Below are the list of topics included in the notes:Sec tion | Topic | Page No. |
| Revision of a part of Data Communication and Networking syllabus prerequisite for Internet Security. |
| 0.1 | Three way handshake | 2 | 0.2 | Understanding O.S.I. Model at a glance | 5 | 0.3 | Differentiate between O.S.I. Protocol suite & T.C.P./I.P. Protocol suite. | 6 | 0.4 | Attacks with reference to the OSI model | 7 | 0.5 | Node-to-Node, Host-to-Host and Process-to-Process deliveries? | 9 | 0.6 | Understanding SSL Layer | 10 |
| Position of SSL layer in TCP/IP suit |
| 0.7 | TCP Header | 11 | 0.8 | What is connection oriented and what is connectionless? | 13 | 0.9 | TCP v/s UTP | 15 | 0.1 |
| 16 | 0.11 |
| 17 |
| Introduction: | 20 | 1 | What are Security Truisms? | 21 | 1.1 | Why require a security? | 22 | 1.2 | What is a Security Policy | 24 | 1.3 | What is a Security Policy - Definition | 25 | 1.4 | Picking a Security Policy, | 27 |
|
|
|
| 1.5 | What kind of Security | 28 | 1.6 | Distinguish between a Hacker and a cracker | 29 | 1.7 | Strategies for a Secure Network, | 30 | 1.8 | The Ethics of Computer Security | 32 | 1.9 | Security threats and levels | 33 | 1.1 | Security Plan (RFC 2196) | 34 | 1.11 | What Makes a Good Security Policy? | 36 | 1.12 | The components of a good security policy | 36 | 1.13 | Deny all/ Allow all | 39 | 1.14 | Who Should be Involved When Forming Policy? | 40 | 1.15 | Security Incident Handling | 41 | 1.16 | Security breach incident: - Containment | 45 | 1.17 | Security breach incident: - Eradication | 46 | 1.18 | Security Approaches | 47 | 1.19 | Principles of Security | 48 | 1.2 | Types of attack - Active and passive | 49 | 1.21 | The Practical Side of Attacks | 51 | 1.22 | Cookies | 52 | 1.23 | Specific Attacks: - Sniffing (snooping) Spoofing | 53 | 1.24 | Chapter Summery: | 55 |
|
|
|
| 2 | Classes of Attack | 60 | 2.1 | Stealing Passwords | 61 | 2.2 | Social Engineering. | 63 | 2.3 | Bugs and Backdoors | 65 | 2.4 | Authentication Failures | 67 | 2.5 | Protocol Failures | 69 | 2.6 | Information Leakages | 70 | 2.7 | Exponential Attacks - Viruses and Worms | 71 | 2.8 | Denial-of-Service Attacks | 72 | 2.9 | Botnets. | 74 | 2.1 | Active Attacks | 77 | 3 | Computer Security | 85 | 3.1 | What are viruses, Trojan Horse, Worms | 86 | 3.2 | Types of Virus | 88 | 3.3 | How to protect the computer against virus? | 91 | 3.4 | Life stages of Virus | 95 | 3.5 | What is the Structure of Viruses? | 97 | 3.6 | Components of virus | 100 | 4 | Firewalls and Proxy Servers | 106 |
|
4.1 | Kinds of Firewalls |
|
|
|
|
| 108 | 4.2 | Packet filters |
|
|
|
|
| 109 | 4.3 | Application-Level Filtering |
|
|
|
|
| 110 | 4.4 | Circuit-Level Gateways |
|
|
|
|
| 112 | 4.5 | Dynamic Packet Filters |
|
|
|
|
| 113 | 4.6 | Distributed Firewalls. |
|
|
|
|
| 114 | 4.7 | What firewalls cannot Do & Filtering Services |
|
|
|
|
| 116 | 4.8 | Reasonable Services to Filter |
|
|
|
|
| 117 | 4.9 | Digging for Worms. |
|
|
|
|
| 119 | 4.1 | Packet Filtering. |
|
|
|
|
| 121 | 4.11 | Implementing policies: (Default allow, Default Deny) on proxy |
|
|
|
|
| 123 | 5 | Cryptography |
|
|
|
|
| 130 | 5.1 | Introduction to Basic encryption and Decryption, |
|
|
|
|
| 131 | 5.2 | Diffie Hellman Key Exchange |
|
|
|
|
| 138 | 5.3 | Concept of Public key and Private key |
|
|
|
|
| 140 | 5.4 | The concept of Hash (Message Digest) |
|
|
|
|
| 143 | 5.4 | Digital Signatures |
|
|
|
|
| 146 | 5.5 | Symmetric Key Cryptography |
|
|
|
|
| 150 | 5.6 | Asymmetric Key cryptography |
|
|
|
|
| 152 | 5.7 | Compare & contrast Symmetric Key Cryptography with Asymmetric key cryptography |
|
|
|
|
| 154 |
|
5.8
| Pretty Good Privacy (PGP) |
|
|
|
|
| 156 | 6 | University Exam Paper for previous 5 years |
|
|
|
|
|
| 7 | Question Bank |
|
|
|
|
|
| 8 | Model Answers of selected and grouped questions |
|
|
|
|
|
| 9 | A set of 3 question papers for your Mock test and own assessment |
|
|
|
|
|
|
|
Click to download the documents:Click the below link to download Question papers.
TYBSC IT Sem 5 Question Papers - Mumbai University
Related Post:
0 comments:
Post a Comment