BC4007 Firewall and VPN Security Syllabus:

BC4007 Firewall and VPN Security Syllabus – Anna University PG Syllabus Regulation 2021

COURSE OBJECTIVES:

 Identify and assess current and anticipated security risks and vulnerabilities
 Develop a network security plan and policies
 Establish a VPN to allow IPSec remote access traffic
 Monitor, evaluate and test security conditions and environment
 Develop critical situation contingency plans and disaster recovery plan
 Implement/test contingency and backup plans and coordinate with stakeholders
 Monitor, report and resolve security problems

UNIT I INTRODUCTION

Introduction, Types of Firewalls, Ingress and Egress Filtering, Types of Filtering, Network Address Translation (NAT), Application Proxy, Circuit Proxy, Content Filtering, Software versus Hardware Firewalls, IPv4 versus IPv6 Firewalls, Dual-Homed and Triple-Homed Firewalls, Placement of Firewalls.

UNIT II VPN FUNDAMENTALS

VPN Deployment Models and Architecture, Edge Router, Corporate Firewall, VPN Appliance, Remote Access, Site-to-Site, Host-to-Host, Extranet Access, Tunnel versus Transport Mode, The Relationship Between Encryption and VPNs, Establishing VPN Connections with Cryptography, Digital Certificates, VPN Authorization.

UNIT III EXPLORING THE DEPTHS OF FIREWALLS

Firewall Rules, Authentication and Authorization, Monitoring and Logging, Understanding and Interpreting Firewall Logs and Alerts, Intrusion Detection, Limitations of Firewalls, Downside of Encryption with Firewalls, Firewall Enhancements, and Management Interfaces.

UNIT IV OVERVIEW OF INDUSTRIAL CONTROL SYSTEMS

Overview of SCADA, DCS, and PLCs, ICS Operation, Key ICS Components, Control Components, Network Components, SCADA Systems, Distributed Control Systems, Programmable Logic Controllers, Industrial Sectors and Their Interdependencies.

UNIT V SCADA PROTOCOLS

Modbus RTU, Modbus TCP/IP, DNP3, DNP3 TCP/IP, OPC, DA/HAD, SCADA protocol fuzzing, Finding Vulnerabilities in HMI: software- Buffer Overflows, Shell code. Previous attacks Analysis Stuxnet, Duqu.

COURSE OUTCOMES:

After the completion of this course, student will be able to
CO1: Show the fundamental knowledge of Firewalls and it types
CO2: Construct a VPN to allow Remote Access, Hashing, connections with Cryptography and VPN Authorization
CO3: Elaborate the knowledge of depths of Firewalls, Interpreting firewall logs, alerts, Intrusion and Detection
CO4: Explain the design of Control Systems of SCAD, DCS, PLC‘s and ICS‘s
CO5: Evaluate the SCADA protocols like RTU, TCP/IP, DNP3, OPC,DA/HAD

TOTAL: 45 PERIODS

REFERENCES

1. J. Michael Stewart and Denise Kinsey “Network Security, Firewalls, and VPNs”, 3rd Edition, Jones & Bartlett Learning, October 2020, ISBN: 9781284183696
2. T. Macaulay and B. L. Singer, Cyber security for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS, Auerbach Publications, 2011.
3. J. Lopez, R. Setola, and S. Wolthusen, Critical Infrastructure Protection Information Infrastructure Models, Analysis, and Defense, Springer-Verlag Berlin Heidelberg, 2012.
4. Robert Radvanovsky and Jacob Brodsky, editors. Handbook of SCADA/Control Systems Security. Routledge, 2020, ISBN 9780367596668.
5. A.W. Colombo, T. Bangemann, S. Karnouskos, S. Delsing, P. Stluka, R. Harrison, et al. Industrial cloud-based cyber-physical systems Springer International Publishing, 2014
6. D. Bailey, Practical SCADA for Industry. Burlington, MA: Newnes, 2003.