Syllabus Computer Network and Security - (314451) Credit Scheme : Examination Scheme : 03 End_Semester : 70 Marks Unit III ADHOC AND WSN Infrastructure Network and Infrastructure-less Wireless Networks, Issues in Adhoc Wireless Network, Adhoc Network MAC Layer: Design Issues, Design Goal, Classification, MACAW, Adhoc Network Routing Layer : Issues in Designing a Routing Protocol for Ad-hoc Wireless Networks – Classifications of Routing Protocols, DSDV, AODV, DSR, Applications of Sensor Network, Comparison with Ad Hoc Wireless Network, Sensor node architecture Issues and Challenges in Designing a Sensor Network, Classification of sensor network protocols, SENSOR NETWORK ARCHITECTURE : Layered Architecture, Clustered Architecture. (Chapter - 3) Unit IV INTRODUCTION TO NETWORK SECURITY Importance and Need for Security, Network Attacks - Passive, Active Network Security Threats : Unauthorized access, Distributed Denial of Service (DDoS) attacks, Man in the middle attacks, Concept of Security Principles : Confidentiality and Privacy, Authentication, Authorization and Access Control, Integrity, Non- repudiation, Stream Ciphers: Substitution Cipher – Mono alphabetic Cipher, Polyalphabetic Substitution Cipher., Transposition Cipher : Rail-Fence Block Ciphers modes : Electronic Code Book (ECB) Mode., Cipher Block Chaining (CBC) Mode., Cipher Feedback Mode (CFB) , Output Feedback (OFB) Mode. (Chapter - 4) Unit V CRYPTOGRAPHIC ALGORITHM Mathematical preliminaries : Groups, Rings, Fields, Prime numbers, Symmetric key algorithms: Data Encryption Standards, Advanced Encryption Standard, Public Key Encryption and Hash function : RSA Digital signatures, Digital Certificates and Public Key Infrastructure: Private Key Management, Diffie Hellman key exchange, The PKIX Model (Chapter - 5) Unit VI INTRODUCTION TO CYBER SECURITY Introduction to Cyber Security : Basic Cyber Security Concepts, Layers of security, Vulnerability, Threat, Harmful Acts-Malware, Phishing, MIM Attack, DOS Attack, SQL Injection, Internet Governance - Challenges and Constraints, Computer Criminals, Assets and Threat, Motive of Attackers, Software attacks, hardware attacks, Cyber Threats-Cyber Warfare, Cyber Crime, Cyber Stalking, Cyber Terrorism, Cyber Espionage, Comprehensive Cyber Security Policy. (Chapter - 6)