Course Outline Computing Science Department Faculty of Science. COMP 3260 3 Credits Computer Network Security (3,1,0) Fall 2015

Similar documents
Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Implementing Cisco IOS Network Security

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

Security + Certification (ITSY 1076) Syllabus

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Network Security Essentials:

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

Weighted Total Mark. Weighted Exam Mark

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

Eleventh Hour Security+

Detailed Description about course module wise:

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Network Security Fundamentals

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

PRINCE GEORGE'S COMMUNITY COLLEGE OFFICE OF INSTRUCTION MASTER COURSE SYLLABUS

The Information Security Problem

Description: Objective: Attending students will learn:

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

BUY ONLINE FROM:

Cryptography and network security CNET4523

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Fundamentals of Network Security - Theory and Practice-

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

CRYPTOGRAPHY AND NETWORK SECURITY

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

IINS Implementing Cisco Network Security 3.0 (IINS)

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

form approved June/2006 revised Page 1 of 7

CISCO IOS NETWORK SECURITY (IINS)

A Systems Engineering Approach to Developing Cyber Security Professionals

CompTIA Security+ Certification Study Guide. (Exam SYO-301) Glen E. Clarke. Gravu Hill

CEH Version8 Course Outline

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

Table of Contents. Introduction. Audience. At Course Completion

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Higher National Unit specification: general information

CPSC 467: Cryptography and Computer Security

CCNA Security v1.0 Scope and Sequence

Jort Kollerie SonicWALL

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer

Principles of Information Assurance Syllabus

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Introduction to Cyber Security / Information Security

CYBERTRON NETWORK SOLUTIONS

How To Pass A Credit Course At Florida State College At Jacksonville

Certified Cyber Security Analyst VS-1160

Build Your Own Security Lab

Networking: EC Council Network Security Administrator NSA

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Network Security Bible Dr. Eric Cole, Dr. Ronald Krutz, and James W. Conley WILEY

Computer Security (EDA263 / DIT 641)

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

UVic Department of Electrical and Computer Engineering

CRYPTOG NETWORK SECURITY

CRIPT - Cryptography and Network Security

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Lesson Plans Security+

Security Goals Services

Implementing Cisco IOS Network Security v2.0 (IINS)

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

Network Security and Firewall 1

INFORMATION SECURITY TRAINING

information security and its Describe what drives the need for information security.

Network Security: Introduction

Sophos Certified Architect Course overview

Chapter 8. Network Security

IT Networks & Security CERT Luncheon Series: Cryptography

Diploma in Information Security Control, Audit and Management (CISSP Certification)

Syllabus. No: CIS 200. Title: Fundamentals of Network Security. Credits: 4. Coordinator: Dr. B. Dike-Anyiam, Computer Science & Networking Lecturer

CCNA Security 2.0 Scope and Sequence

6. ecommerce Security and Payment Systems. Alexander Nikov. Teaching Objectives. Video: Online Banking, Is It Secure?

Wireless Mobile Internet Security. 2nd Edition

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Security aspects of e-tailing. Chapter 7

Monfort College of Business Semester Course Syllabus ( ) COURSE PREFIX/TITLE: BACS 382 TCP/IP Network Security Sem. Hrs. 3 Ed.

Bellevue University Cybersecurity Programs & Courses

GSEC GIAC Security. Essentials Certification ONE ALL IN EXAM GUIDE. Ric Messier. Singapore Sydney Toronto

CCNA Security v1.0 Scope and Sequence

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

Skoot Secure File Transfer

CompTIA Security+ (Exam SY0-410)

VOICE OVER IP SECURITY

Computer and Network Security PG Unit Outline School of Information Sciences and Engineering

[CEH]: Ethical Hacking and Countermeasures

CS 356 Lecture 28 Internet Authentication. Spring 2013

Transcription:

Course Outline Computing Science Department Faculty of Science COMP 30 3 Credits Computer Network Security (3,,0) Fall 05 Instructor: E-Mail: Phone/Voice Mail: Office: Office Hours: CALENDAR DESCRIPTION Students explore how information is exchanged on the Internet and the security issues that arise due to information exchange between different technologies. Students learn concepts of authentication, authorization, access control in computer networks. Students gain knowledge about Use of cryptography for data and network security. Students are introduced to the topics such as firewalls, public key infrastructure, security standards and protocols, virtual private networks, and wireless network security. Students also explore privacy, legal issues and ethics in context of network security. PREREQUISITES COMP 370 EDUCATIONAL OBJECTIVES/OUTCOMES Upon successful completion of the course, the student will demonstrate the ability to:. Understand vulnerability in a computer system.. Explain useful and common tools used by the attacker 3. Understand basic concept of how to protect and design private network. 4. Understand how to protect security of information. 5. Use theoretical and practical knowledge in securing data transfer and authentication. TEXTS/MATERIALS The course uses the following texts: B. Network Security, Firewalls, and VPNS, by J. Michael Stewart, 00, ISBN 0: 0737930X B. Cryptography and Network Security: Principles and Practices by W.Stallings, Prentice Hall, 5 th Edition, ISBN-0: 03097049 B3. Principles of Computer Security: CompTIA Security+ and Beyond by Wm.A. Conklin et al., McGraw Hill, 3 rd Edition, ISBN-0: 0077898 B4. CompTIA Security+ Guide to Network Security Fundamentals, Mark Ciampa, 5 th Edition, ISBN- 0: 30509397 Ref5. Privacy Legislation in Canada, [online] https://www.priv.gc.ca

