0% found this document useful (0 votes)
6 views

-Network and Information Security

The document outlines a course on Network and Information Security, detailing its rationale, expected outcomes, and learning objectives for students in various computer-related programs. It includes a comprehensive teaching-learning and assessment scheme, along with specific theory and practical learning outcomes related to cybersecurity concepts such as encryption, access control, and data protection. Additionally, it provides guidelines for laboratory experiments and self-learning activities to enhance students' understanding and skills in information security.

Uploaded by

ngwani2007
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

-Network and Information Security

The document outlines a course on Network and Information Security, detailing its rationale, expected outcomes, and learning objectives for students in various computer-related programs. It includes a comprehensive teaching-learning and assessment scheme, along with specific theory and practical learning outcomes related to cybersecurity concepts such as encryption, access control, and data protection. Additionally, it provides guidelines for laboratory experiments and self-learning activities to enhance students' understanding and skills in information security.

Uploaded by

ngwani2007
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

23-04-2025 06:59:02 PM

NETWORK AND INFORMATION SECURITY Course Code :


: Cloud Computing and Big Data/ Computer Technology/ Computer Engineering/
Programme Name/s Computer Science & Engineering/
Computer Hardware & Maintenance/ Computer Science
Programme Code : BD/ CM/ CO/ CW/ HA/ SE
Semester : Sixth
Course Title : NETWORK AND INFORMATION SECURITY
Course Code :

I. RATIONALE
Network information security is to protect sensitive data and systems within a network from unauthorized
access, modification, or disruption by implementing security measures. Students learn confidentiality, integrity,
and availability of information, ensuring the smooth operation of critical business functions and minimizing
potential damage from cyber threats and also able to implement various computer security policies.

II. INDUSTRY / EMPLOYER EXPECTED OUTCOME


The aim of this course is to help the students to attain the following Industry Identified Outcomes through
various teaching learning experiences: Implement policies and guidelines to maintain data security and privacy
during data transmission.

III. COURSE LEVEL LEARNING OUTCOMES (COS)


Students will be able to achieve & demonstrate the following COs on completion of course based learning

CO1 - Identify types of Cyber attacks and threats.


CO2 - Apply multi-factor user authentication and access control.
CO3 - Implement encryption/decryption techniques.
CO4 - Use tools and techniques to prevent cyber attacks.
CO5 - Apply security on Network and Database.

IV. TEACHING-LEARNING & ASSESSMENT SCHEME


Learning Scheme Assessment Scheme
Actual
Contact Based on LL & TL Based
Theory
Course Course Hrs./Week on SL
Course Title Abbr Credits Paper Total
Code Category/s SLH NLH Practical
Duration Marks
FA- SA-
CL TL LL Total FA-PR SA-PR SLA
TH TH
Max Max Max Min Max Min Max Min Max Min
NETWORK AND
INFORMATION NIS DSE 3 - 2 1 6 3 3 30 70 100 40 25 10 25# 10 25 10 175
SECURITY

MSBTE Approval Dt. Semester - 6, K Scheme


23-04-2025 06:59:02 PM

NETWORK AND INFORMATION SECURITY Course Code :


Total IKS Hrs for Sem. : 0 Hrs
Abbreviations: CL- ClassRoom Learning , TL- Tutorial Learning, LL-Laboratory Learning, SLH-Self Learning
Hours, NLH-Notional Learning Hours, FA - Formative Assessment, SA -Summative assessment, IKS - Indian
Knowledge System, SLA - Self Learning Assessment
Legends: @ Internal Assessment, # External Assessment, *# On Line Examination , @$ Internal Online
Examination
Note :

1. FA-TH represents average of two class tests of 30 marks each conducted during the semester.
2. If candidate is not securing minimum passing marks in FA-PR of any course then the candidate shall be
declared as "Detained" in that semester.
3. If candidate is not securing minimum passing marks in SLA of any course then the candidate shall be
declared as fail and will have to repeat and resubmit SLA work.
4. Notional Learning hours for the semester are (CL+LL+TL+SL)hrs.* 15 Weeks
5. 1 credit is equivalent to 30 Notional hrs.
6. * Self learning hours shall not be reflected in the Time Table.
7. * Self learning includes micro project / assignment / other activities.

