Below are the list of topics included in the notes:| Sec tion | Topic | Page No. |  
  | Revision of a part of Data Communication and Networking syllabus prerequisite for Internet Security. | 
  |  | 0.1 | Three way handshake | 2 |  | 0.2 | Understanding O.S.I. Model at a glance | 5 |  | 0.3 | Differentiate between O.S.I. Protocol suite & T.C.P./I.P. Protocol suite. | 6 |  | 0.4 | Attacks with reference to the OSI model | 7 |  | 0.5 | Node-to-Node, Host-to-Host and Process-to-Process deliveries? | 9 |  | 0.6 | Understanding SSL Layer | 10 |  
  | Position of SSL layer in TCP/IP suit | 
  |  | 0.7 | TCP Header | 11 |  | 0.8 | What is connection oriented and what is connectionless? | 13 |  | 0.9 | TCP v/s UTP | 15 |  | 0.1 | 
  | 16 |  | 0.11 | 
  | 17 |  
  | Introduction:  | 20 |  | 1 | What are Security Truisms? | 21 |  | 1.1 | Why require a security? | 22 |  | 1.2 | What is a Security Policy | 24 |  | 1.3 | What is a Security Policy - Definition | 25 |  | 1.4 | Picking a Security Policy, | 27 |  
  | 
  | 
  | 
  |  | 1.5 | What kind of Security | 28 |  | 1.6 | Distinguish between a Hacker and a cracker | 29 |  | 1.7 | Strategies for a Secure Network, | 30 |  | 1.8 | The Ethics of Computer Security | 32 |  | 1.9 | Security threats and levels | 33 |  | 1.1 | Security Plan (RFC 2196) | 34 |  | 1.11 | What Makes a Good Security Policy?  | 36 |  | 1.12 | The components of a good security policy | 36 |  | 1.13 | Deny all/ Allow all | 39 |  | 1.14 | Who Should be Involved When Forming Policy? | 40 |  | 1.15 | Security Incident Handling | 41 |  | 1.16 | Security breach incident: - Containment  | 45 |  | 1.17 | Security breach incident: - Eradication  | 46 |  | 1.18 | Security Approaches | 47 |  | 1.19 | Principles of Security | 48 |  | 1.2 | Types of attack - Active and passive  | 49 |  | 1.21 | The Practical Side of Attacks  | 51 |  | 1.22 | Cookies | 52 |  | 1.23 | Specific Attacks: - Sniffing (snooping) Spoofing | 53 |  | 1.24 | Chapter Summery: | 55 |  
  | 
  | 
  | 
  |  | 2 | Classes of Attack | 60 |  | 2.1 | Stealing Passwords | 61 |  | 2.2 | Social Engineering. | 63 |  | 2.3 | Bugs and Backdoors | 65 |  | 2.4 | Authentication Failures | 67 |  | 2.5 | Protocol Failures | 69 |  | 2.6 | Information Leakages | 70 |  | 2.7 | Exponential Attacks - Viruses and Worms | 71 |  | 2.8 | Denial-of-Service Attacks | 72 |  | 2.9 | Botnets. | 74 |  | 2.1 | Active Attacks | 77 |  | 3 | Computer Security | 85 |  | 3.1 | What are viruses, Trojan Horse, Worms | 86 |  | 3.2 | Types of Virus | 88 |  | 3.3 | How to protect the computer against virus? | 91 |  | 3.4 | Life stages of Virus | 95 |  | 3.5 | What is the Structure of Viruses? | 97 |  | 3.6 | Components of virus | 100 |  | 4 | Firewalls and Proxy Servers | 106 |  
  | 
| 4.1 | Kinds of Firewalls | 
  | 
  | 
  | 
  | 
  | 108 |  | 4.2 | Packet filters | 
  | 
  | 
  | 
  | 
  | 109 |  | 4.3 | Application-Level Filtering | 
  | 
  | 
  | 
  | 
  | 110 |  | 4.4 | Circuit-Level Gateways | 
  | 
  | 
  | 
  | 
  | 112 |  | 4.5 | Dynamic Packet Filters | 
  | 
  | 
  | 
  | 
  | 113 |  | 4.6 | Distributed Firewalls. | 
  | 
  | 
  | 
  | 
  | 114 |  | 4.7 | What firewalls cannot Do & Filtering Services | 
  | 
  | 
  | 
  | 
  | 116 |  | 4.8 | Reasonable Services to Filter | 
  | 
  | 
  | 
  | 
  | 117 |  | 4.9 | Digging for Worms. | 
  | 
  | 
  | 
  | 
  | 119 |  | 4.1 | Packet Filtering. | 
  | 
  | 
  | 
  | 
  | 121 |  | 4.11 | Implementing policies: (Default allow, Default Deny) on proxy | 
  | 
  | 
  | 
  | 
  | 123 |  | 5 | Cryptography | 
  | 
  | 
  | 
  | 
  | 130 |  | 5.1 | Introduction to Basic encryption and Decryption, | 
  | 
  | 
  | 
  | 
  | 131 |  | 5.2 | Diffie  Hellman Key Exchange | 
  | 
  | 
  | 
  | 
  | 138 |  | 5.3 | Concept of Public key and Private key | 
  | 
  | 
  | 
  | 
  | 140 |  | 5.4 | The concept of Hash (Message Digest) | 
  | 
  | 
  | 
  | 
  | 143 |  | 5.4 | Digital Signatures | 
  | 
  | 
  | 
  | 
  | 146 |  | 5.5 | Symmetric Key Cryptography | 
  | 
  | 
  | 
  | 
  | 150 |  | 5.6 | Asymmetric Key cryptography  | 
  | 
  | 
  | 
  | 
  | 152 |  | 5.7 | Compare & contrast Symmetric Key Cryptography with Asymmetric key cryptography | 
  | 
  | 
  | 
  | 
  | 154 |  
  | 
5.8 
  | Pretty Good Privacy (PGP) | 
  | 
  | 
  | 
  | 
  |  156 |  | 6 | University Exam Paper for previous 5 years | 
  | 
  | 
  | 
  | 
  | 
  |  | 7 | Question Bank | 
  | 
  | 
  | 
  | 
  | 
  |  | 8 | Model Answers of selected and grouped questions | 
  | 
  | 
  | 
  | 
  | 
  |  | 9 | A set of 3 question papers for your Mock test and own assessment | 
  | 
  | 
  | 
  | 
  | 
  |  
  | 
 Click to download the documents:Click the below link to download Question papers.
TYBSC IT Sem 5 Question Papers - Mumbai University
Related Posts by Categories
 
 
 
0 comments:
Post a Comment