You are on page 1of 3

MODULE 1

ATTACKS ON COMPUTERS AND COMPUTER SECURITY


1.1 Introduction
1.2 The Need for Security
1.2.1 Basic Concepts
1.2.2 Modern Nature of Attacks

1.3 Security Approaches


1.3.1 Trusted Systems
1.3.2 Security Models
1.3.3 Security Management Practices

1.4 Principles of Security


1.4.1 Confidentiality
1.4.2 Authentication
1.4.3 Integrity
1.4.4 Non-repudiation
1.4.5 Access Control
1.4.6 Availability
1.4.7 Ethical and Legal Issues

1.5 Types of Attacks


1.5.1 Attacks: A General View
1.5.2 Attacks: A Technical View
1.5.3 The Practical Side of Attacks
1.5.4 Programs that Attack
1.5.5 Dealing with Viruses
1.5.6 Java Security
1.5.7 Specific Attacks
MODULE 2
TRANSPORT-LEVEL SECURITY

16.1 Web Security Considerations


Web Security Threats
Web Traffic Security Approaches

16.2 Secure Socket Layer and Transport Layer Security


SSL Architecture
SSL Record Protocol
Change Cipher Spec Protocol
Alert Protocol
Handshake Protocol
Cryptographic Computations

16.3 Transport Layer Security


Version Number
Message Authentication Code
Pseudorandom Function
Alert Codes
Cipher Suites
Client Certificate Types
Certificate Verify and Finished Messages
Cryptographic Computations
Padding

16.4 HTTPS
Connection Initiation
Connection Closure

16.5 Secure Shell (SSH)


Transport Layer Protocol
User Authentication Protocol
Connection Protocol

MODULE 1
1. In brief explain different security approaches.
2. Explain the following principle of security.
i) Confidentiality ii) Integrity
3. Explain the Classification of attacks with block diagram.
4. Explain with classification the types of active attack. passive attacks and active
attacks,
5. Explain two main forms of packet-level attacks.
6. Discuss the concepts of phising and pharming.
7. Discuss the concepts of Sniffing and spoofing.
8. With the help of block diagram explain the Virus elimination steps and Generations of
anti-virus software.
MODULE 2
1. Explain SSL protocol stack with session and connection status parameters.
2. With the help of block diagram, explain SSL protocol stack.
3. Give the overall operation of SSL record protocol with diagram.
4. Explain various phases of SSL handshake protocol with a neat diagram.
5. Write a note on HTTP’S.
6. Define SSH. With the help of block diagram, explain SSH protocol stack.
7. With a neat flow diagram, explain SSH transport layer protocol packets
exchange and packet formation.
Assignment1: Write any 5 questions from each module.

You might also like