SYLLABUS - Lecture & Lab Topics: Course Topics. Introduction. Computer Security Concepts. The OSI Security Architecture.3 Security Attacks.4 Security Services.5 Security Mechanisms. A Model for Network Security.7 Recommended Reading and Web Sites. Network Security. Security Through Network Devices. Security Through Network Technology.3 Security Through Network Design Elements 3. Firewalls 3. The Need for Firewalls 3. Firewall Characteristics 3.3 Types of Firewalls 3.4 Firewall Basing 3.5 Firewall Location and Configurations 3. Recommended Reading and Web Sites 4. Cryptography 4. Algorithms 4. Hashing Functions 4.3 Symmetric Encryption 4.4 Asymmetric Encryption 4.5 Quantum Cryptography 4. Steganography 5. Public Key Infrastructure. Security Standards and Protocols 4.7 Cryptography Algorithm Use 5. The Basics of Public Key Infrastructures 5. Certificate Authorities 5.3 Registration Authorities 5.4 Certificate Repositories 5.5 Trust and Certificate Verification 5. Digital Certificates 5.7 Centralized and Decentralized Infrastructures 5.8 Public Certificate Authorities 5.9 In-House Certificate Authorities 5.0 Certificate-Based Threats. PKIX and PKCS. X.509.3 SSL/TLS.4 ISAKMP.5 CMP Reference to TextBook B-Chapter B4-Chapter B-Chapter 5 7 Duratio n.5

7. Authentication and Remote Access 8. Virtual Private Networks 9. Wireless Network Security 0. Privacy, Legal Issues and Ethics. XKMS.7 S/MIME.8 PGP.9 HTTPS.0 IPsec. CEP. FIPS.3 Common Criteria for Information Technology Security (Common Criteria or CC).4 WTLS.5 PPTP. WEP.7 ISO/IEC 700 7. The Remote Access Process 7. IEEE 80.X 7.3 RADIUS 7.4 TACACS+ 7.5 Authentication Protocols 7. FTP/FTPS/SFTP 7.7 VPNs 7.8 IPsec 7.9 Vulnerabilities of Remote Access Methods 8. VPN Fundamentals 8. VPN Management 8.3 VPN Technologies 9. Introduction to Wireless Networking 9. Mobile Phones 9.3 Bluetooth 9.4 80.: Attacking, New Security Protocols, and Implementation 0. Cybercrime 0. Ethics 0.3 Personally Identifiable Information (PII) 0.4 U.S. Privacy Laws 0.5 Privacy Legislation in Canada B3- Chapter B-Chapter 3 & B- Chapter & B- Chapter 4 & 5 & Ref 5.5 Lab Topics Duration Examining and Implementation of a Simple Block Cypher Firewall Implementation and Testing Implementation of Public Key Crypto-System Demonstration of Security Protocols 3

Exercise on Authentication Protocols Demonstration and Setup VPN Experiments on Wireless Security ACM / IEEE Knowledge Area Coverage IEEE Knowledge Areas that contain topics and learning outcomes covered in the course Knowledge Area IAS/Foundational Concepts in Security IAS/Threats and Attacks IAS/Network Security IAS/Cryptography Total Hours of Coverage IEEE Body of Knowledge coverage KA Knowledge Unit Topics Covered T hours IAS/Foundational Concepts in Security IAS/Threats and Attacks CIA (Confidentiality, Integrity, Availability) Concepts of risk, threats, vulnerabilities, and attack vectors (cros- reference SE/Software Project Management/Risk) Authentication and authorization, access control (mandatory vs. discretionary) Concept of trust and trustworthiness Ethics (responsible disclosure). (crossreference SP/Professional Ethics/Accountability, responsibility and liability) Attacker goals, capabilities, and motivations (such as underground economy, digital espionage, cyberwarfare, insider threats, hacktivism, advanced persistent threats) Examples of malware (e.g., viruses, worms, spyware, botnets, Trojan horses or rootkits) Denial of Service (DoS) and Distributed Denial of Service (DDoS) Social engineering (e.g., phishing) (cross-reference SP/Social Context/Social implications of computing in a networked world and HCI/Designing Interaction/Handling human/system failure) 4 3 T hour s Electiv e hours

IAS/Network Security IAS/Cryptography Describe likely attacker types against a particular system. [Familiarity]. Discuss the limitations of malware countermeasures (e.g., signature-based detection, behavioral detection). [Familiarity] 3. Identify instances of social engineering attacks and Denial of Service attacks. [Familiarity] 4. Discuss how Denial of Service attacks can be identified and mitigated. [Familiarity] Network specific threats and attack types (e.g., denial of service, spoofing, sniffing and traffic redirection, man-in-the-middle, message integrity attacks, routing attacks, and traffic analysis) Use of cryptography for data and network security Architectures for secure networks (e.g., secure channels, secure routing protocols, secure DNS, VPNs, anonymous communication protocols, isolation) Defense mechanisms and countermeasures (e.g., network monitoring, intrusion detection, firewalls, spoofing and DoS protection, honeypots, tracebacks) Describe the different categories of network threats and attacks. [Familiarity]. Describe the architecture for public and private key cryptography and how public key infrastructure (PKI) supports network security. [Familiarity] 3. Describe virtues and limitations of security technologies at each layer of the network stack. [Familiarity] 4. Identify the appropriate defense mechanism(s) and its limitations given a network threat. [Familiarity] Basic Cryptography Terminology covering notions pertaining to the different (communication) partners, secure/unsecure channel, attackers and their capabilities, encryption, decryption, keys and their 5 4

characteristics, signatures Cipher types (e.g., Caesar cipher, affine cipher) together with typical attack methods such as frequency analysis Public Key Infrastructure support for digital signature and encryption and its challenges