Network Security and Cyber Laws

Details of the course ↓

Unit No.

CONTENT

1

Introduction to Network security ⇗

  • Introduction to Network Security, Goals of Network Security, ISO security Architecture: Attacks, Categories of Attacks, Network Security Services & Mechanisms. Authentication Applications: Kerberos, X.509 Directory Authentication Service.

2

Security in Network Protocols ⇗

  • Application Layer Security: Security threats and countermeasures SET protocol, Electronic Mail Security, Pretty Good Privacy (PGP), S / Mime.
  • Transport Layer Security: Secure Socket Layer & Transport Layer Security, Wireless Transport layer security.

3

Unit 3 ⇗

  • IP Security: Authentication Header, Encapsulating Security Payloads.
  • System Security: Intruders, Intrusion Detection System, Viruses, Firewall Design Principles, Trusted Systems, OS Security, Program Security.

4

Unit 4 ⇗

  • Introduction to Cyber Law: Cyber, Cyber Crime, Cyber criminals, Cyber Law.
  • Object and Scope of the IT Act: Genesis, Object, Scope of the Act, E-Governance and IT Act 2000, Legal recognition of electronic records, Legal recognition of digital signature, Use of electronic records and digital Signatures in Government and its agencies. IT Act in detail.
  • Basics of Network Security: IP Addresses, Port numbers and sockets, Hiding and Tracing IP Addresses. Scanning: Traceroute, Ping sweeping, Port Scanning, ICMP scanning, Fingerprinting: active and passive email.

5

Unit 5 ⇗

  • Different kinds of buffer overflow attacks: Stack overflows, string overflows, Heap and Integer overflows.
  • Internal Attacks: Emails, Mobile Phones, Instant Messengers, FTP Uploads, Dumpster Diving, Shoulder Surfing.
  • DOS Attacks: Ping of Death, Teardrop, SYN flooding, Land Attacks, Smurf Attacks, UDP flooding, Hybrid DOS Attacks, Application Specific, Distributed Dos Attacks.