Network Security - Syllabus
Embark on a profound academic exploration as you delve into the Network Security course (network) within the distinguished Tribhuvan university's CSIT department. Aligned with the 2074 Syllabus, this course (CSC416) seamlessly merges theoretical frameworks with practical sessions, ensuring a comprehensive understanding of the subject. Rigorous assessment based on a 60 + 20 + 20 marks system, coupled with a challenging passing threshold of , propels students to strive for excellence, fostering a deeper grasp of the course content.
This 3 credit-hour journey unfolds as a holistic learning experience, bridging theory and application. Beyond theoretical comprehension, students actively engage in practical sessions, acquiring valuable skills for real-world scenarios. Immerse yourself in this well-structured course, where each element, from the course description to interactive sessions, is meticulously crafted to shape a well-rounded and insightful academic experience.
Course Description:
This course covers the fundamental concepts of network security protocols, wireless security concepts, basics of security in cloud and IoT.
Course Objectives:
The main objective of this course is to provide knowledge of network security so that students will be able to implement a secure network architecture using different security protocols and technologies
Units
Key Topics
-
Introduction to Computer Network Security
CO-1.1This topic introduces the fundamental concepts of computer network security, including the importance of securing computer networks and the risks associated with network breaches.
-
Securing the Computer Network
CO-1.2This topic covers the essential measures and best practices for securing a computer network, including network architecture, access control, and threat mitigation.
-
Forms of Network Protection
CO-1.3This topic explores the different forms of protection used to secure computer networks, including firewalls, intrusion detection systems, and encryption techniques.
-
Network Security Standards
CO-1.4This topic discusses the importance of security standards in computer networks, including industry-recognized standards and frameworks for network security.
Key Topics
-
Remote User-Authentication Principles
US-2.1Fundamental concepts and principles of remote user authentication, including authentication protocols and mechanisms.
-
Remote User-Authentication Using Symmetric Encryption
US-2.2Remote user authentication using symmetric encryption, including encryption algorithms and key management.
-
Remote User-Authentication Using Asymmetric Encryption
US-2.3Remote user authentication using asymmetric encryption, including public-key cryptography and digital signatures.
-
Federated Identity Management
US-2.4Federated identity management, including single sign-on (SSO) and identity federation protocols.
Key Topics
-
Introduction to Transaction Processing
TR-1This topic introduces the concept of transaction processing, highlighting the differences between single user and multi-user systems, read/write operations, and the need for concurrency control to avoid problems such as lost update, temporary update, incorrect summary, and unrepeatable read.
-
Transaction and System Concepts
TR-2This topic covers the fundamental concepts of transactions, including transaction states, system log, and commit point of transaction.
-
Desirable Properties of Transactions
TR-3This topic discusses the desirable properties of transactions, namely atomicity, consistency, isolation, and durability (ACID).
-
Schedules and Concurrency Control
TR-4This topic explores schedules, conflicting operations, and characterizing schedules based on recoverability and serializability, including serial, non-serial, and conflict serializable schedules.
Key Topics
-
Multipath Propagation Environment
WI-1This topic covers the concept of multipath propagation in wireless channels, where a signal reaches the receiver through multiple paths. It explores the effects of multipath on signal quality and reliability.
-
LTI Channel Model
WI-2This topic introduces the Linear Time-Invariant (LTI) channel model, which is used to describe the behavior of wireless channels. It explains the assumptions and limitations of the LTI model.
-
Channel Correlation Function
WI-3This topic discusses the channel correlation function, which is a mathematical representation of the correlation between the channel's impulse response and the transmitted signal. It explains the importance of the correlation function in wireless channel characterization.
-
Large Scale Path Loss
WI-4This topic covers large-scale path loss, which refers to the average signal power loss over long distances. It explains the factors that affect large-scale path loss and its impact on wireless communication systems.
5.1. Internet Mail Architecture
5.2. E-mail Formats
5.3. Email Threats and Comprehensive Email Security
5.4. S/MIME
5.5. Pretty Good Privacy (PGP)
5.6. DNSSEC
5.7. DNS-Based Authentication of Named Entities
5.8. Sender Policy Framework
5.9. Domain Keys Identified Mail
5.10. Domain-Based Message Authentication, Reporting, and Conformance
6.1. IP Security Overview
6.2. IP Security Policy
6.3. Authentication Header
6.4. Encapsulating Security Payload
6.5. Security Associations
6.6. Internet Key Exchange
7.1. Firewalls
7.2. Intrusion Detection System
7.3. Malicious Software
7.4. Distributed Denial of Service Attacks
8.1. Cloud Computing
8.2. Cloud Security Concepts
8.3. Cloud Security Risks and Countermeasures
8.4. Cloud Security as a Service
8.5. Open-source Cloud Security Module
8.6. Internet of Things (IoT)
8.7. IoT Security Concepts and Objectives
8.8. Open-source IoT Security Module
Lab works
Laboratory Works:
The laboratory work includes implementation and simulation of Network Security Protocols, Intrusion Detection Systems, DDoS Attacks, Cloud Security and IoT Security Systems.