Network Security Quiz Questions – Information Security analysis Questions.

SSL Deployment Models based on Cloudflare

Here are 5 analytical security questions to develop understanding of how various systems in Information and Network Security world work; the broad security areas covered are HTTP Strict Transport Security (HSTS), SSL and deployment, Wireshark and Packet sniffing, Web Server Vulnerabilities, WEP Cracking. Continue reading

Related articles suggested by Google

Network Security Course Syllabus (COM 732.3 Pokhara University)

Crypto codes in Network Information Security Illustration

Course Title: Network Security

Course Code: COM 732.3 (For Bachelor’s of Engineering)

Credit: 3

Class Load: 3 hours

Evaluation:

Theory Practical Total
Sessional 50 50
Final 50 50
Total 100 100

Course Objective of Network Security:

The course objective is to in part fundamental understanding of every facts of information security, from the basics to advanced cryptography, authentication, secure web, email services and emerging best practices with security standards.

Course Contents:

1. Introduction                                                                                                              [4hrs]

Security, Attacks, Attack Types, Viruses, Worms, Trojan, Horses, Hacker, Techniques, Security Services, Network Security Model, Security Levels, Internet Standard and RFCs

 

2. Conventional Encryption/Secret Key Cryptography                                            [9hrs]

Cryptography, Cryptanalysis, Cipher Structure, Encryption Algorithms, Data Encryption Standard (DES), International Data Encryption Algorithm (IDEA), Advanced Encryption Standard (ASE), Modes of Operation, Symmetric Block Ciphers, Cipher Block Chaining (CBC), Multiple Encryption DES

 

3. Public Key Cryptography and Message Digests                                                   [10hrs]

Hashes, Secure Hash Algorithm (SHA), Encryption with Message Digest (MD), MD5, Public Key Cryptography Principles, Public Key Cryptography Algorithms, RAS, Digital Signature Standard (DSS)

 

4. Authentication and Public Key Infrastructure (PKI)                                           [6hrs]

Overview of Authentication Systems (Password, Address, Cryptographic), Security Handshake Pitfalls, Authentication Standards, Kerberos, PKI Turst Models, Revocation, Realtime Communication Security

 

5. Network  Security                                                                                                     [8hrs]

Email Security, PGP, S/MIME, IPSecurity, Architecture, Authentication Header, Security Association, Key Management, Web Security, Secure Socket Layer (SSL), Transport Layer Security (TLS), Secure Electronic Transaction (SET), Network Management Security, Different versions of SNMPs

 

6. System Wide Security                                                                                               [3hrs]

Intruders, Viruses, Firewall, DMZ

 

7. Other Issues                                                                                                               [5hrs]

Legal Issues, Various criminal laws related to information Security, Privacy Issues, Policy, Importance of Policy, Various Policies, Risk Management, Measure Risks, Information Security Processes.

 

References:

  1. Charlie Kaufman, Radia perlman, Mike Speciner, Network Security Private Communication in Public World, Second Edition, 2004, Pearson.
  2. William Stallings, Network Security Essentials-Applications & Standards, Pearson.
  3. Eric Maiwald, Fundamentals of Network Security, 2004, Osborne/McGraw Hill, Dreamtech Press
  4. Matt Bishop, Computer Security, Art and Science, Pearson