V. THEORY LEARNING OUTCOMES AND ALIGNED COURSE CONTENT


Theory Learning Suggested
Learning content mapped with Theory Learning
Sr.No Outcomes Learning
Outcomes (TLO's) and CO's.
(TLO's)aligned to CO's. Pedagogies.
Unit - I Introduction to Computer and Information
Security
TLO 1.1 Explain the need
1.1 Foundations of computer security: Definition and Need
of information security.
of Computer Security, Security Basics: Confidentiality,
TLO 1.2 State criteria for
Integrity, Availability, Accountability, Authentication, Non
information
- repudiation and Reliability
classification.
1.2 Information Security Overview: Introduction to
TLO 1.3 Identify various
information, need and importance of information
types of attacks.
security, Information classification, Criteria for
TLO 1.4 Enlist types of Lecture Using
information classification
1 Malware. Chalk-Board
1.3 Type of Attacks: Active and Passive attacks,
TLO 1.5 Explain Presentations
Masquerade Attack, Denial of Service, Backdoors and
importance of Operating
Trapdoors, Sniffing, phishing, Spoofing, Man in the
system updates.
Middle, Replay, TCP/IP Hacking, Social Engineering
TLO 1.6 Establish
1.4 Types of Malwares: Virus, Worms, Trojan horse,
relationship between
Spyware, Adware, Ransom ware, Logic Bombs, Rootkits,
threat, vulnerability,
Key loggers
risks with suitable
1.5 Operating system updates: HotFix, Patch, Service Pack
example.
1.6 Threat to security: Introduction to assets, vulnerability,
threats, risks, relation between threat, vulnerability, risks

MSBTE Approval Dt. Semester - 6, K Scheme


23-04-2025 06:59:02 PM

NETWORK AND INFORMATION SECURITY Course Code :


Theory Learning Suggested
Learning content mapped with Theory Learning
Sr.No Outcomes Learning
Outcomes (TLO's) and CO's.
(TLO's)aligned to CO's. Pedagogies.
Unit - II User Authentication and Access Control
TLO 2.1 Apply different 2.1 Identification and Authentication methods: Electronic
types of authentication user authentication, user name and password, multi-
methods. factor authentication, token-based authentic
TLO 2.2 Apply various 2.2 Password attacks: Guessing password, Piggybacking,
methods to prevent Shoulder surfing, Dumpster diving
Lecture Using
password from attacks. 2.3 Biometrics: Finger prints, Hand prints, Retina scan
Chalk-Board
TLO 2.3 Illustrate the patterns, Voice patterns, Face recognition, Signature and
2 Presentations
given biometric patterns. Writing patterns, Keystrokes
Video
TLO 2.4 Explain the 2.4 Authorization: Introduction to authorization, goals of
Demonstrations
purpose of authorization. authorization
TLO 2.5 Compare DAC, 2.5 Access controls: Definition, Authentication mechanism,
MAC, RBAC and ABAC on Access control principles, Access rights and permission
the basis of given Access control policies: Discretionary access control (DAC),
parameters. Mandatory access control (MAC), Role-based access
control(RBAC),Attribute-based access control (ABAC)
TLO 3.1 Explain the
process of encryption
and decryption.
TLO 3.2 Compare
Unit - III Cryptography
symmetric and
3.1 Introduction: Plain text, Cipher text, Cryptography,
asymmetric
Cryptanalysis, Cryptology, Encryption, Decryption
cryptography on the
3.2 Symmetric and Asymmetric cryptography : Lecture Using
basis of given
Introduction, working, key management, asymmetric Chalk-Board
parameters.
3 cryptography -public key distribution Presentations
TLO 3.3 Use the
3.3 Substitution techniques : Caesar cipher, Play fair Video
substitution techniques
cipher, Vigenere cipher, Vernam cipher(One-timepad) Demonstrations
on given text.
3.4 Transposition techniques: Railfence technique, Simple
TLO 3.4 Apply the
columnar technique
transposition techniques
3.5 Steganography: Overview of steganography
on given text.
TLO 3.5 Explain the
concept of
steganography.
TLO 4.1 Differentiate
between hardware and Unit - IV Firewall and Encryption Algorithms
software firewalls. 4.1 Firewall: Need of firewall, Types of firewalls: Packet
TLO 4.2 Explain various filters, Stateful packet filters, Application gateways, Circuit
firewall policies. gateways
TLO 4.3 Compare DES, 4.2 Firewall policies, Configuration, Limitations,
Lecture Using
AES and RSA algorithms Demilitarized zone (DMZ)
Chalk-Board
with the given 4.3 DES (Data Encryption Standard) algorithm, AES
Presentations
parameters. (Advanced Encryption Standard) algorithm, RSA (Rivest-
4 Video
TLO 4.4 Apply Diffie- Shamir-Adleman) algorithm
Demonstrations
Hellman key exchange 4.4 Diffie-Hellman key exchange algorithm, Man-in-
Flipped
algorithm on the given middle attack
Classroom
text. 4.5 Hash Function: Introduction, Features of Hash
TLO 4.5 Calculate hash Functions, MD5 (Message Digest Method 5) and
value for given text using SHA(secure hashing algorithm) algorithm
hash function algorithm. 4.6 Digital Signature: Introduction and working of digital
TLO 4.6 Explain working signature, Digital Certificate
of Digital Signature.

