0% found this document useful (0 votes)
530 views

System and Networks Security

This document outlines the course details for the subject "System and Networks Security" taught in the 8th semester of the Bachelor of Engineering program at Gujarat Technological University. The course covers topics such as network fundamentals, security issues, symmetric and public key cryptography, network security, email and IP security, web security, and malicious software. It is taught over 6 hours per week, with a 70% weighting on the final university exam and 30% on a mid-semester exam. Recommended textbooks for the course are listed.

Uploaded by

123vidya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
530 views

System and Networks Security

This document outlines the course details for the subject "System and Networks Security" taught in the 8th semester of the Bachelor of Engineering program at Gujarat Technological University. The course covers topics such as network fundamentals, security issues, symmetric and public key cryptography, network security, email and IP security, web security, and malicious software. It is taught over 6 hours per week, with a 70% weighting on the final university exam and 30% on a mid-semester exam. Recommended textbooks for the course are listed.

Uploaded by

123vidya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

GUJARAT TECHNOLOGICAL UNIVERSITY

Information & Communication Technology.


B. E. SEMESTER: VIII

Subject Name: System and Networks Security.

Subject Code: 183202

Teaching Scheme Evaluation Scheme

Theory Tutorial Practica Total University Exam Mid Sem Practical


l (E) Exam (Internal)
(Theory)
Theory Practic (M)
al
4 0 2 6 70 30 30 20

Sr. Course Content.


No.
1. Network Fundamentals.
LANs, WANs, MANs.
Network Software: Protocol Hierarchies, Design Issues in layers, Services
Primitive.
Critique of the OSI and TCP.
Birth and Growth of the Internet, ARPANET, NSFNET.
Common networks: X.25, ATM, Ethernet, WLANs.
2. Introduction to Security Issues.
Security Trends.
OSI Security Architecture.
Security attacks, Security Services and Security Mechanism.
Model of Network Security.
3. Symmetric Ciphers.
Symmetric Cipher Model.
Substitution techniques.
Transposition techniques.
Stegnography.
Block Cipher principles and Design issues.
Data Encryption Standard.
Advance Encryption Standard.
Traffic Confidentiality.
Key Distribution.
4. Public Key Cryptography.
Principles.
RSA Algorithm.
Key Management.
Deffie-Hellman Key Exchange.

5. Network Security.
Digital Signatures.
Authentication Protocols.
DSS.
Kerberos.
X.509 Authentication Services.
Public Key Infrastructure.
6. Email Security and IP Security.
Introduction to PGP.
Introduction to S/MIME.
IP Security Overview.
IP Security Architecture.
7. Web Security.
Threats and Security Approaches.
Secure Socket Layer.
Secure Electronic Transaction.
Intruders.
Intrusion Detection.
Password Management.
8. Malicious Software.
Viruses and Related Threats.
Virus Countermeasures.
Distributed Denial of Service attacks.
Firewalls Design Principles.
Trusted System

Text Books:

1. Computer Networks Fourth Edition Andrew S. Tenenbaum, Publisher:


Prentice Hall
2. Cryptography and Network Security: Principles and Practices Fourth Edition
William Stallings,Pearson.

Reference Books:

1. Data Communication Networking Forth Edition Behrouz A.Forouzan.


2. Cryptography & Network Security, Forouzan, Mukhopadhyay,
McGrawHill.
3. Cryptography and Network Security (2nd Ed.), Atul Kahate, TMH.
4. Information Systems Security, Godbole, Wiley-India.
5. Information Security Principles and Practice, Deven Shah, Wiley-India.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy