E EC CE E4 48 89 9 N NS S

smileybloatNetworking and Communications

Nov 20, 2013 (3 years and 6 months ago)

66 views

E
E
C
C
E
E


4
4
8
8
9
9


N
N
E
E
T
T
W
W
O
O
R
R
K
K


S
S
E
E
C
C
U
U
R
R
I
I
T
T
Y
Y


(
Elective course for CPE and ELE
)

D
D
E
E
P
P
A
A
R
R
T
T
M
M
E
E
N
N
T
T
:
:

Electrical and Computer Engineering

C
C
O
O
O
O
R
R
D
D
I
I
N
N
A
A
T
T
O
O
R
R
:
:

Hong Liu, Professor

C
C
A
A
T
T
A
A
L
L
O
O
G
G


D
D
E
E
S
S
C
C
R
R
I
I
P
P
T
T
I
I
O
O
N
N
:
:




Principles and practices of security in computer networks. This course covers the theoretical
foundations of securing computer networks including cryptography and models. It steps
through the practical process of defending networking resources. It also reveals various case
studies, large and small, to familiarize the techniques that attackers use.
An Internet Testbed
is facilitated for students to experiment attacks and defenses.

P
P
R
R
E
E
R
R
E
E
Q
Q
U
U
I
I
S
S
I
I
T
T
E
E
S
S


B
B
Y
Y


T
T
O
O
P
P
I
I
C
C
:
:


1.

Introduction to Computer Networks (ECE 469).

C
C
O
O
U
U
R
R
S
S
E
E


S
S
T
T
R
R
U
U
C
C
T
T
U
U
R
R
E
E
:
:


3


0


3 (class hours per week
-

laboratory hours per week
-

credits)

T
T
E
E
X
X
T
T
B
B
O
O
O
O
K
K
:
:


Wil
liam Stallings,
Cryptography and Network Security: Principles and Practice
, Third
Edition.

Prentice Hall, 2003.

C
C
O
O
N
N
T
T
R
R
I
I
B
B
U
U
T
T
I
I
O
O
N
N


O
O
F
F


C
C
O
O
U
U
R
R
S
S
E
E


T
T
O
O


M
M
E
E
E
E
T
T
I
I
N
N
G
G


T
T
H
H
E
E


P
P
R
R
O
O
F
F
E
E
S
S
S
S
I
I
O
O
N
N
A
A
L
L


C
C
O
O
M
M
P
P
O
O
N
N
E
E
N
N
T
T
:
:


(a) College
-
level mathematics and basic sciences:

0 credits

(b) Engineering topics

(science and/or design):

3 credits

(c) General education:

0 credits


________________________________
________________________________
________________________________
__________________


R
R
E
E
L
L
A
A
T
T
I
I
O
O
N
N
S
S
H
H
I
I
P
P


T
T
O
O


P
P
R
R
O
O
G
G
R
R
A
A
M
M


O
O
U
U
T
T
C
C
O
O
M
M
E
E
S
S


Students who successfully complete this course meet the following ABET program
outcomes:


[CPE program outcomes]

[ELE program outcomes]


(a)

[3h, 3j]

(a
)

[3h]


(b)

[6a, 6c, 6d]

(b)

[6a, 6c, 6d]


(e)

[7]

(e)

[7]


(f)

[11]

(f)

[11]


(g)

[10a, 10b]

(g)

[10a, 10b]


(i)

[13]

(i)

[13]


(j)

[11]

(j)

[11]

ECE 489


Network Security

(
Elective course for CPE and ELE
)

C
C
O
O
U
U
R
R
S
S
E
E


L
L
E
E
A
A
R
R
N
N
I
I
N
N
G
G


O
O
B
B
J
J
E
E
C
C
T
T
I
I
V
V
E
E
S
S
/
/
O
O
U
U
T
T
C
C
O
O
M
M
E
E
S
S


A
A
N
N
D
D


R
R
E
E
L
L
A
A
T
T
I
I
O
O
N
N
S
S
H
H
I
I
P
P


T
T
O
O


P
P
R
R
O
O
G
G
R
R
A
A
M
M


O
O
U
U
T
T
C
C
O
O
M
M
E
E
S
S
:
:


This senior
-
level course is a technical elective for CPE majors. The objectives of the course
are:

1.

To understand security issues with computer software and systems.
(3h, j)

2.

To apply security techniques in practical situations by
designing experiments,
collecting/interpreting data, and documenting findings.
(6a, c, d)

3.

To solve real world engineering problems related to security.
(7)

4.

To communicate effectively on a team project experimenting the Internet security
products and propos
ing security procedures.
(10a, b)

5.

To understand professional and ethical responsibility in software development related to
security and privacy.
(11)

6.

To engage in lifelong learning. (
13)

T
T
O
O
P
P
I
I
C
C
S
S


C
C
O
O
V
V
E
E
R
R
E
E
D
D
:
:


1.

Course Introduction:

Legal/Ethic Issues in
Network Se
curity

(1 week)


Challenges of Network Security

1.

Security Techniques:

A.

Steganography
-

invisible

(1 week)


B.

Encryption
-

unintelligible

(4 weeks)

(1)

Symmetric:

conventional model



algorithm (DES)



analysis (confidentiality)

(2)

Asymmetric:

public
-
key

model



algorithm (RSA & Diffie
-
Hellman KeyX)



analysis (number theory)


C.

Authentication
-

identity (origin) & integrity (modification)

(1).

Principles:

hash functions

(2 weeks)

(2).

Protocols:

digital signatures

2.

Security Practices:

A.

Client/Server:

K
erberos

(1 week)



X.509 Authentication Service

B.

E
-
Mail:

PGP

(1 week)



S/MIME

C.

Web:

SSL

(1 week)



TLS

D.

System:

Intrusion Detection

(2 weeks)



Malicious Software (viruses)



Firewall

4.

Research Direction in Network Security:

(1 week)

5.

Team Project:

Ex
periment security holes with the Internet security free/shareware and
propose better security procedures



P
P
R
R
E
E
P
P
A
A
R
R
E
E
D
D


B
B
Y
Y
:
:

Hong Liu

D
ATE
:

March 2004

U
U
P
P
D
D
A
A
T
T
E
E
D
D


B
B
Y
Y
:
:

Hong Liu

D
ATE
:

March 2004