MSBTE Approval Dt. Semester - 6, K Scheme


23-04-2025 06:59:02 PM

NETWORK AND INFORMATION SECURITY Course Code :


Theory Learning Suggested
Learning content mapped with Theory Learning
Sr.No Outcomes Learning
Outcomes (TLO's) and CO's.
(TLO's)aligned to CO's. Pedagogies.
Unit - V Network and Database Security
TLO 5.1 Compare 5.1 Intrusion Detection System(IDS):Network-based IDS,
Network Based and Host- Host-based IDS, Honeypots
Based IDS. 5.2 Kerberos: Working, Authentication Server (AS), Ticket
TLO 5.2 Use Kerberos Granting Service (TGS), Service Server (SS), IP Security:
and IP Security Protocols Overview, Authentication Header (AH), Encapsulating Lecture Using
on network security. Security Payload (ESP) protocols, Transport and tunnel Chalk-Board
5 TLO 5.3 Explain given modes Presentations
protocol used for E-mail 5.3 E-mail security: Simple mail transfer protocol (SMTP), Video
security. Pretty good privacy (PGP), Secure/Multipurpose Internet Demonstrations
TLO 5.4 Explain need of Mail Extensions (S/MIME), Privacy Enhance Mail (PEM)
database security. 5.4 Database Security: Need for database security, SQL
TLO 5.5 Explain cloud injection attack, database encryption
security. 5.5 Cloud security: Essential characteristics, service model,
deployment model, cloud specific security threats

VI. LABORATORY LEARNING OUTCOME AND ALIGNED PRACTICAL / TUTORIAL EXPERIENCES.


Practical / Tutorial /
Sr Laboratory Experiment / Practical Titles / Tutorial Number Relevant
Laboratory Learning
No Titles of hrs. COs
Outcome (LLO)
LLO 1.1 Install Antivirus
* i.Install and configure Antivirus software on system
software on system.
(Licensed copy)
LLO 1.2 Apply privacy and 1 2 CO1
security settings to protect
ii. Use privacy and security settings on operating system
operating system.
i. Set up single level authentication for computer system
LLO 2.1 Setup and recover
ii. Recover the password of computer system using any
password of computer 2 2 CO2
freeware password recovery tool (Example- John the
system.
ripper)
LLO 3.1 Grant read, write * i. Grant security to file, folder or application using
and execute permission on 3 access permissions and verify it 2 CO2
file and folder. ii. Grant access permission while sharing file and folder
* Write a utility using C/Shell programming to create
LLO 4.1 Implement strong password authentication (Password should be
4 2 CO2
password authentication. more than 8 characters, and combination of digits,
letters and special characters #, %, &, @)
* i. Write a C program to implement caesar cipher
LLO 5.1 Implement caesar technique to perform encryption and decryption of text
cipher encryption 5 ii. Apply Caesar cipher technique to perform encryption 2 CO3
technique. and decryption of text using any open-source tool
(Example - Cryptool)
i. Implement Vernam cipher encryption technique to
perform encryption of text using C programming
LLO 6.1 Implement Vernam
language
cipher encryption 6 2 CO3
ii. Apply Vernam cipher technique to perform
technique.
encryption and decryption of text using any open-
source tool (Example - Cryptool)
LLO 7.1 Implement
Implement railfence encryption technique to perform
railfence encryption 7 2 CO3
encryption of text using C programming language
technique.
LLO 8.1 Implement simple Implement simple Columnar Transposition encryption
columnar transposition 8 technique to perform encryption of text using C 2 CO3
technique. programming language
MSBTE Approval Dt. Semester - 6, K Scheme
23-04-2025 06:59:02 PM

