Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
3 views8 pages

Cns Pyqs Merge

Uploaded by

shubhamu1332
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views8 pages

Cns Pyqs Merge

Uploaded by

shubhamu1332
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Teaching Scheme

(Contact Hours) Credits Assigned


Course Code Course Name
Theory Practical Theory Practical Total
Computer
ITC502 Network 03 -- 03 -- 03
Security

Examination Scheme
Theory

Course Code Course Name End Exam Term Pract


Total
Internal Assessment Sem Duration Work / Oral
Exam (in Hrs)

Test1 Test2 Avg.

Computer Network
ITC502 20 20 20 80 03 -- -- 100
Security

Course Objectives:
Sr. No. Course Objectives

The course aims:


1 The basic concepts of computer and Network Security
2 Various cryptographic algorithms including secret key management and different authentication
techniques.
3 Different types of malicious Software and its effect on the security.
4 Various secure communication standards including IPsec, SSL/TLS and email.
5 The Network management Security and Network Access Control techniques in Computer Security.
6 Different attacks on networks and infer the use of firewalls and security protocols.

Course Outcomes:

Cognitive levels of
Sr. attainment as per
No. Course Outcomes Bloom’s Taxonomy
On successful completion, of course, learner/student will be able to:
1 Explain the fundamentals concepts of computer security and network L1, L2
security.
2 Identify the basic cryptographic techniques using classical and block L1
encryption methods.
3 Study and describe the system security malicious software. L1, L2
4 Describe the Network layer security, Transport layer security and L1, L2
application layer security.
5 Explain the need of network management security and illustrate the need L1, L2
for NAC.
6 Identify the function of an IDS and firewall for the system security. L1,L2, L3

Prerequisite: Basic concepts of Computer Networks & Network Design, Operating System
DETAILED SYLLABUS:
Sr. CO
Module Detailed Content Hours
No. Mapping
Basic concepts of Computer Networks & Network Design,
0 Prerequisite 02 --
Operating System
Computer security and Network Security(Definition), CIA,
Services, Mechanisms and attacks, The OSI security
architecture, Network security model. Classical Encryption
techniques (mono-alphabetic and poly-alphabetic
Introduction
substitution techniques: Vigenere cipher, playfair cipher,
to Network
I transposition techniques: keyed and keyless transposition 07 CO1
Security &
cryptography ciphers). Introduction to steganography.

Self-learning Topics: Study some more classical


encryption techniques and solve more problems on all
techniques. Homomorphic encryption in cloud computing
Block cipher modes of operation,Data Encryption Standard,
Advanced Encryption Standard (AES). RC5 algorithm.
Public key cryptography: RSA algorithm.
Cryptography:
Hashing Techniques: SHA256, SHA-512, HMAC and
Key
CMAC,
management,
II Digital Signature Schemes – RSA, DSS. Remote user 09 CO2
distribution
Authentication Protocols, Kerberos, Digital Certificate:
and user
X.509, PKI
authentication
Self-learning Topics: Study working of elliptical curve
digital signature and its benefits over RSA digital signature.
SPAM, Trojan horse, Viruses, Worms, System Corruption,
Attack Agents, Information Theft, Trapdoor, Keyloggers,
Phishing, Backdoors, Rootkits, Denial of Service Attacks,
Malicious
III Zombie 04 CO3
Software
Self-learning Topics: Study the recent malicious software’s
and their effects.
IP level Security: Introduction to IPSec, IPSec Architecture,
Protection Mechanism (AH and ESP), Transport level
security: VPN. Need Web Security considerations, Secure
IP Security,
Sockets Layer (SSL)Architecture, Transport Layer Security
Transport
(TLS), HTTPS, Secure Shell (SSH) Protocol Stack. Email
level security
IV Security: Secure Email S/MIME 07 CO4
and Email
Screen reader support enabled.
Security
Self-learning Topics: Study Gmail security and privacy
from Gmail help

Network Management Security:SNMPv3,


Network
NAC:Principle elements of NAC,Principle NAC
Management
enforcement methods, How to implement NAC Solutions,
Security and
V Use cases for network access control 06 CO5
Network
Access
Self-learning Topics: Explore any open source network
Control
management security tool
IDS, Firewall Design Principles, Characteristics of
System Firewalls, Types of Firewalls
VI 04 CO6
Security
Self-learning Topics: Study firewall rules table

Textbooks:

1 William Stallings, Cryptography and Network Security, Principles and Practice, 6th Edition,
Pearson Education, March 2013.
2 Behrouz A. Ferouzan, “Cryptography & Network Security”, Tata Mc Graw Hill.
3 Mark Stamp’s Information Security Principles and Practice, Wiley
4 Bernard Menezes, “Cryptography & Network Security”, Cengage Learning.

