Course Outline

brickborderΑσφάλεια

3 Νοε 2013 (πριν από 3 χρόνια και 5 μήνες)

60 εμφανίσεις

Punjab University College of Information Technology, University of the Punjab






1
-
3


Course Outline


Title

NETWORK SECURITY

Code

CS
-
431

Credit Hours

3

Theory/week:


Weight 3 Cr. Hrs.


Contact
h
our
s

3 Hrs.


Lectures

d
urati
on
1.5

Hrs
. /
Lecture


Prerequisite

Computer Networks, Discrete Math

Fol low Up

None

Category

Elective

Aims and Objectives

This course provides an insight into network security. Starting with a discussion of possible threats to secure commun
ication on a
public network, we study various mechanisms that are employed to counter these threats. These include cryptographic algorithm
s,
and protocols for authentication and signature analysis, public key systems, confidentiality, integrity and non
-
rep
udiation. Internet
and Web security concepts and protocols including SSL, SHTTP, TSP, SET, Electronic Money, Email Security, WAP security will b
e
discussed in detail. Network security topics including fire walls, IP security, and Virtual Private Networks (
VPNs) will also receive
attention. Students are expected to do a group project.

Learning Outcomes

Upon completion of this course, students will:

Gain insight into the field of cryptography, and network and web security.

Understand design principles for th
e planning of secure networks.

Understand security weaknesses and implementation of security measures in E
-
mail, IP addressing, web and networks in general.

Understand Public Key systems and protocols and their implementations in various networks.

Syl l abu
s

Overview of the Network, Security threats and security mechanisms, Intro to cryptography, Classical symmetric encryption
techniques, Block ciphers, DES and Triple DES,

Overview of recent encryption algorithms, Application of symmetric encryption,
Confide
ntiality, Finding prime factors (number theory), Public key (asymmetric) cryptography, RSA, Key Distribution and
Management, Message authentication, hash functions, Digital signatures and authentication protocols, Kerberos, Electronic mai
l
security, IP Se
curity, Web security, SSL, TLS, Intrusion detection, Malicious software, Viruses and worms, Firewalls




Text Book/s

A.

Network security and cryptography , Prentice Hall,
William Stal l ings ,
2003

Reference Material

B.

Networks

perimeter security by Cliff Rigs

C.

Network Security by Eric Maiwald

D.

Biometrics for network security by Paul Reid, 2004

E.

Computer security basics by rick lehtinen, D. Russell, 2006

Instructional
Aids/Resources



Windows and
Linux Lab

for hands
-
on training



Java for
programming



Microsoft PowerPo
int



White Board and Marker



Multimedia

Assessment Criteria

Sessional 15%

Mid 35%

Final 50%

Total 100%






Quizzes, Assignment
2
5


Mid Paper 35



Final Paper
4
0



100


Recommendations


Punjab University College of Information Technology, University of the Punjab






2
-
3



W
eek

Lecture

Topic

Source

(Book
-
Chapter No.
Secti on No.)

Recommendations for Learning Activities

1

1

Introducti on
:


Securi ty Trends, OSI Securi ty archi tecture,


Chap
-
01




2

Security Basics

Security attacks, Security services, Security Mechanisms


Chap
-
01




Assignment
-
01



2

3

Introduction to
Cryptography

Symmetric Cipher Model, Substitution Technique


Chap
-
02





4

Introduction to
Steganography


Transposition Techniques, Steganography

Chap
-
02



Quiz # 01

3

5

Bl ock Ciphers and Data Encryption Stan
dard


Block cipher principles, Des


Chap
-
03


6

DES



Strength of DES, Differential and Linear Cryptanalysis
.
, Triple
Des



Chap
-
03
-
05
-
06

Programming Assignment

no 1

4

7

Bl ock cipher mode of operations
:

CBC,OFB,CFB


Chap
-
06


Assignment
-
02

8

Bl ock ciphe
r mode of operations
:

ECB, Counter


Chap
-
06


Programming assignment no 2

5

9

Stream Cipher

RC4, RC5

Chap
-
06



10

Confidential ity using symmetric encryption
:


Placement of encryption function, Traffic Confidentiality


Chap
-
07


Quiz no 2

6

11

Key distr
ibution



Chap
-
7


12

Finding Prime no factors

Fermat and Euler theorem, Chinese Remainder Theorem


Chap
-

8

Assignment
-
03

7

13

Publ ic Key Cryptography



Principles of public key, RSA




Chap
-
09

Quiz no 3

14

RSA security and Strength



Chap
-
09



8

15

Key Management


Key management


Chap
-
10


Punjab University College of Information Technology, University of the Punjab






3
-
3

16

Revision



Mid Term


9

17

Deffie Hel l man Key Exchange


Elliptic curve alogithm


Chap
-
10

Programming assignment no 3

18

Message authentication

Authentication

Requirements

, authentication functions , Mess
age
authentication codes


Chap
-
11




10

19

Hash Functions


Hash functions, Security of hash functions


Chap
-
11

Assignment
-
04

20

Hash and Mac al gorithms


SHA, Whirlpool


Chap
-
12


11

21

Digital signature and Authentication protocol s

Digital Signatures, A
uthentication protocols,


Chap13

Quiz No 4

22

DSS

Digital Signature Standard

Chap
-
13


12

23

Authentication Appl ications


K
e
rberos

Chap
-
14

Assignment
-
05

24

Kerberos V5



Chap
-
1
4


13

25

Certificates

X.509

certificates and Revocation lists

Chap
-
1
4

Project Topics Assignment

26

PKI

Public key infrastructure

Chap
-
14

Quiz no 5

14

27

Email Security

PGP

Chap
-
15


28

S
-
MIME

Chap
-
15


15

29

IP Security

IP security overview, architecture, Authentication header ,
Encapsulation of payload


Chap
-
16


30

Web Security

SSL, TLS, SET

Chap
-
17

Quiz no 6

16

31

Intrusion Detection

Intruder, Intrusion Detection, Password Management, Honey pots


Chap
-
18


32

Fire wal l s and
Mal icious

Software

Firewall Design, Trusted System

, Virus, worms, DDOS attack


Revision

F
inal

Term