Monday, October 17, 2016

BSc IT Internet Security Notes Mumbai


Below are the list of topics included in the notes:

Sec tionTopicPage No.

Revision of a part of “Data Communication and Networking” syllabus prerequisite for “Internet Security.”
0.1Three way handshake2
0.2Understanding O.S.I. Model at a glance5
0.3Differentiate between O.S.I. Protocol suite & T.C.P./I.P. Protocol suite.6
0.4Attacks with reference to the OSI model7
0.5Node-to-Node, Host-to-Host and Process-to-Process deliveries?9
0.6Understanding SSL Layer10

Position of SSL layer in TCP/IP suit
0.7TCP Header11
0.8What is connection oriented and what is connectionless?13
0.9TCP v/s UTP15
0.1
16
0.11
17

Introduction: 20
1What are Security Truisms?21
1.1Why require a security?22
1.2What is a Security Policy24
1.3What is a Security Policy - Definition25
1.4Picking a Security Policy,27



1.5What kind of Security28
1.6Distinguish between a Hacker and a cracker29
1.7Strategies for a Secure Network,30
1.8The Ethics of Computer Security32
1.9Security threats and levels33
1.1Security Plan (RFC 2196)34
1.11What Makes a Good Security Policy? 36
1.12The components of a good security policy36
1.13Deny all/ Allow all39
1.14Who Should be Involved When Forming Policy?40
1.15Security Incident Handling41
1.16Security breach incident: - Containment 45
1.17Security breach incident: - Eradication 46
1.18Security Approaches47
1.19Principles of Security48
1.2Types of attack - Active and passive 49
1.21The Practical Side of Attacks 51
1.22Cookies52
1.23Specific Attacks: - Sniffing (snooping) Spoofing53
1.24Chapter Summery:55



2Classes of Attack60
2.1Stealing Passwords61
2.2Social Engineering.63
2.3Bugs and Backdoors65
2.4Authentication Failures67
2.5Protocol Failures69
2.6Information Leakages70
2.7Exponential Attacks - Viruses and Worms71
2.8Denial-of-Service Attacks72
2.9Botnets.74
2.1Active Attacks77
3Computer Security85
3.1What are viruses, Trojan Horse, Worms86
3.2Types of Virus88
3.3How to protect the computer against virus?91
3.4Life stages of Virus95
3.5What is the Structure of Viruses?97
3.6Components of virus100
4Firewalls and Proxy Servers106
4.1Kinds of Firewalls




108
4.2Packet filters




109
4.3Application-Level Filtering




110
4.4Circuit-Level Gateways




112
4.5Dynamic Packet Filters




113
4.6Distributed Firewalls.




114
4.7What firewalls cannot Do & Filtering Services




116
4.8Reasonable Services to Filter




117
4.9Digging for Worms.




119
4.1Packet Filtering.




121
4.11Implementing policies: (Default allow, Default Deny) on proxy




123
5Cryptography




130
5.1Introduction to Basic encryption and Decryption,




131
5.2Diffie – Hellman Key Exchange




138
5.3Concept of Public key and Private key




140
5.4The concept of Hash (Message Digest)




143
5.4Digital Signatures




146
5.5Symmetric Key Cryptography




150
5.6Asymmetric Key cryptography




152
5.7Compare & contrast Symmetric Key Cryptography with Asymmetric key cryptography




154
5.8
Pretty Good Privacy (PGP)




156
6University Exam Paper for previous 5 years





7Question Bank





8Model Answers of selected and grouped questions





9A set of 3 question papers for your Mock test and own assessment







Click to download the documents:


Click the below link to download Question papers.
TYBSC IT Sem 5 Question Papers - Mumbai University

Related Post:

0 comments:

Post a Comment

 
Copyright 2009 Information Blog
Powered By Blogger