References:

1 Applied Cryptography, Protocols, Algorithms and Source Code in C, Bruce Schneier, Wiley.
2 Cryptography and Network Security, Atul Kahate, Tata Mc Graw Hill.
3 www.rsa.com

Online References:

Sr. No. Website Name


1. https://swayam.gov.in/
2. https://nptel.ac.in/
3. https://www.coursera.org/

Assessment:
Internal Assessment (IA) for 20 marks:
 IA will consist of Two Compulsory Internal Assessment Tests. Approximately 40% to
50% of syllabus content must be covered in First IA Test and remaining 40% to 50% of
syllabus content must be covered in Second IA Test

 Question paper format

 Question Paper will comprise of a total of six questions each carrying 20 marksQ.1
will be compulsory and should cover maximum contents of the syllabus

 Remaining questions will be mixed in nature (part (a) and part (b) of each question
must be from different modules. For example, if Q.2 has part (a) from Module 3 then
part (b) must be from any other Module randomly selected from all the modules)

 A total of four questions need to be answered


41

61

5F
A0

BC

0
Paper / Subject Code: 32422 / Computer Network Security

F1

68
D0
5

1
F2

41

61
A0
1T01235 - T.E.(Information Technology Engineering)(SEM-V)(Choice Base Credit Grading System )

BC

5
9A

F1

68
D0
5
(R- 19) (C Scheme) / 32422 - Computer Network Security QP CODE: 10025760 DATE: 25/05/2023

1
F2

41
FD

61
A0

BC
9A

F1
22

D0
5

1
Time: 3 hours Max. Marks: 80

F2

41
FD
B0

A0

BC
9A

0
=====================================================================

22
AA

D0
5

1
F2
FD
B0

A0
INSTRUCTIONS

BC
F6

9A

0
22
AA

D0
5
(1) Question 1 is compulsory.

85

1
F2
FD
B0

A0

BC
16

F6
(2) Attempt any three from the remaining questions.

9A
22
AA

5
6

85

1
F2
F1
(3) Draw neat diagrams wherever necessary.

FD
B0

A0
16

F6

9A
41

22
AA

5
6

85

F2
00

F1

FD
B0
Q1 5 marks each

16

F6

A
CD

9A
41

22
AA

5
6

85

F2
00

F1

FD
B

B0
a) Explain Security Services and mechanisms to implement it.

16

F6
01

CD

9A
41

22
AA
6

85
5A
Compare HMAC and CMAC

00
b)

F1

FD
B

B0
16

F6
01

CD
F2

41

22
AA
6
Explain different NAC enforcement methods

85
c)
5A
9A

00

F1
B

B0
16

F6

F
01

CD
F2

41
FD

22
AA
d) Explain SSH protocol stack in brief

85
5A
9A

00

F1
B

B0
22

16

F6
01

CD
F2

41
FD
B0

AA
6

85
5A
9A

00

F1
B
22
AA

16

F6
10 marks each

01
Q2

CD
F2

41
FD
B0

85
F6

5A
9A

00

F1
B
22
AA

16
85

a) Explain Playfair cipher with example

01

CD
F2

41
FD
B0

6
16

F6

5A
9A

00

F1
B
22
AA

b) Describe different Block Cipher modes


16

85

01

CD
F2

41
FD
B0
1F

16

F6

5A
9A

00
B
Q3 10 marks each
22
AA
04

16

85

01

CD
F2
FD
B0
D0

1F

16

F6

5A
9A
a) State firewall design principles and its types with advantages.

B
22
AA
04

16
BC

85

01
F2
FD
0
D0

1F

16

F6

AB

5A
01

b) Describe different types of protocol offered by SSL. 9A


22
04

16
BC

85
5A

F2
6A

FD
B0
D0

1F

16
01

9A
2

5F

22
AA
AF

04

16
BC
5A

FD
68

0
D0

1F
D9

F6

AB
01
2

Q4 10 marks each
61

22
AF

04
BC

85
2F

5A

6A
F1

B0
D0
D9

16
02

01
F2

a) What is Network access control? Discuss the elements present in this context.
41

5F

AA
16
BC
B

5A
9A

8
22
AA

D0

1F

16

b) Explain Kerberos Protocol in detail.


