0% found this document useful (0 votes)
114 views34 pages

CNS - 3350704 Lab Manual-Edited

The document appears to be a lab manual for a course on computer and network security. It contains instructions and objectives for 5 practical lab exercises involving topics like encryption algorithms, security diagrams, intrusion detection systems, and security configurations. The lab manual provides a framework for students to complete hands-on exercises applying concepts from the computer and network security course.

Uploaded by

Talonted Gamer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
114 views34 pages

CNS - 3350704 Lab Manual-Edited

The document appears to be a lab manual for a course on computer and network security. It contains instructions and objectives for 5 practical lab exercises involving topics like encryption algorithms, security diagrams, intrusion detection systems, and security configurations. The lab manual provides a framework for students to complete hands-on exercises applying concepts from the computer and network security course.

Uploaded by

Talonted Gamer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 34

GOVERNMENT POLYTECHNIC - BHUJ

OPP. HILL GARDEN, AIRPORT ROAD, BHUJ-370001


DEPARTMENT OF COMPUTER ENGINEERING

COMPUTER AND NETWORK


SECURITY
LAB MANUAL

Computer and Network Security (3350704)


GOVERNMENT POLYTECHNIC - BHUJ
OPP. HILL GARDEN, AIRPORT ROAD, BHUJ-370001
DEPARTMENT OF COMPUTER ENGINEERING

PRACTICAL LAB MANUAL


ON
COMPUTER AND NETWORK SECURITY
(3350704)
For
SEMSTER- 5

Computer and Network Security (3350704)


GOVERNMENT POLYTECHNIC - BHUJ
OPP. HILL GARDEN, AIRPORT ROAD, BHUJ-370001
DEPARTMENT OF COMPUTER ENGINEERING

This is to certify that


Mr./Miss.
Enrollment no. of 5th Semester Diploma in
Computer Engineering has satisfactorily completed his/her term work
in Computer and Network Security (3350704) in Government
Polytechnic Bhuj during the year

Date of Submission:

Subject Faculty Head of Department

Computer and Network Security (3350704)


Computer Department Government Polytechnic Bhuj

INDEX

SR.
LAB NAME/AIM CO
NO
List and practice various “net” Commands on DOS & Linux.

Draw Diagram of DoS, backdoors (trapdoors)


1 CO1
Draw diagrams of sniffing, spoofing, man-in-the-middle & replay attacks

Draw diagram for Confidentiality, Integrity & Availability

Configure a system for various security experiments


2 CO2
Configure Web browser security settings

Write Caesar Cipher’s algorithm & solve various examples based on Encryption &
Decryption

Write, test and debug Caesar cipher algorithm in C

Write algorithm/steps for Shift Cipher & solve various examples on it

Write algorithm/steps for Hill Cipher and solve examples on it

Write algorithm/steps for Play Fair cipher and solve examples on it

3 Write algorithm/steps for Verman Cipher & solve various examples on it CO3

Write algorithm/steps for Vigenère Cipher & solve various examples on it

Write algorithm/steps for one time pad & solve various examples on in

Draw diagram of Public Key Infrastructure

Draw diagram of Centralized/Decentralized Infrastructure

Draw diagram of cross-scripting

Computer and Network Security (3350704)


Computer Department Government Polytechnic Bhuj

Draw various Security Topologies

Demonstrate traffic analysis of different network protocols using tool


4 CO4
Demonstrate Sniffing using packet tool

Configure your e-mail account against various threats.

Draw diagram Host-based Intrusion Detection System

Draw diagram Network-based Intrusion Detection System


5 CO5
Demonstration of SQL-Injection

Demonstration of readymade encryption/decryption code

Computer and Network Security (3350704)


Computer Department Government Polytechnic Bhuj

GOVERNMENT POLYTECHNIC, BHUJ


COMPUTER DEPARTMENT

RUBRICS FOR LABORATORY PRACTICALS ASSESSMENT

SUBJECT NAME: Computer and Network Security


SUBJECT CODE: 3350704
TERM:

Computer and Network Security (3350704)


Computer Department Government Polytechnic Bhuj

GOVERNMENT POLYTECHNIC, BHUJ


COMPUTER DEPARTMENT

PRACTICALS ASSESSMENT

SUBJECT NAME: Computer and Network Security


SUBJECT CODE: 3350704
TERM:

ENROLL NO.: ____________________________________________


NAME: ____________________________________________________
CLASS/BATCH: __________

PRACTICAL. FACULTY
NO. CO R1 R2 R3 R4 TOTAL DATE SIGN

1 CO1

2 CO2

3 CO3

CO4
4

CO5
5

Computer and Network Security (3350704)


Computer Department Government Polytechnic Bhuj

Practical 1:
(1) List and practice various “net” Commands on DOS & Linux.

