Network Security - Syllabus
Embark on a profound academic exploration as you delve into the Network Security course (network) within the distinguished Tribhuvan university's CSIT department. Aligned with the 2074 Syllabus, this course (CSC416) seamlessly merges theoretical frameworks with practical sessions, ensuring a comprehensive understanding of the subject. Rigorous assessment based on a 60 + 20 + 20 marks system, coupled with a challenging passing threshold of , propels students to strive for excellence, fostering a deeper grasp of the course content.
This 3 credit-hour journey unfolds as a holistic learning experience, bridging theory and application. Beyond theoretical comprehension, students actively engage in practical sessions, acquiring valuable skills for real-world scenarios. Immerse yourself in this well-structured course, where each element, from the course description to interactive sessions, is meticulously crafted to shape a well-rounded and insightful academic experience.
Course Description:
This course covers the fundamental concepts of network security protocols, wireless security concepts, basics of security in cloud and IoT.
Course Objectives:
The main objective of this course is to provide knowledge of network security so that students will be able to implement a secure network architecture using different security protocols and technologies
Units
Key Topics
-
Introduction to Computer Network Security
CO-1.1This topic introduces the fundamental concepts of computer network security, including the importance of securing computer networks and the risks associated with network breaches.
-
Securing the Computer Network
CO-1.2This topic covers the essential measures and best practices for securing a computer network, including network architecture, access control, and threat mitigation.
-
Forms of Network Protection
CO-1.3This topic explores the different forms of protection used to secure computer networks, including firewalls, intrusion detection systems, and encryption techniques.
-
Network Security Standards
CO-1.4This topic discusses the importance of security standards in computer networks, including industry-recognized standards and frameworks for network security.
Key Topics
-
Remote User-Authentication Principles
US-2.1Fundamental concepts and principles of remote user authentication, including authentication protocols and mechanisms.
-
Remote User-Authentication Using Symmetric Encryption
US-2.2Remote user authentication using symmetric encryption, including encryption algorithms and key management.
-
Remote User-Authentication Using Asymmetric Encryption
US-2.3Remote user authentication using asymmetric encryption, including public-key cryptography and digital signatures.
-
Federated Identity Management
US-2.4Federated identity management, including single sign-on (SSO) and identity federation protocols.
Key Topics
-
Introduction to Transaction Processing
TR-1This topic introduces the concept of transaction processing, highlighting the differences between single user and multi-user systems, read/write operations, and the need for concurrency control to avoid problems such as lost update, temporary update, incorrect summary, and unrepeatable read.
-
Transaction and System Concepts
TR-2This topic covers the fundamental concepts of transactions, including transaction states, system log, and commit point of transaction.
-
Desirable Properties of Transactions
TR-3This topic discusses the desirable properties of transactions, namely atomicity, consistency, isolation, and durability (ACID).
-
Schedules and Concurrency Control
TR-4This topic explores schedules, conflicting operations, and characterizing schedules based on recoverability and serializability, including serial, non-serial, and conflict serializable schedules.
Key Topics
-
Multipath Propagation Environment
WI-1This topic covers the concept of multipath propagation in wireless channels, where a signal reaches the receiver through multiple paths. It explores the effects of multipath on signal quality and reliability.
-
LTI Channel Model
WI-2This topic introduces the Linear Time-Invariant (LTI) channel model, which is used to describe the behavior of wireless channels. It explains the assumptions and limitations of the LTI model.
-
Channel Correlation Function
WI-3This topic discusses the channel correlation function, which is a mathematical representation of the correlation between the channel's impulse response and the transmitted signal. It explains the importance of the correlation function in wireless channel characterization.
-
Large Scale Path Loss
WI-4This topic covers large-scale path loss, which refers to the average signal power loss over long distances. It explains the factors that affect large-scale path loss and its impact on wireless communication systems.
Key Topics
-
E-payment System
EL-1Overview of electronic payment systems, including their types and applications in e-commerce.
-
Online Credit Card Transaction
EL-2The process and security measures involved in online credit card transactions.
-
Online Stored Value Payment System
EL-3A payment system that stores value electronically, allowing users to make payments online.
-
Digital and Mobile Wallet
EL-4Electronic wallets that store payment information and allow users to make transactions online or through mobile devices.
-
Smart Cards
EL-5A type of card that stores and processes data, often used for secure online transactions.
-
Social/Mobile Peer-to-Peer Payment Systems
EL-6Payment systems that enable individuals to send and receive payments through social media or mobile devices.
-
Digital Cash/e-cash
EL-7A digital equivalent of physical cash, allowing for anonymous and secure online transactions.
-
E-Checks
EL-8An electronic version of traditional checks, used for online transactions.
-
Virtual Currency
EL-9A digital currency that exists only in electronic form, often used for online transactions.
-
Electronic Billing Presentment and Payment (EBPP) System
EL-10A system that enables customers to receive and pay bills electronically.
Key Topics
-
IP Security Overview
IP-1Introduction to IP security, its importance, and its role in network security. Overview of IP security protocols and their applications.
-
IP Security Policy
IP-2Definition and implementation of IP security policies, including security requirements and constraints. How IP security policies are used to guide security decisions.
-
Authentication Header
IP-3Authentication Header (AH) protocol, its functions, and its role in IP security. How AH provides authentication and integrity of IP packets.
-
Encapsulating Security Payload
IP-4Encapsulating Security Payload (ESP) protocol, its functions, and its role in IP security. How ESP provides confidentiality, authentication, and integrity of IP packets.
-
Security Associations
IP-5Security Associations (SAs), their role in IP security, and how they are established and managed. The importance of SAs in IPsec protocol suite.
-
Internet Key Exchange
IP-6Internet Key Exchange (IKE) protocol, its functions, and its role in IP security. How IKE is used to establish and manage cryptographic keys for IPsec.
Key Topics
-
Neurally Inspired Models of Information Processing
NE-1This topic explores models of information processing inspired by the structure and function of the brain. It introduces the concept of neural networks and their application to information processing.
-
Single-Layer Networks and Boolean Functions
NE-2This topic delves into the basics of single-layer neural networks and their relationship with Boolean functions. It covers the fundamentals of neural network architecture and its application to simple logical operations.
-
Multilayer Networks
NE-3This topic builds upon the basics of single-layer networks and explores the architecture and functionality of multilayer neural networks. It discusses the advantages and limitations of multilayer networks in information processing.
-
Information Processing in Neural Networks
NE-4This topic examines the process of information processing within neural networks. It covers how neural networks receive, process, and transmit information, and the implications for cognitive science.
Key Topics
-
Structure of JavaScript Program
CL-01Understanding the basic structure of a JavaScript program, including syntax and organization.
-
Variables and Data Types
CL-02Declaring and using variables, understanding data types in JavaScript.
-
JavaScript Statements
CL-03Understanding expression, keyword, and block statements in JavaScript.
-
Operators
CL-04Using operators for arithmetic, comparison, logical, and assignment operations.
-
Flow Controls and Looping
CL-05Using if-else statements, switch statements, and loops (for, while, do-while) to control program flow.
-
Functions
CL-06Defining and calling reusable code blocks with functions.
-
Popup Boxes
CL-07Using alert, confirm, and prompt boxes to interact with users.
-
Objects and Properties
CL-08Understanding objects, properties, and constructors in JavaScript.
Lab works
Laboratory Works:
The laboratory work includes implementation and simulation of Network Security Protocols, Intrusion Detection Systems, DDoS Attacks, Cloud Security and IoT Security Systems.