F6
01
2
FD
B0

AF

04

16
BC

85
5A
22
AA

D0

1F
D9

16
01
2
B0

AF

04

16
BC
F6

2F

5A

Q5 10 marks each
AA

D0

1F
D9
85

02

01
2
AF

04
BC
16

F6

AB

Explain the working of IPsec in its different mode.


2F

5A

a)
D0
16

D9
85

02

01
F2
6A

b) What is Network Management Security? Explain SNMP V3.


BC
16

AB

2F

5A
9A
5F
16

02

01
F2
6A

FD
68
1F

AB

5A
9A
61

5F

22
04

Q6 10 marks each
F2
6A
F1

FD
68

B0
D0

9A
41

61

5F

22
AA

Explain IDS and its types in detail.


BC

a)
00

F1

FD
68

B0
F6
CD

41

61

22

b) Define Malware. Explain at least five types with example.


AA
85
00

F1
1B

B0
16

F6
CD

____________________________
41
A0

AA
16

85
00
1B
25

1F

16

F6
CD
A0
AF

04

16

85
1B

D0
25

1F

16
A0
AF

04

16
BC

D0
25

1F
D9

01
AF

04
BC
2F

5A

D0
D9
02

25760 Page 1 of 1
01
F2

BC
AB

2F

5A
9A
02

01
F2
FD
AB

5A
9A

AAB022FD9AF25A01BCD0041F161685F6
22
52

2
BC
00

68
1F
Paper / Subject Code: 32422 / Computer Network Security

00

20

2B
57

CD
33

05

00

68
1F
91
1T01235 - T.E.(Information Technology Engineering)(SEM-V)(Choice Base Credit Grading System ) (R- 19) (C Scheme) /

7B
30

20

2B
CD
7D
32422 - Computer Network Security QP CODE: 10037164 DATE: 24/11/2023

05
13

1F
2D

B
00
9

D
D

52
Time (3 Hours) [Total Marks 80]

7F

05
3

C
7

1
2D

00

B
0
05

D9

7
33

52
0C

7F

05
N. B:

C
7

1
D

7B
00
05
68

D9
1. Question No. 1 is Compulsory.

0
2

52
C
2B

7F

05
3
2. Solve any THREE from Question No. 2 to 6.

D7
0

91

00

00
5
8
1F

0
3. Draw neat well labelled diagram wherever necessary

F2

7D

52
0C
2B
CD

13
57

00
68
1F

9
7B

7D
Q. 1 a) Describe RC5 algorithm with an example. (5)

33
C
B

F
CD

5
05

7
0
2

1
2D

00
b) Explain the purpose of keylogger and rootkit. (5)

5
8
1F

9
B
00

C0
6

7D

3
2B

7F
7
c) Explain Playfair Cipher with an example. (5)

3
52

05

80

91
C

2D
05
1F
d) Explain how VPN can be used to encrypt your personal data. (5)
00

B
0

B6

7D
0

7F
7

D
33

52

0
2
BC

2D
0

05
8
F
91

B6
1
Q2. a) Explain Public Key Cryptography and RSA algorithm. Given modulus n=91 and
0

0C

7F
57

CD
7D

52

7
2
3

2D
public key e=5, find the value of p, q, phi(n) and d using RSA. Encrypt M=25. (10)

5
68
1F
1
2D

B
00

C0
9

7F
57
b) List and explain all types of Malware in detail. Differentiate between Virus and

CD
D

52
7F

80
F2
13
7

05
Worms. (10)
D

00

7B
0
05

B6
D1
9

0C
2

7D

33

2
0C

7F

05

F2
C
5

68
91
2D

B
00
5
68

D1
Q3. a). Explain Kerberos protocol in detail. Show how a Kerberos protocol can be used to
0
0

2B
7
7D

52
0C
2B

7F

5
3

BC
achieve single sign-on in distributed systems. (10)

1F
91
2D

00

00
05
68
1F

b) Explain the OSI Security Architecture and Network Security Model. (10)

57

CD
7D

33

52
C
2B

7F
CD

00
0

91
D

7B
5
8
1F

0
7B

20
0
6

3
0C
2B

05
CD

Q4. a) Explain Email security process. Explain how S/MIME can be used for Digital
3
D7

05
05

00
5
68
1F

Signature and verification operations on email messages.


