Lecture, seminar, demonstration, and hands-on assignments/projects
1) Introduction to Security Management Practices
- information security framework (e.g. ISO17799 or COBIT)
- security models, confidentiality, integrity and available
- security evaluation criteria (e.g. TCS, ITSEC)
- risk analysis, adminstrative controls and security policies
2) Password Management And User Authentication
- password management and attack methods (e.g. dictionary attack)
- hash functions (e.g. SHA1, SHA2) and shadow password
- challenge response authentication, mutual authentication, Kerberos authentication
- man in the middle attack
3) Cryptography And Key Management
- review on crytography (e.g. perfect secrecy, cipher text)
- sysmmetric and asymmetric cryptography (e.g. block ciphers, DES, 3DES and AES)
- asymmetric crytography, message integrity and digital signature
- key exchange algorithm and key management
4) Virtual Private Network
- introduction to VPN (e.g. PPTP, Site-to-site VPN, Client based VPN)
- IPSec Negotiation, integrity checking and packet encapsulation in IPSec
- site-to-site VPN vs client-based VPN
- dead peer discovery mechanism
5) Network Infrastructure And Perimeter Protection
- firewall topology and implementation, NAT, security zone and demilitarized zone
- physical security, device redundancy, router security and VLAN switch
- port control, packet filtering, session filtering, circuit gateway, application gateway
- device based firewall vs. host based firewall
6) Protocol Security
- OSI protocol analysis and sniffing tools
- routing protocol security - RIP, OSPF, BGP routing protocols (e.g. router authentication, directed broadcast control, black hold filtering, unicast reverse path forwarding, path integrity)
- ICMP protocol security (e.g. smurf attack, ping of death, syn flooding attack)
- IP security (e.g. spoofing, hijacking, injection and DoS by connection reset)
- data link layer security issue (e.g. IP permit lists, protocol filtering and control, LAN flodding)
7) Application Level Security
- authentication applications (e.g. Kerberos, X.509, PKI)
- network service security (e.g. SNMP, DNS, NAT)
- electronic mail security (e.g. PEM, PGP, S/MIME)
- web security and e-commerce (e.g. SSL, TLS, HTTPS, SET)
- fault tolerance mechanisms
8) Intrusion Detection And Prevention
- malicious software (e.g. virus, worms, Trojan Horse), denial of service and buffer overflow attack
- network traffic signature, port scanning and activity monitoring
- host based and network based IDS deployment
- intrusion detection system and incident response
- SMTP gateway and proxy server
9) Wireless Security
- wireless architecture and standards (e.g. 802.11, 802.15, 802.16)
- SSID, shared authentication, WEP, EAP, WAP
The student will be able to:
-
describe security terminologies, management models, policy requirements and industries best practice;
-
describe security issues in OSI protocols;
-
conduct basic risk analysis and identify security vulnerability in enterprise network systems;
-
describe cryptographic algorithms, their characteristics and application to network security;
-
design and implement secure network infrastructure with network security components such as VLAN, VPN, firewall and/or proxy servers;
-
analyze network traffic and protocols using tools such as tcpdump, ethereal or other packet sniffers.
Lab Assignments 20% - 35%
Participation 0% - 10%
Quizzes 5% - 20%
Midterm Examination 25% - 30%
Final Examination 25% - 30%
-------------
Total 100%
William Stallings. Network Security Essentials: Applications and Standards. Latest edition. Prentice Hall.
OR
other textbook approved by department.
NIL
NIL
NIL