Module 20009 (2009)
Syllabus page 2009/2010
06-20009
Network Security
Level 4/M
Links | Outline | Aims | Outcomes | Prerequisites | Teaching | Assessment | Books | Detailed Syllabus
The Module Description is a strict subset of this Syllabus Page. (The University module description has not yet been checked against the School's.)
Relevant Links
Outline
The module introduces the threats and attacks which may be perpetrated on computer networks, and some of the mechanisms designed to address them. Some technology case studies are presented and evaluated.
Aims
The aims of this module are to:
- introduce the basic terminology, concepts, and mechanisms of network security
- explain network threats, vulnerabilities, and attacks
- present security algorithms and protocols as countermeasures
Learning Outcomes
| On successful completion of this module, the student should be able to: | Assessed by: | |
| 1 | explain network vulnerabilities and attacks | Examination |
| 2 | explain and evaluate security mechanisms designed to address such attacks | Examination |
| 3 | design networking security solutions appropriate for a given application and situation | Examination, Continuous Assessment |
Restrictions, Prerequisites and Corequisites
Restrictions:
None
Prerequisites:
06-05933 (Computer Networks) (or 06-18150 (Computer Networks (Extended)) as a co-requisite)
Co-requisites:
06-17417 (Computer Security), 06-18150 (Computer Networks (Extended)) (or 06-05933 (Computer Networks) as a prerequisite)
Teaching
Teaching Methods:
Lectures
Contact Hours:
Assessment
- Sessional: 1.5 hr examination (80%), continuous assessment (20%).
- Supplementary (where allowed): By examination only.
- The continuous assessment will consist of a report.
Recommended Books
| Title | Author(s) | Publisher, Date |
| Cryptography and Network Security, Principles and Practice (4th ed.) | William Stallings | Prentice Hall, 2006 |
| Security in Computing (4th ed.) | C Pfleeger & S Pfleeger | Prentice Hall, 2006 |
| Internet and Intranet Security (2nd ed.) | Rolf Oppliger | Artech House, 2002 |
Detailed Syllabus
-
Network Architecture
- TCP, UDP, IP (IPv4, IPv6)
- Network Security
- Threats, vulnerabilities, and attacks
- Countermeasures
- Security Protocols
- Authentication Protocols: Kerberos, DAA
- Fair Exchange Protocols
- Electronic Commerce: SET, digital cash
- Intrusion Detection Systems
- Goals of IDS
- Types of IDS
- Web Security
- Network level: IPSec
- Transport level: SSL/TLS
- Secure E-Mail
- Security for E-Mail
- S/MIME
- PEM (Privacy Enhanced Email)
- Firewalls and Tunnels
- Packet filter
- Application-level filter
- Circuit-level gateway
- Secure shell (ssh)
- VPNs
- Wireless Network Security
- RC4
- WEP
- IEEE 802.11i: WPA, WPA2
Last updated: 24 Feb 2008
Source file: /internal/modules/COMSCI/2009/xml/20009.xml
Links | Outline | Aims | Outcomes | Prerequisites | Teaching | Assessment | Books | Detailed Syllabus