NETWORK AND INFORMATION SECURITY Course Code :


Practical / Tutorial /
Sr Laboratory Experiment / Practical Titles / Tutorial Number Relevant
Laboratory Learning
No Titles of hrs. COs
Outcome (LLO)
LLO 9.1 Generate Hash * Create and verify Hash Code for given message using
9 2 CO3
Code. any Open-source tool (Example-Cryptool)
i. Write a C program to implement Diffie-Hellman key
LLO 10.1 Implement Diffie- exchange algorithm to perform encryption of text
Hellman key exchange 10 ii. Use Diffie-Hellman key exchange algorithm to 2 CO4
encryption technique. perform encryption and decryption of text using any
open-source tool (Example - Cryptool)
LLO 11.1 Implement * Use Steganography to encode and decode the message
11 2 CO4
steganography. using any open-source tool (Example-OpenStego)
LLO 12.1 Generate digital * Create and verify digital signature using any Open-
12 2 CO4
signature. source tool (Example-Cryptool)
LLO 13.1 Generate digital Create and verify digital Certificate using any Open-
13 2 CO4
Certificate. source tool (Example-Cryptool)
LLO 14.1 Configure firewall. 14 Configure firewall settings on any operating system 2 CO4
LLO 15.1 Implement email * Send a test mail securely using any open-source tool
15 2 CO5
security. (Example- Pretty Good Privacy with GnuPG)
LLO 16.1 Use of email
16 Find the origin of email using email tracker pro 2 CO5
tracker pro.
Note : Out of above suggestive LLOs -
'*' Marked Practicals (LLOs) Are mandatory.
Minimum 80% of above list of lab experiment are to be performed.
Judicial mix of LLOs are to be performed to achieve desired outcomes.

VII. SUGGESTED MICRO PROJECT / ASSIGNMENT/ ACTIVITIES FOR SPECIFIC LEARNING / SKILLS
DEVELOPMENT (SELF LEARNING)

Assignment

Explain the role of digital signatures in verifying authenticity and integrity in a communication system.
Describe the working of the RSA encryption algorithm showing generation of public and private key.
Illustrate the use of cryptography in securing email communication.
Encrypt the message "HELLO" using a Caesar Cipher with a shift of 3.
Describe algorithms for symmetric and asymmetric cryptography.
Explain the difference between active and passive security attacks. Provide examples of each.
Compare and contrast DAC, MAC, and RBAC in terms of security, flexibility, and ease of use.
Teachers shall give assignments covering all COs.

Micro project

Implement communication system using steganography. Encrypt audio file and message using any
cryptography technique.
Implement communication system using steganography. Encrypt image and message using any cryptography
technique.
Implement Client/Server communication using cryptography tools in laboratory.
User A wants to send message to user B securely on network.
i. Select any two techniques to encrypt message.
ii. Implement both the techniques.
iii. Evaluate result of implementation.
iv. Compare complexity of both techniques.
v. Prepare report.
Prepare admin level report of company who wants to implement allocate fixed system to each employee for
authentic access to maintain security.
i. Explain various single level authentication method available to access the system.
MSBTE Approval Dt. Semester - 6, K Scheme
23-04-2025 06:59:02 PM

NETWORK AND INFORMATION SECURITY Course Code :


ii. Apply the weakness and security threats to this problem.
iii. Suggest multi factor authentication for given problem situation.
iv. Compare impact of single and multi-factor authentication on given situation.
Create Digital Certificate for your department/personal communication.

Other

Complete any course related to Network and Information Security on Infosys Springboard, NPTEL.

Note :

Above is just a suggestive list of microprojects and assignments; faculty must prepare their own bank of
microprojects, assignments, and activities in a similar way.
The faculty must allocate judicial mix of tasks, considering the weaknesses and / strengths of the student in
acquiring the desired skills.
If a microproject is assigned, it is expected to be completed as a group activity.
SLA marks shall be awarded as per the continuous assessment record.
For courses with no SLA component the list of suggestive microprojects / assignments/ activities are
optional, faculty may encourage students to perform these tasks for enhanced learning experiences.
If the course does not have associated SLA component, above suggestive listings is applicable to Tutorials
and maybe considered for FA-PR evaluations.

