Sunday 19 May 2024

ICT Ed. 475: Network and Information Security | BICTE | Sixth Semester | Bicte Note | Bicte Blog | Syllabus

 

Course Title: Network Security

Course No. : ICT. Ed  468                                          Nature of course: Theoretical + Practical

Level: Bachelor                                                          Credit Hour:  3 (2+1)

Semester: Sixth                                                           Teaching Hour: 64(32+32)      

           

1.     Course Description

The course, Network Security, is a major course for students studying towards acquiring the Bachelor in Information Communication Technology Education (BICTE). This course aims to provide fundamental skills needed to understand the internal and external security threats against a network, and to implement security policies that will protect an organization’s information. The course objective is to impart fundamental understanding of every facet of information security, security policies, cryptography, authentication, security of network, system, user and program, identifying malware, perform vulnerability analysis, auditing and attacks and responses to those attacks.

2.     General Objectives

The general objectives of this course are as follows:

·       Develop an understanding of computer security and its mechanism.

·       Gain familiarity with prevalent network and system attacks, defenses against them, and forensics to investigate the aftermath.

·       Develop a basic understanding of cryptography, how it has evolved, and some key encryption techniques used today.

·       Develop an understanding of security policies (such as authentication, integrity and confidentiality), as well as protocols to implement such policies in the form of message exchanges.

3.     Course Outlines: 

Specific Objectives

Contents

Hours

(Th+Pr)

·  Explain the concept of Computer Security.

·  Understand the basic terminologies related to security.

1.     Introduction

1.1 The Basic Components

1.2 Threats

1.3 Policy and Mechanism

1.4 Assumptions and Trust

1.5 Assurance

1.6 Operational and Human Issues

3

·  Explain Security policies and its types

·  Develop confidentiality, integrity, and availability policies

 

2.     Policies

2.1  Security Policies

2.1.1      The Nature of Security Policies

2.1.2      Types of Security Policies

2.1.3      The Role of Trust

2.1.4      Example: Academic Computer Security Policy

2.2  Confidentiality Policies

2.2.1      The Bell-LaPudala Model

2.3  Integrity Policies

2.3.1      The Biba Model

2.4  Availability Policies

2.4.1      Goals of Availability Policies

2.4.2      Denial of Service Models

2.4.3      Example: Availability and Network Flooding

 

Practical Works

·       Visit an organization in your local place and develop security policies and procedures for that organization. Present the prepared report in front of your classmates and the stakeholders of that organization.

5+5

·  Explain the Public-Key Encryption Structure.

·  Apply the Symmetric Cryptosystem.

·  Explain the requirements for digital signature.

·  Explain the key management strategies.

·  Develop cipher text

·  Identify and implement different types of authentication methods

3.     Cryptography

3.1  Basic Cryptography

3.1.1       Symmetric Cryptosystems

3.1.2       Public Key Cryptography

3.1.3       Cryptographic Checksums

3.1.4       Digital Signature

3.1.5       Hashing

3.2  Key Management

3.2.1       Session and Interchange Keys

3.2.2       Key Exchange and Generation

3.2.3       Cryptographic Key Infrastructures

3.2.4       Storing and Revoking Keys

3.3  Cipher Techniques

3.3.1       Stream and Block Ciphers

3.3.2       Authenticated Encryption

3.4  Authentication

3.4.1       Authentication Basics

3.4.2       Passwords

3.4.3       Password Selection

3.4.4       Attacking Passwords

3.4.5       Password Aging

3.4.6       Biometrics

3.4.7       Multifactor Authentication

 

Practical Works

·       Write program to create cipher text

·       Write program to validate strong password

7+5

·  Analyze the network infrastructure.

·  Configure Network devices to enhance security.

·  Explain the different types of encryption and decryption techniques in network.

·  Identify and discuss the different strategies used to secure wired and wireless network.

·  Explain the mechanism of System, User, Program, Email, Web and Database Security.

·  Install and configure the firewall to achieve its benefits.

·  Make use of VPN to secure electronic communication.

 

4.     Security and Protection

4.1  Network Security

4.1.1       Network Infrastructure Analysis

4.1.2       Encryption and Decryption in Network

4.1.3       Firewall and its types

4.1.4       Wired and Wireless Security

4.1.5       Virtual Private Network

4.2  System Security

4.3  Email, Web and Database Security

4.4  User Security

4.4.1       Access

4.4.2       Files and Devices

4.4.3       Electronic Communications

4.5  Program Security

4.5.1       Common Security-Related Programming Problems

Practical Works

·       Configure routers, switches, and other network devices to enhance security.

·       Assess and secure web applications against common security threats. Use tools like OWASP ZAP or Burp Suite for web application security testing.

·       Configure firewalls to control and monitor network traffic.

