Credits and Contact Hours
3 credits, 43 hours
Course Instructor Name
Prof. Anastasios Dimitriou and Dr. Ameer Mohammed
Textbook
Network Security Essentials: Applications and Standards, William Stallings, 5th Edition
Catalog Description
Introduction to the theory and practice of computer and network security. Fundamentals of secure networks and systems. Symmetric cryptography primitives, block ciphers and modes of operation. Introduction to number theory and its applications to public key cryptography algorithms. Authentication and integrity concepts, Hash functions, Message Authentication Codes and Digital Signatures. Key distribution and management. Real-life Networking protocols (IPSec, SSL, wireless networks). TCP-IP with a threat focus and attacks. Packet filtering, Firewall, and Intrusion Detection systems. Ethical issues.
Prerequisite
CpE-300, CpE-356, and CpE-357
Specific Goals for the Course
Upon successful completion of this course, students will be able to:
Identify and classify computer and security threats and develop a security model to prevent, detect and recover from attacks. (Student outcomes: 1)
Describe and analyze well-known signature generation and verification algorithms. (Student outcomes: 1, 2)
Describe and analyze existing authentication protocols for two party communications. (Student outcomes: 1, 2).
Analyze key agreement algorithms to identify their weaknesses. (Student outcomes: 1, 2)
Develop code to implement a cryptographic algorithm or write an analysis report on any existing security product. (Student outcomes: 1, 2, 3)
Understand the SSL or firewall based solution against security threats. (Student outcomes: 7)
Describe the ethical issues related to the misuse of computer security. (Student outcomes: 4)
Topics to Be Covered
Introduction and overview of cryptography
Basic cryptographic techniques (encryption and data integrity techniques in both the symmetric and public key setting)
Message integrity and Digital signatures
Kerberos authentication
Key distribution and management
Wireless/wired network security algorithms and protocols
Internet security algorithms and protocols
Network security threats and network security protection devices