D9 (10)

30
7B
00

F2

52
0C
2B
D

3
52

D7

b) Explain the implementation of Network Access Control with one use case. (10)
05

91
BC

00
05
68
1F
00

00

F2

7D

33
C
2B
57

D
33

52

57
0

91
C

2D

Q5. a) Explain how Network Management security is implemented using SNMP v3. (10)
00

8
F
91

00

C0
B6
D1

7D
20

7F
57

b) What is an Intruder Detection System? Explain its types in detail. (10)


D

33

80
F2
BC
D7

05

2D
0

5
91

C0
6
D1
30

0
F2

7F
57
7D

80
F2

Q6. Write Short Notes on ANY 4: (20)


13

BC
5

00
57

05
2D

00

B6
D1
D9

a) Firewall design principles


0
C0

0C
7
3

2
F

05

F2
13

C
7

b) Block Cipher Modes of Operation


57
80

68
2D

B
0

1
D9

20
C0

2B
7

c) HMAC and CMAC


CD
33
F

5
7

0
57
80

1F
91

d) Steganography and its applications


2D

7B
0
0

20
C0
B6

CD
D

e) SHA 256 and SHA 512


F

5
3
7

05

00
57
80
2

1
2D

7B

f) SSL Architecture
1F

20
C0
B6

33
F

05
CD

05
57
80
2

1
D

00
1F

D9

30
C0
B6

F2

52
D

*****************
13
D7
57
80
2
BC

00
1F

D9
C0
B6

F2

33
57

D7
57
80
2

91
BC
0

1F
00

C0
B6

F2

7D
57

D
52

57
80
2
BC

2D
0

1F
00

C0
B6

7F
57

D
2

80
F2
BC
05

05
00

B6
1
30

0C
57

D
2

F2
13

BC
05

68
00

1
D9

30

2B
57

CD
2
13
D7

05

1F
7B
00
D9

30

CD
2

05
13
D7

05

7B
00
D9

30
2

2
7F

05
13

37164 Page 1 of 1
D7

5
00

00
05

D9
2

52
0C

7F

13
D7

00
05

D9
F2

33
0C

D7

0C057F2D7D9133005200057BCD1F2B68
57

91
6
52

52
7

Y1

7
E1
Paper / Subject Code: 32422 / Computer Network Security

E1
DX

DX
25
16

6
7

Y1

7
June 5, 2024 02:30 pm - 05:30 pm 1T01235 - T.E.(Information Technology

5
5Y

E1

E1
DX

DX
Engineering)(SEM-V)(Choice Base Credit Grading System ) (R- 19) (C Scheme) / 32422 -

25
16

6
52

Y1

7
5
Computer Network Security QP CODE: 10055609

5Y

E1
DX

E1
DX

25
16

6
52
17

Y1
5
5Y

E1
DX

DX
6E
Time: 3 Hours Max. Marks: 80

25
16
52
Y1

17

5
5Y

E1

Y
DX

DX
6E
25

25
16
INSTRUCTIONS

52
Y1

17
X5

5
5Y

E1
DX

DX
(1) Question 1 is compulsory.

6E
25
7D

16
52
Y1

17
(2) Attempt any three from the remaining questions.

X5

7
E1

5Y

E1
DX
6E
25
7D
(3) Draw neat diagrams wherever necessary.

16

16
52
Y1

17
X5
5Y

E1

5Y

E1
DX
6E
25
7D
16
52

16
52
Y1

17
X5
5Y

E1
DX

5Y
DX
6E
25
7D
Q1 5 marks each

16
52

52
7

Y1

17
X5
E1

5Y

E1
DX

DX
a) Distinguish between passive and active security attacks

6E
25
7D
16

16
52
7

Y1
Differentiate between virus and worm

17
b)

X5
5Y

E1

5Y

E1
DX

DX
6E
25
Explain SSH protocol stack in brief

7D
c)
16

16
52

52
7

Y1

17
X5
5Y

E1

5Y
DX

E1
d) Write short note on :Email Security
DX

6E
25
7D
16

16
52

52
7

Y1
X5
E1

5Y

E1

5Y
DX

E1
DX
Q2 10 marks each

25
7D
16

16

16
52

52
7

X5
5Y

E1

5Y

E1

a) Discuss classical encryption techniques with example

5Y
DX

E1
DX

7D
16

16
52

16
52

Explain different types of denial of service attacks

52
b)
7

7
5Y

E1

5Y
DX

E1

5Y
DX

E1
DX
Q3 10 marks each
16

16
52

16
52

52
7

7
E1

a) What are Block cipher modes. Describe any two in detail


5Y

E1

5Y
DX

E1

5Y
DX

DX
16

16

16
52

b) Given modulus n=221 and public key e=7 find the values of p,q,phi(n) and d using
52

