Curran, K. Tutorials. Independent study (including assessment) N/A

Similar documents
Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Kevin Curran. Independent study (including assessment) Computing N/A

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Introduction to Cyber Security / Information Security

COM320 Computer Networks and Operating Systems TBA. Independent study (including assessment)

Network Security Essentials:

Information, Network & Cyber Security

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

MS Information Security (MSIS)

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

90% of data breaches are caused by software vulnerabilities.

Data Encryption and Network Security

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

Network Security Course Specifications

Mobile Technology. Woods, D. Independent study (including assessment) COM N/A

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

Fundamentals of Network Security - Theory and Practice-

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Cryptography and network security CNET4523

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Security + Certification (ITSY 1076) Syllabus

Why Security Matters. Why Security Matters. 00 Overview 03 Sept CSCD27 Computer and Network Security. CSCD27 Computer and Network Security 1

e-code Academy Information Security Diploma Training Discerption

Network Security Administrator

Network Security SWISS GERMAN UNIVERSITY. Administration Charles Lim

Computer Security (EDA263 / DIT 641)

CNA 432/532 OSI Layers Security

CS 464/564 Networked Systems Security SYLLABUS

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer

Information Security Course Specifications

Table of Contents. Introduction. Audience. At Course Completion

CIS 253. Network Security

CCNA Security 2.0 Scope and Sequence

CRYPTOGRAPHY AND NETWORK SECURITY

How To Pass A Credit Course At Florida State College At Jacksonville

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Content Teaching Academy at James Madison University

CS 356 Lecture 28 Internet Authentication. Spring 2013

Module 1: e- Learning

CCNA Security v1.0 Scope and Sequence

External Supplier Control Requirements

BUY ONLINE FROM:

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

Bachelor of Information Technology (Network Security)

CS 450/650 Fundamentals of Integrated Computer Security

Weighted Total Mark. Weighted Exam Mark

Angel Dichev RIG, SAP Labs

Course Design Document. IS403: Advanced Information Security and Trust

CCNA Security v1.0 Scope and Sequence

Securing Data on Microsoft SQL Server 2012

Certificate Authorities and Public Keys. How they work and 10+ ways to hack them.

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

IT Networking and Security

Computer and Network Security PG Unit Outline School of Information Sciences and Engineering

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

Passing PCI Compliance How to Address the Application Security Mandates

MS-55096: Securing Data on Microsoft SQL Server 2012

NETWORK SECURITY (W/LAB) Course Syllabus

CISA TIMETABLE (4 DAYS)

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Bellevue University Cybersecurity Programs & Courses

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

IINS Implementing Cisco Network Security 3.0 (IINS)

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Division: Applied Science (AS) Liberal Arts (LA) Workforce Development (WD)

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

ICANWK406A Install, configure and test network security

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Table of Contents. Introduction. Audience. At Course Completion

PROGRAMME DETAIL SPECIFICATION. Programme Summary

Cryptography and Network Security Chapter 14

CS 5490/6490: Network Security Fall 2015

Networking: EC Council Network Security Administrator NSA

COURSE CATALOG. BS Networking and System Administration

Information Security Services

Chapter 8. Network Security

Cryptography and Network Security Chapter 1

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

Introduction p. 2. Introduction to Information Security p. 1. Introduction

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Transcription:

MODULE TITLE: MODULE CODE: Systems Security COM535 YEAR OF REVISION: 2013/14 MODULE LEVEL: 6 CREDIT POINTS: 20 MODULE STATUS: SEMESTER: 1 LOCATION: E-LEARNING: PREREQUISITE(S): CO-REQUISITE(S): MODULE CO-ORDINATOR(S): TEACHING STAFF RESPONSIBLE FOR MODULE DELIVERY: HOURS: Optional Magee Blended learning None None Curran, K Curran, K Lectures Seminars Tutorials Practicals Independent study (including assessment) 24 hrs hrs hrs 48 hrs 128 hrs TOTAL EFFORT HOURS: 200 ACADEMIC SUBJECT: COM MODULAR SUBJECT: N/A RATIONALE The aim of the course is to introduce the student to the issues that arise when we consider the security of computer networks, from both a "white-hat" (defensive), and "black-hat" (offensive) perspective.

AIMS The aim is to provide an understanding of the theory of secure software and network systems through a series of lab based practical work and experiments. This treatment will reinforce software engineering best practice. This module also aims to introduce the key concepts of secure computer systems and provide expertise in applying the principal techniques associated with planning and deploying secure systems. LEARNING OUTCOMES A successful student will be able to: KNOWLEDGE AND UNDERSTANDING K1 Demonstrate knowledge and understanding of the key principles and concepts that underpin computer security K2 Demonstrate knowledge and understanding of the key concepts and techniques used to develop security defences and related protocols and standards. K3 Display an appreciation of the technical and research challenges facing developers of network based secure environments. K4 Demonstrate how to assess the security of web applications INTELLECTUAL QUALITIES I1 I2 I3 I4 Critically evaluate approaches and techniques used in the design and development of secure technologies. Apply a range of technical solutions that address the technical challenges associated with the design of secure systems. Communicate and implement appropriate secure network applications. Identify a range of network security problems PROFESSIONAL/PRACTICAL SKILLS P1 Demonstrate competence in the creation of appropriate secure systems P2 Employ effectively a range of tools and techniques in the design of secure systems. P3 Combine a range of techniques and approaches in the design and development of secure applications. P4 Demonstrate the ability to develop secure systems.

