Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.



Similar documents
CRYPTOG NETWORK SECURITY

CRYPTOGRAPHY AND NETWORK SECURITY

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Table of Contents. Bibliografische Informationen digitalisiert durch

Weighted Total Mark. Weighted Exam Mark

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

CSET 3100 Advanced Website Design (3 semester credit hours) IT Required

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Network Security Course Specifications

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

Information Security Course Specifications

Cryptography and network security CNET4523

Network Security Essentials:

CSE/EE 461 Lecture 23

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Tim Bovles WILEY. Wiley Publishing, Inc.

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

MS-55096: Securing Data on Microsoft SQL Server 2012

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

NETWORK ADMINISTRATION AND SECURITY

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

VALLIAMMAI ENGINEERING COLLEGE

Computer System Management: Hosting Servers, Miscellaneous

Chapter 8. Network Security

Curran, K. Tutorials. Independent study (including assessment) N/A

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

CRIPT - Cryptography and Network Security

IT Networks & Security CERT Luncheon Series: Cryptography

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

Securing Data on Microsoft SQL Server 2012

Computer and Network Security PG Unit Outline School of Information Sciences and Engineering

Introduction to Cyber Security / Information Security

information security and its Describe what drives the need for information security.

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

CPSC 467b: Cryptography and Computer Security

e-code Academy Information Security Diploma Training Discerption

University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

SCP - Strategic Infrastructure Security

BUY ONLINE FROM:

CRYPTOGRAPHY IN NETWORK SECURITY

EXAM questions for the course TTM Information Security May Part 1

Information and Communications Technology Courses at a Glance

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Wireless Mobile Internet Security. 2nd Edition

Course Outline Computing Science Department Faculty of Science. COMP Credits Computer Network Security (3,1,0) Fall 2015

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Lecture 9: Application of Cryptography

SE 4472a / ECE 9064a: Information Security

Course Syllabus. Course code: Academic Staff Specifics. Office Number and Location

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Release: 1. ICANWK502A Implement secure encryption technologies

How To Pass A Credit Course At Florida State College At Jacksonville

Client Server Registration Protocol

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from

COURSE CATALOG. BS Networking and System Administration

Cryptography & Network Security

CS Final Exam

Chapter 17. Transport-Level Security

Security + Certification (ITSY 1076) Syllabus

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Transport Level Security

Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire

Chapter 7 Transport-Level Security

Savitribai Phule Pune University

Network Security Essentials Chapter 5

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

CS 5490/6490: Network Security Fall 2015

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; /6834)

CS 450/650 Fundamentals of Integrated Computer Security

Eleventh Hour Security+

A Framework for Secure and Verifiable Logging in Public Communication Networks

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Open Source Security Tools for Information Technology Professionals

ITSY Security Assessment/Auditing Spring 2010 Professor: Zoltan Szabo D111 LEC TR 11:20AM 12:45PM D111 LAB TR 12:50PM 02:15PM

CIS 156. Firewalls and Intrusion Detection

Content Teaching Academy at James Madison University

Transcription:

CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and TCP/IP network security. Security auditing, attacks, viruses, intrusion detection and threat analysis will also be covered. Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2. References: Course web pages: http://cset.sp.utoledo.edu/~wsun/cset4850/ Related Program Outcomes (a, b, c, f, i and k): CSET Program Outcomes are (a, b, c, f, i and k) IT Program Outcomes are (a, b, c, f, and i) Course Objectives: After successful completion of this course, students will be able to: Understand secret key, message digest, and public key algorithms, and how each is used Understand and be able to use authentication and key agreement protocols. Identify attacks and efficiently block the attacks. Develop firewall based solutions against security threats, employ access control techniques to the existing computer platforms such as UNIX. Study a security related problem and recommend solutions. Major Topics Covered in the Course Topic Lecture Hours Introduction, Ethics and Expectation 3 Fundamentals of network Security Access control 1.5 Security Policies 6 Symmetric Key Cryptography 1.5 Public Key Cryptography 1.5 Key Management and Public Key Infrastructure (PKI) 1.5 Authentication 1.5 Security Design Principles 1.5 Confinement Problem 1.5 Auditing 1.5 Malicious Logic 3 Intrusion Detection 3 Network Security 4.5 System Security 3 Program Security 3 Advanced Research Topics 7.5 Total 45

