Download Course Learning Objectives:

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Computer and network surveillance wikipedia , lookup

Cyberwarfare wikipedia , lookup

Information security wikipedia , lookup

Unix security wikipedia , lookup

Airport security wikipedia , lookup

History of cryptography wikipedia , lookup

Authentication wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Security printing wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Distributed firewall wikipedia , lookup

Mobile security wikipedia , lookup

Cryptanalysis wikipedia , lookup

Cryptography wikipedia , lookup

Wireless security wikipedia , lookup

Computer security wikipedia , lookup

Post-quantum cryptography wikipedia , lookup

Security-focused operating system wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Transcript
ECE 478
Network Security
Catalog Description: Security attacks, mechanisms, and services. Network security and
access security models. Overview of secret-key and public-key cryptography. Authentication
protocols and key management. Network security practice. Email security. IP security and
web security. Intrusion detection and prevention systems. Firewalls and virtual private
networks. Wireless network security.
Prerequisites:
By course: The course is open to junior and senior undergraduate & graduate students.
By Topic: Computer networks and operating systems.
Courses that require this as a prerequisite: ECE 575
Credits: 4
Terms Offered: Spring
Instructors:
Primary: Prof. Çetin Koç
Textbooks:
W. Stallings. Cryptography & Network Security: Principles and Practice. 3rd Edition,
Prentice Hall, 2002.
Course Learning Objectives:
Students are expected to demonstrate the ability to:
1. Identify computer and network security threats, classify the threats and develop a
security model to prevent, detect and recover from the attacks. (ABET Outcomes: a, c,
e, j, k)
2. Encrypt and decrypt messages using block ciphers, sign and verify messages using well
known signature generation and verification algorithms. (ABET Outcomes: c, e, k)
3. Analyze existing authentication and key agreement protocols, identify the weaknesses of
these protocols. (ABET Outcomes: c, e, k)
4. Download and install an e-mail and file security software, PGP, and efficiently use the
code to encrypt and sign messages. (ABET Outcomes: c, e, k)
5. Develop SSL or Firewall based solutions against security threats, employ access control
techniques to the existing computer platforms such as Unix and Windows NT. (ABET
Outcomes: a, c, e, i, k)
6. Write an extensive analysis report on any existing security product or code, investigate
the strong and weak points of the product or code. (ABET Outcomes: a, e, i, j, k, h)
Topics
 Introduction: Security attacks to information systems. Threat model. Security services.
Mechanisms for providing confidentiality, authentication, integrity, non-repudiation, and
access control. Cryptography in data and communication security.






Conventional Cryptography: Cryptosystems and cryptanalysis. Block ciphers and
stream ciphers. Confidentiality using encryption. Key distribution. Random number
generation.
Public-Key Cryptography: One-way functions. Trapdoor one-way functions. Public-key
cryptosystems. RSA, Diffie-Hellman, ElGamal, and elliptic curve cryptosystems.
Message Authentication and Hash Functions: Cryptographic checksums. Message
authentication codes. Hash functions. Security issues. Attacks and countermeasures.
Digital Signatures and Strong Authentication: Digital signatures. One-way and mutual
authentication protocols.
Network Security Practice: Authentication applications. Kerberos. Directory services.
PGP and S/MIME. IP Security and Web security.
Wireless Network Security: Wireless networking protocols and security issues. 801.11
protocols, attacks, and countermeasures.
Structure: Two 100-minute lectures per week.
Difference between ECE 478 and ECE 578: ECE 578 students are expected to do a project
and final, while the ECE 478 students choose either project or final.
Original: 4/01
Revised: 9/01
Revised: 11/03