TRANSFERABLE SKILLS T1 Adopt a methodical approach in the design and development of secure systems T2 T3 T4 Communicate design solutions in a clear and concise manner. Communicate design solutions in a clear and concise manner. Demonstrate ability to critically evaluate and synthesise information from a wide range of sources.

CONTENT Part 1: Computer Security Technology and Principles 1.1 Cryptographic Tools, Confidentiality, Message Authentication and Hash Functions, Public-Key Encryption and Digital Signatures and Key Management. 1.2 User Authentication, Means of Authentication, Password-Based Authentication, Security Issues for User Authentication 1.3 Access Control Principles, Subjects, Objects, and Access Rights 1.4 The Need for Database Security, Database Management Systems, Database Access Control, Cloud Security 1.5 Types of Malicious Software, Propagation/Infected Content/Viruses/Trojans/Bots 1.6 Denial-of-Service Attacks, Flooding Attacks, Application-Based Bandwidth Attacks 1.7 Intrusion Detection, Host-Based Intrusion Detection, Network-Based Intrusion Detection, Honeypots 1.8 Firewalls and Intrusion Prevention Systems. Intrusion Prevention Systems Part 2: Software Security & Trusted Systems 2.1 Buffer Overflow, Stack Overflows, Defending Against Buffer Overflows 2.2 Software Security, Handling Program Input, Interacting with the Operating System and Other Programs 2.3 Operating System Security, System Security Planning, Windows/Linux/Unix Security 2.4 Trusted Computing and Multilevel Security, The Concept of Trusted Systems, Assurance and Evaluation Part 3: Management Issues 3.1 IT Security Management and Risk Assessment, Security Risk Assessment 3.2 IT Security Controls, Plans, and Procedures, IT Security Plan, Implementation of Controls 3.3 Physical and Infrastructure Security, Recovery from Physical Security Breaches 528 3.4 Human Resources Security, Employment Practices and Policies, E-Mail and Internet Use Policies 3.5 Security Auditing, The Security Audit Trail, Audit Trail Analysis Part 4: Cryptographic Algorithms & Network Security 4.1 Symmetric Encryption and Message Confidentiality, Data Encryption Standard, Advanced Encryption Standard 4.2 Public-Key Cryptography & Message Authentication, Secure Hash Functions, HMAC 4.3 Internet Security Protocols and Standards, Secure E-mail and S/MIME, SSL, HTTPS 4.4 Internet Authentication Applications, Kerberos, X.509 4.5 Wireless Network Security, IEEE 802.11 Wireless LANs.

TEACHING AND LEARNING METHODS Lectures will consist of context setting, introductions to and explanations of relevant techniques and algorithms. Open discussions and references to reading material will frequently be used to widen the learning experience. The material covered in the practical sessions will reinforce the content covered in the lectures and will focus on developing the students game development and programming skills. Students will be directed to read sections of the recommended texts together with material from relevant Internet sites. They will be expected to consolidate the material after the lectures by private study. The module is offered by Blended Learning. ASSESSMENT AND FEEDBACK Coursework 1: CA1 (Worth 50% of the coursework): A closed book test midway through the module covering all taught and lab topics covered of the first six weeks. Feedback will follow within one week to assist students identify weaknesses and act as a guide for future revision. Students will be given their marks and full solutions individually. Coursework 2: CA2 (Worth 50% of the coursework): A written assignment will measure the student s ability to write a secure web service application which builds on best practice in cryptography and material covered in each lab session. Feedback will follow within one week to assist students identify weaknesses and act as a guide for future revision. Students will be given their marks and full solutions individually. Examination: A compulsory written examination lasting three hours is completed by the student at the end of the semester and students will be required to answer 4 questions out of 5. The examination is closed book. 50 % Coursework 50 % Examination READING LIST Recommended: Stallings, W., Brown, L. (2012) Computer Security: Principles and Practices: International Edition, 2/E, Pearson Higher Education, ISBN: 978-0-2737-6449-6 Eastoom, W. (2012) Computer Security Fundamentals, 2/E, Pearson Higher Education, ISBN: 978-0-7897-4890-4 Oriyano, S.P. (2012) Hacker Techniques, Tools, and Incident Handling, Jones and Bartlett Learning, ISBN: 978-0-7637-9183-4

SUMMARY DESCRIPTION This module provides an in-depth study of secure computer systems. This module will introduce the concepts and principles of secure systems. In addition, students will be given the opportunity to learn how to configure and test application and network security, deploy secure network based software applications and resolve security problems. Students will have an in-depth knowledge of basic skills in security, and an appreciation for emerging themes that could impact secure systems in the future.