COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus



Similar documents
Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Curran, K. Tutorials. Independent study (including assessment) N/A

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Information Security Course Specifications

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

Weighted Total Mark. Weighted Exam Mark

Network Security Essentials:

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

Course Outline Computing Science Department Faculty of Science. COMP Credits Computer Network Security (3,1,0) Fall 2015

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

Computer and Network Security PG Unit Outline School of Information Sciences and Engineering

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

Information, Network & Cyber Security

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Computer Security (EDA263 / DIT 641)

Securing Data on Microsoft SQL Server 2012

CRYPTOGRAPHY AND NETWORK SECURITY

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

MS-55096: Securing Data on Microsoft SQL Server 2012

Network Security SWISS GERMAN UNIVERSITY. Administration Charles Lim

Information Security Basic Concepts

Cryptography and network security CNET4523

CSCI 454/554 Computer and Network Security. Final Exam Review

Section 12 MUST BE COMPLETED BY: 4/22

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

CIS 253. Network Security

CRYPTOG NETWORK SECURITY

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

Fundamentals of Network Security - Theory and Practice-

Certified Ethical Hacker Exam Version Comparison. Version Comparison

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

Chapter 7 Transport-Level Security

e-code Academy Information Security Diploma Training Discerption

Network Security Course Specifications

EECS 588: Computer and Network Security. Introduction January 14, 2014

Security + Certification (ITSY 1076) Syllabus

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Content Teaching Academy at James Madison University

CS 464/564 Networked Systems Security SYLLABUS

University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course

Information Security

CPSC 467: Cryptography and Computer Security

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer

The Information Security Problem

NETWORK ADMINISTRATION AND SECURITY

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Skoot Secure File Transfer

Distributed Public Key Infrastructure via the Blockchain. Sean Pearl April 28, 2015

Certificate in Cyber Security

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

IT Networking and Security

Eleventh Hour Security+

Diploma in Information Security Control, Audit and Management (CISSP Certification)

Bellevue University Cybersecurity Programs & Courses

6. ecommerce Security and Payment Systems. Alexander Nikov. Teaching Objectives. Video: Online Banking, Is It Secure?

Jort Kollerie SonicWALL

EECS 588: Computer and Network Security. Introduction

Why Security Matters. Why Security Matters. 00 Overview 03 Sept CSCD27 Computer and Network Security. CSCD27 Computer and Network Security 1

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

Data Encryption and Network Security

CNT Computer and Network Security Review/Wrapup

How To Protect Your Data From Attack

How To Pass A Credit Course At Florida State College At Jacksonville

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Build Your Own Security Lab

CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; /6834)

Mobile Office Security Requirements for the Mobile Office

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

CEH Version8 Course Outline

Chapter 17. Transport-Level Security

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

CESG Certification of Cyber Security Training Courses

Human Factors in Information Security

CCNA Security v1.0 Scope and Sequence

Information Security and Cryptography

BUY ONLINE FROM:

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

CISA TIMETABLE (4 DAYS)

Transcription:

COMP-530 Cryptographic Systems Security *Requires Programming Background University of Nicosia, Cyprus Course Code Course Title ECTS Credits COMP-530 Cryptographic Systems 10 Security Department Semester Prerequisites Computer Science Fall/Spring/Summer DFIN-511 Type of Course Field Language of Instruction Elective Computer Science English Level of Course Year of Study Lecturer(s) 2 nd Cycle 2 nd Dr Ioanna Dionysiou Mode of Delivery Work Placement Co-requisites Distance Learning N/A None Objectives of the Course: The main objectives of the course are to: appreciate the need for computer and network security practices as well as information protection in digital currencies frameworks. provide students with knowledge on various concepts of classical computer and network security paradigms and their application/utilization by digital currency applications. expose students to techniques to manage security threats in digital currency frameworks by means of contemporary host-based and network-based intrusion detection/prevention tools, physical security measures, auditing, logging. expose students to best practices that enhance security in digital currency frameworks. Learning Outcomes: After completion of the course students are expected to be able to: 1. explain the use of cryptography concepts such as symmetric/asymmetric encryption, digital signatures, and hash functions by various digital currency frameworks. 2. identify computer and network attacks (denial of service, flooding, sniffing and traffic redirection, inside attacks, etc.) and basic defense tools 3. assess the security framework of various digital currency applications and discuss its vulnerabilities that could be exploited by intentional and unintentional attacks 4. explain policies, procedures and best practices that strengthen the security framework of digital currency applications 5. appreciate the importance of ethics as a network security practitioner Course Contents: 1. Motivation of security and introduction of basic security services a. Preliminary assessment of security in various digital currency

