Below are the list of topics included in the notes:
Sec tion
Topic
Page No.
Revision of a part of Data Communication and Networking syllabus prerequisite for Internet Security.
0.1
Three way handshake
2
0.2
Understanding O.S.I. Model at a glance
5
0.3
Differentiate between O.S.I. Protocol suite & T.C.P./I.P. Protocol suite.
6
0.4
Attacks with reference to the OSI model
7
0.5
Node-to-Node, Host-to-Host and Process-to-Process deliveries?
9
0.6
Understanding SSL Layer
10
Position of SSL layer in TCP/IP suit
0.7
TCP Header
11
0.8
What is connection oriented and what is connectionless?
13
0.9
TCP v/s UTP
15
0.1
16
0.11
17
Introduction:
20
1
What are Security Truisms?
21
1.1
Why require a security?
22
1.2
What is a Security Policy
24
1.3
What is a Security Policy - Definition
25
1.4
Picking a Security Policy,
27
1.5
What kind of Security
28
1.6
Distinguish between a Hacker and a cracker
29
1.7
Strategies for a Secure Network,
30
1.8
The Ethics of Computer Security
32
1.9
Security threats and levels
33
1.1
Security Plan (RFC 2196)
34
1.11
What Makes a Good Security Policy?
36
1.12
The components of a good security policy
36
1.13
Deny all/ Allow all
39
1.14
Who Should be Involved When Forming Policy?
40
1.15
Security Incident Handling
41
1.16
Security breach incident: - Containment
45
1.17
Security breach incident: - Eradication
46
1.18
Security Approaches
47
1.19
Principles of Security
48
1.2
Types of attack - Active and passive
49
1.21
The Practical Side of Attacks
51
1.22
Cookies
52
1.23
Specific Attacks: - Sniffing (snooping) Spoofing
53
1.24
Chapter Summery:
55
2
Classes of Attack
60
2.1
Stealing Passwords
61
2.2
Social Engineering.
63
2.3
Bugs and Backdoors
65
2.4
Authentication Failures
67
2.5
Protocol Failures
69
2.6
Information Leakages
70
2.7
Exponential Attacks - Viruses and Worms
71
2.8
Denial-of-Service Attacks
72
2.9
Botnets.
74
2.1
Active Attacks
77
3
Computer Security
85
3.1
What are viruses, Trojan Horse, Worms
86
3.2
Types of Virus
88
3.3
How to protect the computer against virus?
91
3.4
Life stages of Virus
95
3.5
What is the Structure of Viruses?
97
3.6
Components of virus
100
4
Firewalls and Proxy Servers
106
4.1
Kinds of Firewalls
108
4.2
Packet filters
109
4.3
Application-Level Filtering
110
4.4
Circuit-Level Gateways
112
4.5
Dynamic Packet Filters
113
4.6
Distributed Firewalls.
114
4.7
What firewalls cannot Do & Filtering Services
116
4.8
Reasonable Services to Filter
117
4.9
Digging for Worms.
119
4.1
Packet Filtering.
121
4.11
Implementing policies: (Default allow, Default Deny) on proxy
123
5
Cryptography
130
5.1
Introduction to Basic encryption and Decryption,
131
5.2
Diffie Hellman Key Exchange
138
5.3
Concept of Public key and Private key
140
5.4
The concept of Hash (Message Digest)
143
5.4
Digital Signatures
146
5.5
Symmetric Key Cryptography
150
5.6
Asymmetric Key cryptography
152
5.7
Compare & contrast Symmetric Key Cryptography with Asymmetric key cryptography
154
5.8
Pretty Good Privacy (PGP)
156
6
University Exam Paper for previous 5 years
7
Question Bank
8
Model Answers of selected and grouped questions
9
A set of 3 question papers for your Mock test and own assessment
Click to download the documents:
Click the below link to download Question papers. TYBSC IT Sem 5 Question Papers - Mumbai University
About lamsim
Author Description here.. Nulla sagittis convallis. Curabitur consequat. Quisque metus enim, venenatis fermentum, mollis in, porta et, nibh. Duis vulputate elit in elit. Mauris dictum libero id justo.