transport Layer Security, IPSec, S/MIME(Secure/Multipurpose Internet Mail Extension)
UNIT III: Intrusion Detection System and Firewalls 10 Hrs
For complete syllabus and results, class timetable and more pls download iStudy Syllabus App. Its a light weight, easy to use, no images, no pdfs platform to make students life easier.
UNIT IV: Wireless Security 06 Hrs
Wireless Application Protocol, WAP Security, Authentication, Integrity, Confidentiality, Security Issues with Wireless Transport Layer Security (WTLS), Wireless LAN, WLAN Configuration, WLAN Technology consideration, Wireless LAN Security, Access Point Security, Work Station Security, Safeguarding Wireless LAN’s.
UNIT V: Web Security 08 Hrs
Client/Server Architecture, Security considerations and Threats, Web traffic security approaches, SSL/TLS for secure web services, The Twin concept of “SSL Connection” and “SSL Session”, SSL session state, SSL Connection State, SSL Record Protocol, SSL Handshake Protocol, Secure Hypertext Transport Protocol(S-HTTP), Secure Electronic Transaction(SET), Business Requirements, SET Participants, SET Transaction Flow.
UNIT VI: Security and Law, Internet Governance and Email Policy 06 Hrs
For complete syllabus and results, class timetable and more pls download iStudy Syllabus App. Its a light weight, easy to use, no images, no pdfs platform to make students life easier.
Text Books:
- Network Security Essentials: Applications and Standards, 4/e, William Stallings, Pearson Educaiton, ISBN: 9788131716649 (Chap 1)
- Network Security and Management, 2nd edition, Brijendra Sing, PHI, ISBN: 9788120339101 (Chap: 2,3,4,5,6)
Reference Books:
- Network Security Bible, 2nd edition, Eric Cole, Wiley Publisher, ISBN: 9788126523313
Suggested List of Student Activities:
Note: the following activities or similar activities for assessing CIE (IA) for 5 marks (Any one)
- Each individual student should do any one of the following type activity or any other similar activity related to the course and before conduction, get it approved from concerned course coordinator and programme coordinator.
- Each student should conduct different activity and no repetition should occur.
- Make a survey in any industry/ institute to understand the way security is provided for information. Videos can also be used to make the survey.
- Quiz
Course Delivery:
The course will be delivered through lectures and Power point presentations/ Video
Model Question Paper:
(CIE)
- List the differences between passive and active security threats.(5)
- Explain essential ingredients of a symmetric cipher with a neat diagram (5)
- Explain with a neat diagram Fiestel Cipher Structure and its design elements.(10)
OR List out the design objectives for HMAC.(5)
OR Describe the advantages of counter mode. (5)
Model Question Paper:
PART-A
Answer any SIX questions. Each carries 5 marks. 5X6=30 Marks
- List the differences between passive and active security threats.
- Explain essential ingredients of a symmetric cipher with a neat diagram
- List out the design objectives for HMAC.
- Describe the advantages of counter mode.
- Write a note on S/MIME.
- Describe the classification of IDS.
- Mention the purpose of firewalls and its limitations.
- Explain how to safeguard Wireless LANs.
- List the services provided by SSL record protocol.
- Write a short note on Indian Penal Code.
PART-B
Answer any SEVEN full questions each carries 10 marks. 10X7=70 Marks
- Explain in detail various security services.
- Explain with a neat diagram Fiestel Cipher Structure and its design elements.
- Explain the RSA public-key Encryption algorithm with an example.
- Explain the various hardware securities ( Smartcard and Biometrics ).
- Write a note on network based IDS.
- Explain Packet Filtering Firewall and its importance.
- DescribeWAP protocol architecture.
- Describe the SET components and their relationships.
- Explain how do you create an email policy for your organization.
For detail syllabus of all other subjects of BE Computers, C15 scheme do visit Computers 6th Sem syllabus for C15 scheme.
Dont forget to download iStudy Syllabus App for latest syllabus and results, class timetable and more.