Network applications, network hardware, network software, reference models: OSI, TCP/IP, Internet, Connection oriented network -Theoretical basis for communication, guided transmission media, wireless transmission, the public switched telephone networks, mobile telephone system.
Sources of security threats- Motives - Target Assets and vulnerabilities – Consequences of threats- E-mail threats - Web-threats - Intruders and Hackers, Insider threats, Cybercrimes.
Active/ Passive – Interference – Interception –Impersonation – Worms –Virus – Spam’s – Ad ware - Spy ware – Trojans and covert channels –Backdoors – Bots – IP, Spoofing - ARP spoofing - Session Hijacking - Sabotage-Internal treats Environmental threats - Threats to Server security.
Authorization and Authentication - types, policies and techniques – Security certification - Security monitoring and Auditing - Security Requirements Specifications – Security Policies and Procedures, Firewalls, IDS, Log Files, Honey Pots.
Digital forensics -Cyber security design and maintaining resilience - Malware analysis - Critical security components - Cloud Security and Application Security - Mobile security and common vulnerabilities –Cyber risk and cyber insurance.
Reference Book:
1. Joseph M Kizza, “Computer Network Security”, Springer Verlag, 2005 2. Thomas Calabres and Tom Calabrese, “Information Security Intelligence: Cryptographic Principles & Application”, Thomson Delmar Learning, 2004.
Text Book:
1.Swiderski, Frank and Syndex, “Threat Modeling”, Microsoft Press, 2004. 2.William Stallings and Lawrie Brown, “Computer Security: Principles and Practice”, Prentice Hall, 2008.