Below are the list of topics included in the notes:| Sec tion | Topic | Page No. |
| Revision of a part of Data Communication and Networking syllabus prerequisite for Internet Security. |
| | 0.1 | Three way handshake | 2 | | 0.2 | Understanding O.S.I. Model at a glance | 5 | | 0.3 | Differentiate between O.S.I. Protocol suite & T.C.P./I.P. Protocol suite. | 6 | | 0.4 | Attacks with reference to the OSI model | 7 | | 0.5 | Node-to-Node, Host-to-Host and Process-to-Process deliveries? | 9 | | 0.6 | Understanding SSL Layer | 10 |
| Position of SSL layer in TCP/IP suit |
| | 0.7 | TCP Header | 11 | | 0.8 | What is connection oriented and what is connectionless? | 13 | | 0.9 | TCP v/s UTP | 15 | | 0.1 |
| 16 | | 0.11 |
| 17 |
| Introduction: | 20 | | 1 | What are Security Truisms? | 21 | | 1.1 | Why require a security? | 22 | | 1.2 | What is a Security Policy | 24 | | 1.3 | What is a Security Policy - Definition | 25 | | 1.4 | Picking a Security Policy, | 27 |
|
|
|
| | 1.5 | What kind of Security | 28 | | 1.6 | Distinguish between a Hacker and a cracker | 29 | | 1.7 | Strategies for a Secure Network, | 30 | | 1.8 | The Ethics of Computer Security | 32 | | 1.9 | Security threats and levels | 33 | | 1.1 | Security Plan (RFC 2196) | 34 | | 1.11 | What Makes a Good Security Policy? | 36 | | 1.12 | The components of a good security policy | 36 | | 1.13 | Deny all/ Allow all | 39 | | 1.14 | Who Should be Involved When Forming Policy? | 40 | | 1.15 | Security Incident Handling | 41 | | 1.16 | Security breach incident: - Containment | 45 | | 1.17 | Security breach incident: - Eradication | 46 | | 1.18 | Security Approaches | 47 | | 1.19 | Principles of Security | 48 | | 1.2 | Types of attack - Active and passive | 49 | | 1.21 | The Practical Side of Attacks | 51 | | 1.22 | Cookies | 52 | | 1.23 | Specific Attacks: - Sniffing (snooping) Spoofing | 53 | | 1.24 | Chapter Summery: | 55 |
|
|
|
| | 2 | Classes of Attack | 60 | | 2.1 | Stealing Passwords | 61 | | 2.2 | Social Engineering. | 63 | | 2.3 | Bugs and Backdoors | 65 | | 2.4 | Authentication Failures | 67 | | 2.5 | Protocol Failures | 69 | | 2.6 | Information Leakages | 70 | | 2.7 | Exponential Attacks - Viruses and Worms | 71 | | 2.8 | Denial-of-Service Attacks | 72 | | 2.9 | Botnets. | 74 | | 2.1 | Active Attacks | 77 | | 3 | Computer Security | 85 | | 3.1 | What are viruses, Trojan Horse, Worms | 86 | | 3.2 | Types of Virus | 88 | | 3.3 | How to protect the computer against virus? | 91 | | 3.4 | Life stages of Virus | 95 | | 3.5 | What is the Structure of Viruses? | 97 | | 3.6 | Components of virus | 100 | | 4 | Firewalls and Proxy Servers | 106 |
|
| 4.1 | Kinds of Firewalls |
|
|
|
|
| 108 | | 4.2 | Packet filters |
|
|
|
|
| 109 | | 4.3 | Application-Level Filtering |
|
|
|
|
| 110 | | 4.4 | Circuit-Level Gateways |
|
|
|
|
| 112 | | 4.5 | Dynamic Packet Filters |
|
|
|
|
| 113 | | 4.6 | Distributed Firewalls. |
|
|
|
|
| 114 | | 4.7 | What firewalls cannot Do & Filtering Services |
|
|
|
|
| 116 | | 4.8 | Reasonable Services to Filter |
|
|
|
|
| 117 | | 4.9 | Digging for Worms. |
|
|
|
|
| 119 | | 4.1 | Packet Filtering. |
|
|
|
|
| 121 | | 4.11 | Implementing policies: (Default allow, Default Deny) on proxy |
|
|
|
|
| 123 | | 5 | Cryptography |
|
|
|
|
| 130 | | 5.1 | Introduction to Basic encryption and Decryption, |
|
|
|
|
| 131 | | 5.2 | Diffie Hellman Key Exchange |
|
|
|
|
| 138 | | 5.3 | Concept of Public key and Private key |
|
|
|
|
| 140 | | 5.4 | The concept of Hash (Message Digest) |
|
|
|
|
| 143 | | 5.4 | Digital Signatures |
|
|
|
|
| 146 | | 5.5 | Symmetric Key Cryptography |
|
|
|
|
| 150 | | 5.6 | Asymmetric Key cryptography |
|
|
|
|
| 152 | | 5.7 | Compare & contrast Symmetric Key Cryptography with Asymmetric key cryptography |
|
|
|
|
| 154 |
|
5.8
| Pretty Good Privacy (PGP) |
|
|
|
|
| 156 | | 6 | University Exam Paper for previous 5 years |
|
|
|
|
|
| | 7 | Question Bank |
|
|
|
|
|
| | 8 | Model Answers of selected and grouped questions |
|
|
|
|
|
| | 9 | A set of 3 question papers for your Mock test and own assessment |
|
|
|
|
|
|
|
Click to download the documents:Click the below link to download Question papers.
TYBSC IT Sem 5 Question Papers - Mumbai University