52
7

7
5Y

E1

5Y

E1

5Y
DX

E1
DX

DX
RSA encrypt M=5
16

16
52

16
52

52
7

17

7
5Y

E1

5Y
DX

5Y
DX

E1
DX
6E
16
52

16
52

52

Q4 10 marks each
17

Y1

17
5Y

E1
DX

5Y
DX

DX
6E

6E
25

a) Discuss various NAC enforcement methods


16
52

52
7

Y1

17
X5
E1

5Y

E1

b) Design sample digital certificate and explain each field of it


DX

DX
6E
25
7D
16

16
52

Q5 10 marks each
17

Y1

17
X5
5Y

5Y

E1
DX
6E

6E

a) Show how a Kerberos protocol can be used to achieve single sign on in distributed
25
7D
16
52

52
Y1

17

Y1
X5

systems
5Y
DX

E1
DX
6E
25

25
7D

b) Explain the different types of protocol offered by SSL


16
52
Y1

17
X5

X5
5Y

E1
DX

Q6 10 marks each
6E
25
7D

7D
16
52
Y1

17

Why there is a need of a firewall?Explain the different types of firewalls


X5

a)
1

5Y

E1
DX
6E

6E
25
7D

b) How does IPSec help to achieve authentication and confidentiality?Justify the


16
52
Y1

Y1

17
X5
E1

need of AH and ESP


5Y
DX
6E
25

25
7D
16

52
Y1

17
X5
5Y

E1

DX
6E
25
7D
16
52

Y1

17
X5
5Y

E1
X

_______________
6E
25
7D

7D
16
52

Y1
X5
E1

5Y

E1
DX

25
7D
16

16
52
17

X5
5Y

E1
DX
6E

7D
16
52
Y1

17

5Y

E1
DX
6E
25

16
52
1

17
X5

5Y

5Y
X
6E

55609 Page 1 of 1
7D

7D
52

52
1
5Y

E1
DX

DX
16
52

X525Y16E17DX525Y16E17DX525Y16E17DX525Y16E17D
17

17
yz{|}~~€‚ƒ|„~†‡ˆ|‰~Š‹Œ‹‹~~†‡{|}~Ž|‡}~€|„}‘’
13/11/2024 IT SEM-V C SCHEME CNS QP CODE: 10064504

9 774

 !"#$ 
%9&'()*
+,9(7&)99997&&8-9&*
.7/&970787/9919&9'97)*


%  
23 4567898:;<=79>?@268AB78;<889C:7=87?57D7;25;: 3
E3 F@GH2=:25I;@59=289B4J25IK4JA3
;3 4LH62759C:H<=H@8:@DM:>6@??:=25I=@@9M79 3
I3 JNKH=@O7I:8E:99:=8:;<=79>9C25PBQR<897D> 3
%+ 
23 STUVWXYZ[\]^_Z^_ZY]`Za^TbcZ̀dbefZg^Y]ZhcbWZab^VZU^X]`ViY]`Zj`WZ^_Zklm^nbTU`o 4
E3 pC29789C:87?57D7;25;:@D2I7?792687?529<=:@52;:=97D7;29:qR<897D> 4
%
23 N@rI@:8stJ:;C:6H9@2;C7:O:2<9C:597;297@525I;@5D7I:5972679>qR<897D>9C:5::I@D
KN25I4Jt u4
E3 pC29s8tvsA4LH6275tvs2=;C79:;9<=:75I:9276 u4
%2 
23 JC@rC@r2v:=E:=@8H=@9@;@6;25E:<8:I9@2;C7:O:875?6:87?5@575I789=7E<9:I
8>89:G8 4
E3 pC29785:9r@=M2;;:88;@59=@6qB78;<889C::6:G:598H=:8:59759C78;@59:L9 4
%3 
23 4LH6275I7DD:=:599>H:8@DI:5726@D8:=O7;:2992;M8 4
E3 4LH62755:9r@=MG252?:G:598:;<=79>r79C=:8H:;99@JwPtH=@9@;@6 4
%1 
23 4LH6275I7DD:=:59G:9C@I8@DsBJqJ929:;2H2E76797:825I;C266:5?:875sBJ 4
E3 4LH62759=258H@8797@5;7HC:=8r79C766<89=297O::L2GH6:8 4

xxxxxxxxxxxxxxxxx

12342 6789 

“”•”–—”˜™š—“”•”–—”˜™š—“”•”–—”˜™š—“”•”–—”˜™š—

You might also like