-Network and Information Security
-Network and Information Security
I. RATIONALE
Network information security is to protect sensitive data and systems within a network from unauthorized
access, modification, or disruption by implementing security measures. Students learn confidentiality, integrity,
and availability of information, ensuring the smooth operation of critical business functions and minimizing
potential damage from cyber threats and also able to implement various computer security policies.
1. FA-TH represents average of two class tests of 30 marks each conducted during the semester.
2. If candidate is not securing minimum passing marks in FA-PR of any course then the candidate shall be
declared as "Detained" in that semester.
3. If candidate is not securing minimum passing marks in SLA of any course then the candidate shall be
declared as fail and will have to repeat and resubmit SLA work.
4. Notional Learning hours for the semester are (CL+LL+TL+SL)hrs.* 15 Weeks
5. 1 credit is equivalent to 30 Notional hrs.
6. * Self learning hours shall not be reflected in the Time Table.
7. * Self learning includes micro project / assignment / other activities.
VII. SUGGESTED MICRO PROJECT / ASSIGNMENT/ ACTIVITIES FOR SPECIFIC LEARNING / SKILLS
DEVELOPMENT (SELF LEARNING)
Assignment
Explain the role of digital signatures in verifying authenticity and integrity in a communication system.
Describe the working of the RSA encryption algorithm showing generation of public and private key.
Illustrate the use of cryptography in securing email communication.
Encrypt the message "HELLO" using a Caesar Cipher with a shift of 3.
Describe algorithms for symmetric and asymmetric cryptography.
Explain the difference between active and passive security attacks. Provide examples of each.
Compare and contrast DAC, MAC, and RBAC in terms of security, flexibility, and ease of use.
Teachers shall give assignments covering all COs.
Micro project
Implement communication system using steganography. Encrypt audio file and message using any
cryptography technique.
Implement communication system using steganography. Encrypt image and message using any cryptography
technique.
Implement Client/Server communication using cryptography tools in laboratory.
User A wants to send message to user B securely on network.
i. Select any two techniques to encrypt message.
ii. Implement both the techniques.
iii. Evaluate result of implementation.
iv. Compare complexity of both techniques.
v. Prepare report.
Prepare admin level report of company who wants to implement allocate fixed system to each employee for
authentic access to maintain security.
i. Explain various single level authentication method available to access the system.
MSBTE Approval Dt. Semester - 6, K Scheme
23-04-2025 06:59:02 PM
Other
Complete any course related to Network and Information Security on Infosys Springboard, NPTEL.
Note :
Above is just a suggestive list of microprojects and assignments; faculty must prepare their own bank of
microprojects, assignments, and activities in a similar way.
The faculty must allocate judicial mix of tasks, considering the weaknesses and / strengths of the student in
acquiring the desired skills.
If a microproject is assigned, it is expected to be completed as a group activity.
SLA marks shall be awarded as per the continuous assessment record.
For courses with no SLA component the list of suggestive microprojects / assignments/ activities are
optional, faculty may encourage students to perform these tasks for enhanced learning experiences.
If the course does not have associated SLA component, above suggestive listings is applicable to Tutorials
and maybe considered for FA-PR evaluations.
IX. SUGGESTED WEIGHTAGE TO LEARNING EFFORTS & ASSESSMENT PURPOSE (Specification Table)
Aligned Learning R- U- A- Total
Sr.No Unit Unit Title
COs Hours Level Level Level Marks
Introduction to Computer and
1 I CO1 8 4 6 2 12
Information Security
2 II User Authentication and Access Control CO2 8 4 4 4 12
3 III Cryptography CO3 10 2 6 6 14
4 IV Firewall and Encryption Algorithms CO4 9 2 4 10 16
5 V Network and Database Security CO5 10 4 8 4 16
Grand Total 45 16 28 26 70
X. ASSESSMENT METHODOLOGIES/TOOLS
Continuous assessment based on process and product related performance indicators Each practical will be
assessed considering
60% weightage to process
40% weightage to product
A continuous assessment based on term work
Teachers are requested to check the creative common license status/financial implications of the suggested
online educational resources before use by the students