CO317: Computer and Network Security
Course Number : CO317
|
Course Title : Computer and Network Security
|
Credits : 3
|
Prerequisites : Computer and Data Networks (CO311)
|
|
No
| Course Content
|
| Time Allocated (hours)
|
|
|
| L
| T
| P
| A
|
01
| Introduction to the subject, The need and the purpose of security, Difference of being obscure and being secure
|
| 2
|
|
|
|
02
| The meaning of Cryptography, basic operations, terminology, what cryptography offers other than security – authentication, integrity, and non-repudiation, cryptanalysis
|
| 2
|
|
|
|
03
| Transposition ciphers, Cryptanalysis of transposition ciphers
|
| 2
|
|
|
|
04
| The concept of secret key cryptography, block and stream ciphers, security of symmetric key cryptosystems, study of Data Encryption Standard algorithm, Linear Feedback Shift Registers as stream ciphers, algorithm types and modes, design of a new algorithm combining block ciphers and stream ciphers
|
| 5
| 1
|  
| 6
|
05
| Introduction to mathematic used in asymmetric key cryptography
|
| 2
|
|
|
|
06
| The concept of asymmetric key cryptography, Knapsack algorithms, RSA, elliptic curve algorithms, security, Digital Signatures
|
| 5
| 1
|
| 4
|
07
| The function of protocols, authentication protocols, secret sharing protocols, Kerberos, wide mouthed frog protocol
|
| 5
| 1
|
| 4
|
08
| Securing Web-based Systems, Wireless Security, Access Control & Trusted Computing, Biometrics, Firewalls, Secure Protocols
|
| 5
| 1
|
|
|
09
| Laws pertaining to Electronic Information, Penetration Testing and Ethical Hacking, User Privacy
|
| 2
|
|
|
|
| Total
|
| 32
| 4
|
| 18
|
|
|
Assessment
|
| Percentage Marks
|
Continuous Assessment
|
| 30
|
|
Class participation
|
|
| 5
|
Practicals/Assignments
|
|
| 25
|
Written Examinations
|
| 70
|
|
Mid-semester
|
|
| 20
|
End-semester
|
|
| 50
|
[an error occurred while processing the directive]