frameworks 2. Symmetric Ciphers Classical Encryption techniques, Symmetric Encryption, Block Ciphers a. Applications of symmetric encryption in digital currency operations 3. Asymmetric Ciphers Asymmetric Encryption, Public-Key cryptography, Key exchange protocols a. Applications of asymmetric encryption in digital currency operations 4. Cryptographic Hash Functions, Message Authentication Codes, Digital Signatures a. Utilization of hash functions (and/or MAC) in digital currency frameworks 5. Key Management and Distribution a. Key management procedures among digital currency framework entities (owners, miners, traders, etc.) 6. User authentication (password-based, token-based, biometric) techniques and authentication protocols (Kerberos, PKI) a. User identification and verification schemes in current digital currency frameworks b. Anonymity issues 7. IP Security and Web Security a. Security assessment of the communication framework of digital currencies 8. Computer and network threats and attacks a. Introduction of threats - Viruses, worms, denial of service attacks, flooding, sniffing and traffic redirection, exploit attacks. b. Threats to digital currency systems wallet password sniffing, wallet contents corruption, mobile wallet vulnerabilities, denial of service for decentralized ledgers, exploiting vulnerabilities to destabilize the system, botnet attacks via malware infection, etc. 9. Contemporary network defence countermeasures a. Host-based and network-based intrusion systems (e.g. snort, and other open source tools), firewalls, anti-virus software to protect from and/or detect intrusions mentioned above. 10. Comprehensive Security Framework for Digital Currencies a. Revisit assessment of security in various digital currency frameworks 11. Determine policies, procedures, and best practices to secure digital currencies transactions, including transmission of digital currencies and storage of digital currencies a. Certification standards for protecting assets (ISO 27001 family) and their applicability to online wallets managed by third parties, cold storages and offline storages. b. Desktop wallets, mobile wallets, hardware wallets 12. Legal, ethical, and professional aspects of network security practices Learning Activities and Teaching Methods: Lectures and case studies

Assessment Methods: Written and programming assignments, mid-term exam, final exam Required Textbooks/Reading: Authors Title Publisher Year ISBN W. Stallings Cryptography and Network Security: Principles and Practice, 6th Edition Prentice Hall 2013 0133354695 W. Stallings Network Security Essentials: Applications and Standards, 4 th edition Prentice Hall 2010 0136108059 Recommended Textbooks/Reading: Authors Title Publisher Year ISBN R. Anderson Security Engineering: A Guide to Building Dependable Distributed Systems, Second Edition John Willey and Sons 2008 047006852 3 Recommended Articles / Reading List: S. Barber, X. Boyen, E. Shi, and E. Uzun, Bitter to better how to make bitcoin a better currency, in Financial Cryptography 2012, vol. 7397 of LNCS, 2012, pp. 399 414. L. Garber, "News Briefs -Attacks Target Bitcoin Virtual Currency Computer, vol. 46, no. 5, pp. 19-21, May, 2013 S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, 2009, 2012. [Online]. Available: http://www.bitcoin.org/ bitcoin.pdf Miers, C. Garman, M. Green, A. D. Rubin, Zerocoin: Anonymous Distributed E- Cash from Bitcoin, in 2013 IEEE Symposium on Security and Privacy, San Francisco, CA, 2013, pp 397-411. M. E. Peck, Bitcoin: The Cryptoanarchists Answer to Cash, IEEE Spectrum, June 2012. [Online]. Available: http://spectrum.ieee.org/computing/software/bitcoin-the-cryptoanarchists-answerto-cash M. E. Peck, What You Need to Know About Mt. Gox and the Bitcoin Software Flaw, IEEE Spectrum, February 2014. [Online]. Available: http://spectrum.ieee.org/tech-talk/computing/networks/what-you-need-to-knowabout-mt-gox-and-the-bitcoin-software-flaw

F. Reid and M. Harrigan, An analysis of anonymity in the Bitcoin system, in Privacy, security, risk and trust (PASSAT), 2011 IEEE Third International Conference on Social Computing (SOCIALCOM). IEEE, 2011, pp. 1318 1326.