21cb1602 - Computer Networks
21cb1602 - Computer Networks
Risk Management: Introduction – Risk Identification - Risk Assessment – Risk Control Strategies – Selecting
a Risk control strategy - Information Security Policy, Standards and Practices – The Information Security
blueprint..
Unit IV SECURITY TECHNOLOGY No. of Hours : 9
Introduction ; Access Control : Identification, Authentication, Authorization, Accountability; Firewalls :
Firewall Processing Modes, Firewalls Categorized by Generation, Firewalls Categorized by Structure,
Firewall Architectures, Selecting the Right Firewall, Configuring and Managing Firewalls, Content Filters;
Protecting Remote Connections : Remote Access, Virtual Private Networks (VPNs).
Intrusion Detection and Prevention Systems : IDPS Terminology, Why Use an IDPS? , Types of IDPS ,
IDPS Detection Methods , IDPS Response Behavior, Selecting IDPS Approaches and Products, Strengths
and Limitations of IDPSs, Deployment and Implementation of an IDPS, Measuring the Effectiveness of
IDPSs; Honeypots, Honeynets, and Padded Cell Systems : Trap-and-Trace Systems , Active Intrusion
Prevention.
Total Hours : 45
Text Books
1. Michael E Whitman and Herbert J Mattord, “Principles of Information Security”, Vikas Publishing
House, New Delhi, Fourth Edition, 2012.
2. William Stallings, Cryptography and Network Security: Principles and Practice, PHI 6th Edition, 2014.
Reference Books
1. Christo Paar and Jan Pelzl, “Understanding Cryptography: A Textbook for Students and
Practitioners”, First Edition, Springer, 2010
2. Douglas R. Stinson,” Cryptography: Theory and Practice”, Third Edition, by, CRC Press, Taylor and
Francis Group (Indian Edition),2006
3. MarjieT.Britz, “Computer Forensics and Cyber Crime”: An Introduction”, 3 rd Edition, Prentice
Hall, 2013.
Web references
1. https://www.simplilearn.com/what-is-des-article/
2. https://www.techtarget.com/searchsecurity/definition/Advanced-Encryption-Standard
3. https://www.geeksforgeeks.org/implementation-diffie-hellman-algorithm/
4. https://www.checkpoint.com/cyber-hub/network-security/what-is-firewall/
Online Courses / Resources:
Text Book
Online Resources:
S.No. Name of the topic Web link of the resource Justification
1.
2.
Course Instructor Course Co-ordinator Department Advisory Committee Head of the Department