Laboratory Projects: LAB 1 LAB 2 LAB 3 Final Project Laboratory/Project Title Major Tasks Network and Service Get familiar with VNetLab platform; figure out the topology Configuration of given virtual network using network tools; configure routing tables; setup dynamic services such as Web, SSH and NFS server. Hide and Seek: a network Part I, one group prepares the network with a random set of discovery game. services and dynamic traffic and then hands over to the other group for discovery; Part II, each group uses network tools such as nmap to discover the given unknown network. Firewall configuration using Develop a set of iptable rules according to the given iptables specifications. Each student will research on a specific security related topic of his/her interest, provide presentation and reports. Selected projects include study of spyware, smart grid security, log analysis, FPGA security, etc. Oral and Written Communications Lab reports and final project report/presentation. Social and Ethical Issues Topics like legal background for regulation of the Internet, Fourth Amendment Law and electronic surveillance, fundamentals of privacy law will be cited and discussed in class and homework will be assigned. Theoretical Content Various levels of Cryptographic algorithms will be discussed in the class (refer to the content table). Classical Cryptosystems: Shift ciphers, Affine cipher, Vigenere Cipher, One-time pads linear feedback shift registers. Number Theory: Modular arithmetic, Modular exponentiation, Fermat and Euler theorem. Symmetric Encryption: A simplified DES-type algorithm, DES, Modes of operation. Public Key Cryptography: RSA algorithm, Primality testing, Factoring, Public Key Cryptosystems. Digital Signatures: RSA signatures, ElGamal signatures, Hash functions (MD5 and SHA). Key Establishment and Authentication Systems: Kerberos, Public Key Infrastructure, Password Systems and Unix Salt.

Problem Analysis Analysis plays an important role in system security implementation. Analysis such as the nature of the attack, the security property of a given system is examined in the homework and lab projects. Solution Design Students will be presented various kinds of different security policies and mechanisms. Students need to develop solutions to meet their specific security requirements. Course Coordinator: Hong Wang (hong.wang2@utoledo.edu) 8-13-2007 Modified by Weiqing Sun (Weiqing.Sun@utoledo.edu) 02-24-2011

CSET CSET Student Outcomes: Course Outcomes Assessment Methods a b An ability to select and apply knowledge of computing and mathematics appropriate to the discipline. More specifically, an ability to apply mathematical foundations, algorithmic principles, and computer science theory in the modeling and design of computer based systems in a way that demonstrates comprehension of the tradeoffs involved in design choices. An ability to analyze a problem, and identify and define the computing requirements appropriate to its solution. Use contemporary encryption algorithms. Research interesting security problems. Evaluation of questions in quizzes and homework assignments associated with cryptography. Evaluation of final projects. c d e f g h i An ability to design, implement and evaluate a computer based system, process, component, or program to meet desired needs. More specifically, an ability to apply design and development principles in the construction of software systems of varying complexity. An ability to function effectively as a member or leader on technical teams to accomplish a common goal. An understanding of professional, ethical, legal, security and social issues and responsibilities including a respect for diversity. An ability to communicate effectively with a range of audiences using a range of modalities including written, oral and graphical. An ability to analyze the local and global impact of computing on individuals, organizations, and society. Recognition and understanding of the need for and an ability to engage in self directed continuing professional development. An ability to select and apply current techniques, skills, and tools necessary for computing practice. Solve practical security problems in a lab setting. Develop and deliver reasonable project reports and presentations. An understanding of the analytical and laboratory skills associated with computer and network security. j An ability to conduct standard tests and measurements; to conduct, analyze, and interpret experiments; and to apply experimental results to improve processes. k A commitment to quality, timeliness, and continuous improvement. Submit projects on time and continuously improve their projects once design issues are identified. Evaluation of hands on lab projects. Evaluation of students project reports and presentations. Evaluation of homework assignments, projects and quizzes. Evaluate students efforts in meeting deadline and improving their laboratory projects.

IT IT Student Outcomes: Course Outcomes Assessment Methods a An ability to select and apply knowledge of computing and mathematics appropriate to the discipline. Specifically, an ability to use and apply current technical concepts and practices in the core information technologies. [IT j] Use contemporary encryption algorithms. Evaluation of questions in quizzes and homework assignments associated with cryptography. b An ability to analyze a problem, and identify and define the computing requirements appropriate to its solution. Research interesting security problems. Evaluation of final projects. c An ability to design, implement, and evaluate a computer based system, process, component, or program to meet desired needs. And, an ability to identify and analyze user needs and take them into account in the selection, creation, evaluation and administration of computer based systems. [IT k] Solve practical security problems in a lab setting. Evaluation of hands on lab projects. d An ability to function effectively as a member or leader on technical teams to accomplish a common goal. e An understanding of professional, ethical, legal, security and social issues and responsibilities including a respect for diversity. f An ability to communicate effectively with a range of audiences using a range of modalities including written, oral and graphical. Develop and deliver reasonable project reports and presentations. Evaluation of students project reports and presentations. g An ability to analyze the local and global impact of computing on individuals, organizations, and society. h Recognition and understanding of the need for and an ability to engage in self directed continuing professional development. i An ability to select and apply current techniques, skills, and tools necessary for computing practice. And an ability to effectively integrate IT based solutions into the user environment. [IT l] An understanding of the analytical and laboratory skills associated with computer and network security. Evaluation of homework assignments, projects and quizzes. j An understanding of best practices and their application. [IT m] k An ability to assist in the creation of an effective project plan. [IT n]