VIII. LABORATORY EQUIPMENT / INSTRUMENTS / TOOLS / SOFTWARE REQUIRED


Sr.No Equipment Name with Broad Specifications Relevant LLO Number
1 Steganography Tools (Open-source tool) 11
2 E-mail Security Tool (Open-source tool) 15
3 Any freeware password recovery tool 2
4 Any compiler (TurboC/Online 'C' compiler) 4,5,6,7,8,10
5 Encryption and decryption tool (Open-source tool: Cryptool) 5,6,7,8,9,10,12,13
6 Antivirus software (Licensed copy) All
7 Computer System (Any computer system with basic configuration) All

IX. SUGGESTED WEIGHTAGE TO LEARNING EFFORTS & ASSESSMENT PURPOSE (Specification Table)
Aligned Learning R- U- A- Total
Sr.No Unit Unit Title
COs Hours Level Level Level Marks
Introduction to Computer and
1 I CO1 8 4 6 2 12
Information Security
2 II User Authentication and Access Control CO2 8 4 4 4 12
3 III Cryptography CO3 10 2 6 6 14
4 IV Firewall and Encryption Algorithms CO4 9 2 4 10 16
5 V Network and Database Security CO5 10 4 8 4 16
Grand Total 45 16 28 26 70

X. ASSESSMENT METHODOLOGIES/TOOLS

Formative assessment (Assessment for Learning)

Continuous assessment based on process and product related performance indicators Each practical will be
assessed considering
60% weightage to process
40% weightage to product
A continuous assessment based on term work

Summative Assessment (Assessment of Learning)

MSBTE Approval Dt. Semester - 6, K Scheme


23-04-2025 06:59:02 PM

NETWORK AND INFORMATION SECURITY Course Code :


End semester examination, Lab performance, Viva voce.

XI. SUGGESTED COS - POS MATRIX FORM


Programme
Specific
Programme Outcomes (POs)
Outcomes*
(PSOs)
Course PO-5
Outcomes PO-1 Basic Engineering
(COs) and PO-2 PO-3 Design/ PO-4 Practices for PO-7 Life
PO-6 Project PSO- PSO- PSO-
Discipline Problem Development Engineering Society, Long
Management 1 2 3
Specific Analysis of Solutions Tools Sustainability Learning
Knowledge and
Environment
CO1 2 - - - - 1 2
CO2 2 1 1 1 2 2 2
CO3 2 2 2 2 2 1 2
CO4 2 2 2 2 2 1 2
CO5 2 1 1 2 2 1 3
Legends :- High:03, Medium:02,Low:01, No Mapping: -
*PSOs are to be formulated at institute level

XII. SUGGESTED LEARNING MATERIALS / BOOKS


Sr.No Author Title Publisher with ISBN Number
William Stallings, Computer Security Principles and
1 Pearson. ISBN-13: 978-0-13-377392-7
Lawrie Brown Practice, Third Edition
Cryptography and Network security McGraw-Hill; Fourth edition ISBN-
2 Atul Kahate
Third Edition 13:978- 9353163303
Mark Merkow,Jim Information Security Principles and
3 Pearson. ISBN 978-81-317-1288-7
Breithaupt Practices
Prentice Hall India ISBN:978-81-203-
4 V. K. Pachghare Cryptography and Information Security
5082-3
Wiley publication, New Delhi, ISBN:
5 Dieter Gollmann Computer Security
978-0-470-74115-3

XIII . LEARNING WEBSITES & PORTALS


Sr.No Link / Portal Description
Simulation of Intrusion Detection
1 https://www.youtube.com/watch?v=NlpnJE0m-NU
System in MANET using NetSim
NPTEL course on Introduction to
2 https://archive.nptel.ac.in/courses/106/106/106106129/
Information Security
Swayam course onI nformation
3 https://onlinecourses.swayam2.ac.in/cec22_cs15/preview
Technology
4 https://www.youtube.com/watch?v=T9c5ZpT2FV0 Firewall configuration
5 https://cse29-iiith.vlabs.ac.in/List%20of%20experiments.html Virtual lab for cryptography
https://www.geeksforgeeks.org/active-and-passive-attacks-in-
6 Types of Attacks
information-security/
7 https://brightsec.com/blog/sql-injection-attack/ SQL injection
Note :

Teachers are requested to check the creative common license status/financial implications of the suggested
online educational resources before use by the students

MSBTE Approval Dt. Semester - 6, K Scheme


23-04-2025 06:59:02 PM

NETWORK AND INFORMATION SECURITY Course Code :

MSBTE Approval Dt. Semester - 6, K Scheme

You might also like