8+10

·  Explain the different methods of intrusion detection.

·  Perform vulnerability analysis.

·  Conduct penetration testing.

·  Know different types of Malicious Software.

·  Design an auditing system.

·  Engage in simulated attacks and develop response techniques to overcome the attacks.

 

5.     Threats, Assessment and Solutions

5.1  Malware

5.1.1       Introduction

5.1.2       Trojan Horses

5.1.3       Computer Viruses

5.1.4       Computer Worms

5.1.5       Bots and Botnets

5.1.6       Other Malware

5.1.7       Theory of Computer Viruses

5.1.8       Defenses

5.2  Vulnerability Analysis

5.2.1       Penetration Studies

5.2.2       Vulnerability Classification

5.3  Auditing

5.3.1       Definition

5.3.2       Designing an Auditing System

5.3.3       Examples: Auditing File Systems

5.4  Intrusion Detection

5.4.1       Principles

5.4.2       Basic Intrusion Detection

5.4.3       Organization of Intrusion Detection Systems

5.5  Attacks and Responses

5.5.1       Attacks

5.5.2       Representing Attacks

5.5.3       Intrusion Response

5.5.4       Digital Forensics

 

Practical Works

·       Conduct vulnerability assessments on systems and networks using tools such as Nessus or OpenVAS.

·       Conduct security audits to assess the overall security posture of an organization.

·       Develop and deliver security awareness training programs for naive users.

·       Engage in simulated attacks on systems to identify vulnerabilities. Use tools like Metasploit or Wireshark to analyze network traffic and find potential security weaknesses.

9+12

 

 

4.     Instructional Techniques

The instructional techniques for this course are divided into two groups.  First group consists of general instructional techniques applicable to most of the units. The second group consists of specific instructional techniques applicable to specific units.

4.1 General Techniques

·       Providing the reading materials to the students to familiarize the units.

·       Lecture, question-answer, discussion, brainstorming, practical, and buzz session.

 

4.2 Specific Instructional Techniques

Unit

Activity and instructional techniques

Teaching Hours(64)

1 to 5

Use network security tools to implement the algorithm

 

 

 

 


 

5.     Evaluation (Internal Assessment and External Assessment):

Nature of course

Internal Assessment

External Practical Exam/Viva

Semester Examination

Total Marks

Theory

40%

20%

40%

100%

Note: Students must pass separately in internal assessment, external practical exam / viva and or semester examination.

 

5.1   Evaluation for Part I ( Theory)

5.1.1       Internal Evaluation  40%

Internal evaluation will be conducted by course teacher based on following activities:

1)    Attendance                                                                              5 points

2)    Participation in learning activities                                          5 points

3)    First assessment ( written assignment)                                   10 points

4)    Second assessment ( Term examination )                              10 points

5)    Third assessment ( Internal Practical Exam/Case Study) 10 points

Total                                                                                                40  points

 

5.2 External Evaluation (Final Examination) 40% 

 

Examination Division, office of the Dean, Faculty of Education will conduct final examination at the end of semester.

1)    Objective type question (Multiple choice 10questionsx1mark)  10 marks

2)    Short answer questions  (6 questions x 5 marks)                         30 marks

Total                                                                                             40 marks                                                                                                                                                                                                                                                                                                  

 

6.1  Evaluation for part II (practical) 20%

Nature of the course

Semester final examination by External Examiner

Total percent

Practical

100%

100  

 

 

6.2.1 Practical Examination Evaluation Scheme

a)     External assessment …………………………100%

i)               Record book ……………………….  20%

ii)             Laboratory work exam/Case………..40%

iii)            VIVA………………………………..40%

 

 


 

6.     Recommended books and reading materials (including relevant published articles in national and international journals)

 

6.1  Prescribed Text Book

 

·       Bishop, M. (2018). Computer Security: Art and Science, 2nd Edition. Addison-Wisely Professional.

6.2  Reference Materials

·       Elahi, A., & Cushman, A. (2024). Computer Networks: Data Communications, Internet and Security. 1st Edition. Springer International Publishing. https://doi.org/10.1007/978-3-031-42018-4

·       Ortega, J.M. (2023). Python for Security and Networking: Leverage Python modules and tools in securing your network and applications, 3rd Edition. Packt Publishing

·       Kaufman, C. (2022). Network security: private communication in a public world, 3rd Edition. Delhi: Prentice Hall PTR.

·       Stinson, D.R., & Paterson M.B. (2018). Cryptography: Theory and Practice, 4th Edition. CRC Press

·       Stallings, W. (2013). Network security essentials: applications and standards, 6th Edition. Delhi: Prentice Hall.

·       Maiwald, E. (2017). Fundamentals of Network Security, 1st Edition. Delhi: McGraw-Hill Technology Education.

 

 

No comments:

Post a Comment