Computer and Network Security (3350704)


Computer Department Government Polytechnic Bhuj

Computer and Network Security (3350704)


Computer Department Government Polytechnic Bhuj
(2) Draw Diagram of DoS, backdoors (trapdoors)

Computer and Network Security (3350704)


Computer Department Government Polytechnic Bhuj
(3) Draw diagrams of sniffing, spoofing, man-in-the-middle & replay attacks

Computer and Network Security (3350704)


Computer Department Government Polytechnic Bhuj
(4) Draw diagram for Confidentiality, Integrity & Availability

Computer and Network Security (3350704)


Computer Department Government Polytechnic Bhuj

Practical 2:
(1) Configure a system for various security experiments

Computer and Network Security (3350704)


Computer Department Government Polytechnic Bhuj

(2) Configure Web browser security settings

Computer and Network Security (3350704)


Computer Department Government Polytechnic Bhuj
Practical 3:

(1) Write Caesar Cipher’s algorithm & solve various examples based on Encryption &
Decryption

Computer and Network Security (3350704)


Computer Department Government Polytechnic Bhuj
(2) Write, test and debug Caesar cipher algorithm in C

Computer and Network Security (3350704)


Computer Department Government Polytechnic Bhuj

(3) Write algorithm/steps for Shift Cipher & solve various examples on it

Computer and Network Security (3350704)


Computer Department Government Polytechnic Bhuj
(4) Write algorithm/steps for Hill Cipher and solve examples on it

Computer and Network Security (3350704)


Computer Department Government Polytechnic Bhuj
(5) Write algorithm/steps for Play Fair cipher and solve examples on it

Computer and Network Security (3350704)


Computer Department Government Polytechnic Bhuj
(6) Write algorithm/steps for Verman Cipher & solve various examples on it

Computer and Network Security (3350704)


Computer Department Government Polytechnic Bhuj
(7) Write algorithm/steps for Vigenère Cipher & solve various examples on it

Computer and Network Security (3350704)


Computer Department Government Polytechnic Bhuj

(8) Write algorithm/steps for one time pad & solve various examples on in

Computer and Network Security (3350704)


Computer Department Government Polytechnic Bhuj

(9) Draw diagram of Public Key Infrastructure

Computer and Network Security (3350704)


Computer Department Government Polytechnic Bhuj
(10) Draw diagram of Centralized/Decentralized Infrastructure

Computer and Network Security (3350704)


Computer Department Government Polytechnic Bhuj

(11) Draw diagram of cross-scripting

Computer and Network Security (3350704)


Computer Department Government Polytechnic Bhuj
Practical 4:
(1) Draw various Security Topologies

Computer and Network Security (3350704)


Computer Department Government Polytechnic Bhuj
(2) Demonstrate traffic analysis of different network protocols using tool

Computer and Network Security (3350704)


Computer Department Government Polytechnic Bhuj
(3) Demonstrate Sniffing using packet tool

Computer and Network Security (3350704)


Computer Department Government Polytechnic Bhuj
(4) Configure your e-mail account against various threats

Computer and Network Security (3350704)


Computer Department Government Polytechnic Bhuj
Practical 5:
(1) Draw diagram Host-based Intrusion Detection System

Computer and Network Security (3350704)


Computer Department Government Polytechnic Bhuj

(2) Draw diagram Network-based Intrusion Detection System

Computer and Network Security (3350704)


Computer Department Government Polytechnic Bhuj
(3) Demonstration of SQL-Injection

Computer and Network Security (3350704)


Computer Department Government Polytechnic Bhuj

(4) Demonstration of readymade encryption/decryption code

Computer and Network Security (3350704)


Computer Department Government Polytechnic Bhuj

Computer and Network Security (3350704)

You might also like