B. E.
Electronics and Communication Engineering
Choice Based Credit System (CBCS) and Outcome Based Education (OBE)
SEMESTER – VII
Computer and Network Security
Course Code BEC714B CIE Marks 50
Teaching Hours/Week (L:T:P: S) 3:0:0:0 SEE Marks 50
Total Hours of Pedagogy 40 hours Theory Total Marks 100
CREDITS – 03
Course objectives:
This course will enable students to:
● Preparation: To prepare students with fundamental knowledge/ overview in the field of Network Security
with knowledge of security mechanisms and services, Vulnerabilities in the host machines.
● Core Competence: To equip students with a basic foundation on computer as well as network security by
delivering the basics of malicious software, intrusion detection, vulnerability Analysis, auditing as well as
securities related to network, system, user and programs
Teaching-Learning Process (General Instructions)
These are sample Strategies; that teachers can use to accelerate the attainment of the various course outcomes.
1. Lecture method (L) does not mean only traditional lecture method, but different type of teaching methods may be
adopted to develop the outcomes.
2. Show Video/animation films to explain the different concepts of Digital Signal Processing
3. Encourage collaborative (Group) Learning in the class
4. Ask at least three HOTS (Higher order Thinking) questions in the class, which promotes critical thinking
5. Adopt Problem Based Learning (PBL), which fosters students’ Analytical skills, develop thinking skills such as
the ability to evaluate, generalize, and analyze information rather than simply recall it.
6. Topics will be introduced in a multiple representation.
7. Show the different ways to solve the same problem and encourage the students to come up with their own
creative ways to solve them.
8. Discuss how every concept can be applied to the real world - and when that's possible, it helps to improve the
students' understanding.
9. Adopt Flipped class technique by sharing the materials / Sample Videos prior to the class and have discussions on
the that topic in the succeeding classes.
MODULE-1
RBTL
Level
Attacks on Computers and Computer Security: Need for Security, Security Approaches, Principles of L1, L2,
Security Types of Attacks. (Text2: Chapter1) L3
Security Mechanisms, Services and Attacks, A model for Network security (Text1: Chapter1: 3, 4, 5, 6)
MODULE-2
Malicious Logic: Introduction, Trojan Horses, Computer Viruses, Computer Worms, Other Forms of L1, L2,
Malicious Logic, Defenses (Text 3: Chapter 12) L3
Vulnerability Analysis: Introduction, Penetration Studies, Vulnerability Classification, Frameworks
(Text 3: Chapter 13)
MODULE-3
@#Nov2024
Auditing: Definitions, Anatomy of an Auditing System, Designing an Auditing System, A Posterior Design, L1, L2,
Auditing Mechanisms, Examples, Audit Browsing (Text 3: Chapter 14) L3
Intrusion Detection: Principles, Basic Intrusion Detection, Models, Architecture, Organization of
Intrusion Detection Systems, Intrusion Response (Text 3: Chapter 15)
MODULE-4
Network Security: Introduction, Policy Development, Network Organization, Availability and Network L1, L2,
Flooding, Anticipating Attacks (Text 3: Chapter 16) L3
System Security: Introduction, Policy, Networks, Users, Authentication, Processes, Files, Retrospective
(Text 3: Chapter 17)
MODULE-5
User Security: Policy, Access, Files and Devices, Processes, Electronic Communications (Text 3: Chapter L1, L2,
18) L3
Program Security: Introduction, Requirements and Policy, Design, Refinement and Implementations
(Text 3: Chapter 19: Section 1, 2, 3, 4)
Course outcomes (Course Skill Set):
At the end of the course, the student will be able to:
● Explain the various types of attacks on computer and network security from malicious logic and intruders.
● Explain how to analyze the various vulnerabilities in the system which can compromise the security.
● Explain how auditing is essential to detect intrusion or suspicious activities in the system.
● Explain the process involved to provide security with respect to network, system, user and program.
Assessment Details (both CIE and SEE)
The weightage of Continuous Internal Evaluation (CIE) is 50% and for Semester End Exam (SEE) is 50%.
The minimum passing mark for the CIE is 40% of the maximum marks (20 marks out of 50) and for the
SEE minimum passing mark is 35% of the maximum marks (18 out of 50 marks). The student is declared
as a pass in the course if he/she secures a minimum of 40% (40 marks out of 100) in the sum total of the
CIE (Continuous Internal Evaluation) and SEE (Semester End
Examination) taken together.
Continuous Internal Evaluation:
● There are 25 marks for the CIE's Assignment component and 25 for the Internal Assessment Test
component.
● Each test shall be conducted for 25 marks. The first test will be administered after 40-50% of the
coverage of the syllabus, and the second test will be administered after 85-90% of the coverage
of the syllabus. The average of the two tests shall be scaled down to 25 marks.
● Any two assignment methods mentioned in the 22OB4.2, if an assignment is project-based then
only one assignment for the course shall be planned. The schedule for assignments shall be
planned properly by the course teacher. The teacher should not conduct two assignments at the
end of the semester if two assignments are planned. Each assignment shall be conducted for 25
marks. (If two assignments are conducted then the sum of the two assignments shall be scaled
down to 25 marks).
● The final CIE marks of the course out of 50 will be the sum of the scale-down marks of tests and
assignment/s marks.
Internal Assessment Test question paper is designed to attain the different levels of Bloom’s taxonomy as
per the outcome defined for the course.
Semester-End Examination:
@#Nov2024
Theory SEE will be conducted by University as per the scheduled timetable, with common question papers for the
course (duration 03 hours).
1. The question paper will have ten questions. Each question is set for 20 marks.
2. There will be 2 questions from each module. Each of the two questions under a module (with a maximum
of 3 sub-questions), should have a mix of topics under that module.
3. The students have to answer 5 full questions, selecting one full question from each module.
4. Marks scored shall be proportionally reduced to 50 marks.
Suggested Learning Resources:
Text Book
1. William Stallings, “Cryptography and Network Security Principles and Practice”, Pearson Education Inc., 6th
Edition, 2014, ISBN: 978-93-325-1877-3
2. Atul Kahate, “Cryptography and Network Security”, TMH, 2003.
3. Matt Bishop, Sathyanarayana S Venkatramanayya, “Introduction to Computer Security”, Pearson Education,
2006, ISBN 81-7758-425-1
Reference Books
1. Cryptography and Network Security, Behrouz A Forouzan, TMH, 2007.
Web links and Video Lectures (e-Resources):
Activity Based Learning (Suggested Activities in Class)/ Practical Based learning
1. Experiential Learning by using free and open-source software’s SCILAB or OCTAVE or Python
@#Nov2024