Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
17 views1 page

Lecture Plan Network and System Securities

The document outlines a lecture plan for the B Tech CSE VI Semester course on Network & System Security, detailing 18 topics to be covered over a series of lectures. Key subjects include cryptography, malicious code analysis, operating system security, and network security, with specific focus on various security threats and defenses. The course is coordinated by Dr. Deepak Singh Tomar.

Uploaded by

yaswanthe812
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views1 page

Lecture Plan Network and System Securities

The document outlines a lecture plan for the B Tech CSE VI Semester course on Network & System Security, detailing 18 topics to be covered over a series of lectures. Key subjects include cryptography, malicious code analysis, operating system security, and network security, with specific focus on various security threats and defenses. The course is coordinated by Dr. Deepak Singh Tomar.

Uploaded by

yaswanthe812
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

B Tech CSE – VI Semester

Lecture Plan

Subject Name: - Network & System Securities Subject Code CSE 323

S.No Topic to be covered No. Of


Lectures
1. Introduction to computer and network and system security. 01
2. Basic concepts, Common security goals, Exploiting bugs in programs. 01
3. Buffer overflows, Return oriented programming, Fuzzing. 02
4. Cryptography and cryptographic protocols, Including encryption, Authentication, 03
Message authentication codes, Hash Functions, Security of Hash Functions and
MACs, MD5 message Digest algorithm, Secure Hash Algorithm, RIPEMD,
HMAC Digital Signatures, One way functions.
5. Public key cryptography, Secure channels, Zero knowledge in practice, Models and 01
methods for security protocol analysis.
6. Malicious code analysis and defense. Viruses, Worms, Trojan horses, Spyware, 04
Rootkits, Botnets, etc. and defenses against them, Detecting Attackers. Software
security. Secure software engineering.
7. Defensive programming, Buffer overruns and other implementation flaws. 02
8. Language based security: analysis of code for security errors, Safe languages, and 02
Sandboxing techniques.
9. Operating system security. Memory protection, Access control, Authorization, 02
Authenticating users, Enforcement of security.
10. Security evaluation, Trusted devices, Digital rights management. 02
11. Network security. Security services, Network based attacks, Security Issues in 02
TCP/IP suite- Sniffing, spoofing, buffer overflow, ARP poisoning,
12. ICMP Exploits, IP address spoofing, IP fragment attack, routing exploits, UDP 02
exploits, TCP exploits.
13. Kerberos,X.509, Firewalls, Intrusion detection systems. 02
14. DoS attacks and defense. Case studies: DNS, IPSec. Web security. Securing 03
Internet Communication, XSS attacks and defenses, etc.
15. Advanced topics. Security monitoring, Surreptitious communication, Data 01
remanence,
16. Trusted devices, Privacy and security of low powered devices (RFID). 02
17. Electronic voting, Quantum cryptography, Penetration analysis. 02
18. Digital rights management and copy protection, Security and the law. 01

Subject Coordinator:
Dr Deepak Singh Tomar

You might also like