Below are the list of topics included in the notes:Sec tion | Topic | Page No. |
| Revision of a part of “Data Communication and Networking” syllabus prerequisite for “Internet Security.” |
| 0.1 | Three way handshake | 2 | 0.2 | Understanding O.S.I. Model at a glance | 5 | 0.3 | Differentiate between O.S.I. Protocol suite & T.C.P./I.P. Protocol suite. | 6 | 0.4 | Attacks with reference to the OSI model | 7 | 0.5 | Node-to-Node, Host-to-Host and Process-to-Process deliveries? | 9 | 0.6 | Understanding SSL Layer | 10 |
| Position of SSL layer in TCP/IP suit |
| 0.7 | TCP Header | 11 | 0.8 | What is connection oriented and what is connectionless? | 13 | 0.9 | TCP v/s UTP | 15 | 0.1 |
| 16 | 0.11 |
| 17 |
| Introduction: | 20 | 1 | What are Security Truisms? | 21 | 1.1 | Why require a security? | 22 | 1.2 | What is a Security Policy | 24 | 1.3 | What is a Security Policy - Definition | 25 | 1.4 | Picking a Security Policy, |
|
class="s13">27
|
|
|
1.5 | What kind of Security | 28 |
1.6 | Distinguish between a Hacker and a cracker | 29 |
1.7 | Strategies for a Secure Network, | 30 |
1.8 | The Ethics of Computer Security | 32 |
1.9 | Security threats and levels | 33 |
1.1 | Security Plan (RFC 2196) | 34 |
1.11 | What Makes a Good Security Policy? | 36 |
1.12 | The components of a good security policy | 36 |
1.13 | Deny all/ Allow all | 39 |
1.14 | Who Should be Involved When Forming Policy? | 40 |
1.15 | Security Incident Handling | 41 |
1.16 | Security breach incident: - Containment | 45 |
1.17 | Security breach incident: - Eradication | 46 |
1.18 | Security Approaches | 47 |
1.19 | Principles of Security | 48 |
1.2 | Types of attack - Active and passive | 49 |
1.21 | The Practical Side of Attacks | 51 |
1.22 | Cookies | 52 |
1.23 | Specific Attacks: - Sniffing (snooping) Spoofing | 53 |
1.24 | Chapter Summery: | 55 |
|
|
|
2 | Classes of Attack | 60 |
2.1 | Stealing Passwords | 61 |
2.2 | Social Engineering. | 63 |
2.3 | Bugs and Backdoors | 65 |
2.4 | Authentication Failures | 67 |
2.5 | Protocol Failures | 69 |
2.6 | Information Leakages | 70 |
2.7 | Exponential Attacks - Viruses and Worms | 71 |
2.8 | Denial-of-Service Attacks | 72 |
2.9 | Botnets. | 74 |
2.1 | Active Attacks | 77 |
3 | Computer Security | 85 |
3.1 | What are viruses, Trojan Horse, Worms | 86 |
3.2 | Types of Virus | 88 |
3.3 | How to protect the computer against virus? | 91 |
3.4 | Life stages of Virus | 95 |
3.5 | What is the Structure of Viruses? | 97 |
3.6 | Components of virus | 100 |
4 | Firewalls and Proxy Servers | 106 |
4.1 | Kinds of Firewalls |
|
|
|
|
| 108 |
4.2 | Packet filters |
|
|
|
|
| 109 |
4.3 | Application-Level Filtering |
|
|
|
|
| 110 |
4.4 | Circuit-Level Gateways |
|
|
|
|
| 112 |
4.5 | Dynamic Packet Filters |
|
|
|
|
| 113 |
4.6 | Distributed Firewalls. |
|
|
|
|
| 114 |
4.7 | What firewalls cannot Do & Filtering Services |
|
|
|
|
| 116 |
4.8 | Reasonable Services to Filter |
|
|
|
|
| 117 |
4.9 | Digging for Worms. |
|
|
|
|
| 119 |
4.1 | Packet Filtering. |
|
|
|
|
| 121 |
4.11 | Implementing policies: (Default allow, Default Deny) on proxy |
|
|
|
|
| 123 |
5 | Cryptography |
|
|
|
|
| 130 |
5.1 | Introduction to Basic encryption and Decryption, |
|
|
|
|
| 131 |
5.2 | Diffie – Hellman Key Exchange |
|
|
|
|
| 138 |
5.3 | Concept of Public key and Private key |
|
|
|
|
| 140 |
5.4 | The concept of Hash (Message Digest) |
|
|
|
|
| 143 |
5.4 | Digital Signatures |
|
|
|
|
| 146 |
5.5 | Symmetric Key Cryptography |
|
|
|
|
| 150 |
5.6 | Asymmetric Key cryptography |
|
|
|
|
| 152 |
5.7 | Compare & contrast Symmetric Key Cryptography with Asymmetric key cryptography |
|
|
|
|
| 154 |
5.8
| Pretty Good Privacy (PGP) |
|
|
|
|
| 156 |
6 | University Exam Paper for previous 5 years |
|
|
|
|
|
|
7 | Question Bank |
|
|
|
|
|
|
8 | Model Answers of selected and grouped questions |
|
|
|
|
|
|
9 | A set of 3 question papers for your Mock test and own assessment |
|
|
|
|
|
|
Click to download the documents:Click the below link to download Question papers.
TYBSC IT Sem 5 Question Papers - Mumbai University