BC4007 Firewall and VPN Security Syllabus:
BC4007 Firewall and VPN Security Syllabus – Anna University PG Syllabus Regulation 2021
COURSE OBJECTIVES:
Identify and assess current and anticipated security risks and vulnerabilities
Develop a network security plan and policies
Establish a VPN to allow IPSec remote access traffic
Monitor, evaluate and test security conditions and environment
Develop critical situation contingency plans and disaster recovery plan
Implement/test contingency and backup plans and coordinate with stakeholders
Monitor, report and resolve security problems
UNIT I INTRODUCTION
Introduction, Types of Firewalls, Ingress and Egress Filtering, Types of Filtering, Network Address Translation (NAT), Application Proxy, Circuit Proxy, Content Filtering, Software versus Hardware Firewalls, IPv4 versus IPv6 Firewalls, Dual-Homed and Triple-Homed Firewalls, Placement of Firewalls.
UNIT II VPN FUNDAMENTALS
VPN Deployment Models and Architecture, Edge Router, Corporate Firewall, VPN Appliance, Remote Access, Site-to-Site, Host-to-Host, Extranet Access, Tunnel versus Transport Mode, The Relationship Between Encryption and VPNs, Establishing VPN Connections with Cryptography, Digital Certificates, VPN Authorization.
UNIT III EXPLORING THE DEPTHS OF FIREWALLS
Firewall Rules, Authentication and Authorization, Monitoring and Logging, Understanding and Interpreting Firewall Logs and Alerts, Intrusion Detection, Limitations of Firewalls, Downside of Encryption with Firewalls, Firewall Enhancements, and Management Interfaces.
UNIT IV OVERVIEW OF INDUSTRIAL CONTROL SYSTEMS
Overview of SCADA, DCS, and PLCs, ICS Operation, Key ICS Components, Control Components, Network Components, SCADA Systems, Distributed Control Systems, Programmable Logic Controllers, Industrial Sectors and Their Interdependencies.
UNIT V SCADA PROTOCOLS
Modbus RTU, Modbus TCP/IP, DNP3, DNP3 TCP/IP, OPC, DA/HAD, SCADA protocol fuzzing, Finding Vulnerabilities in HMI: software- Buffer Overflows, Shell code. Previous attacks Analysis Stuxnet, Duqu.
COURSE OUTCOMES:
After the completion of this course, student will be able to
CO1: Show the fundamental knowledge of Firewalls and it types
CO2: Construct a VPN to allow Remote Access, Hashing, connections with Cryptography and VPN Authorization
CO3: Elaborate the knowledge of depths of Firewalls, Interpreting firewall logs, alerts, Intrusion and Detection
CO4: Explain the design of Control Systems of SCAD, DCS, PLC‘s and ICS‘s
CO5: Evaluate the SCADA protocols like RTU, TCP/IP, DNP3, OPC,DA/HAD
TOTAL: 45 PERIODS
REFERENCES
1. J. Michael Stewart and Denise Kinsey “Network Security, Firewalls, and VPNs”, 3rd Edition, Jones & Bartlett Learning, October 2020, ISBN: 9781284183696
2. T. Macaulay and B. L. Singer, Cyber security for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS, Auerbach Publications, 2011.
3. J. Lopez, R. Setola, and S. Wolthusen, Critical Infrastructure Protection Information Infrastructure Models, Analysis, and Defense, Springer-Verlag Berlin Heidelberg, 2012.
4. Robert Radvanovsky and Jacob Brodsky, editors. Handbook of SCADA/Control Systems Security. Routledge, 2020, ISBN 9780367596668.
5. A.W. Colombo, T. Bangemann, S. Karnouskos, S. Delsing, P. Stluka, R. Harrison, et al. Industrial cloud-based cyber-physical systems Springer International Publishing, 2014
6. D. Bailey, Practical SCADA for Industry. Burlington, MA: Newnes, 2003.