* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Course Learning Objectives:
Survey
Document related concepts
Computer and network surveillance wikipedia , lookup
Cyberwarfare wikipedia , lookup
Information security wikipedia , lookup
Unix security wikipedia , lookup
Airport security wikipedia , lookup
History of cryptography wikipedia , lookup
Authentication wikipedia , lookup
Cyber-security regulation wikipedia , lookup
Security printing wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Distributed firewall wikipedia , lookup
Mobile security wikipedia , lookup
Cryptanalysis wikipedia , lookup
Cryptography wikipedia , lookup
Wireless security wikipedia , lookup
Computer security wikipedia , lookup
Post-quantum cryptography wikipedia , lookup
Transcript
ECE 478 Network Security Catalog Description: Security attacks, mechanisms, and services. Network security and access security models. Overview of secret-key and public-key cryptography. Authentication protocols and key management. Network security practice. Email security. IP security and web security. Intrusion detection and prevention systems. Firewalls and virtual private networks. Wireless network security. Prerequisites: By course: The course is open to junior and senior undergraduate & graduate students. By Topic: Computer networks and operating systems. Courses that require this as a prerequisite: ECE 575 Credits: 4 Terms Offered: Spring Instructors: Primary: Prof. Çetin Koç Textbooks: W. Stallings. Cryptography & Network Security: Principles and Practice. 3rd Edition, Prentice Hall, 2002. Course Learning Objectives: Students are expected to demonstrate the ability to: 1. Identify computer and network security threats, classify the threats and develop a security model to prevent, detect and recover from the attacks. (ABET Outcomes: a, c, e, j, k) 2. Encrypt and decrypt messages using block ciphers, sign and verify messages using well known signature generation and verification algorithms. (ABET Outcomes: c, e, k) 3. Analyze existing authentication and key agreement protocols, identify the weaknesses of these protocols. (ABET Outcomes: c, e, k) 4. Download and install an e-mail and file security software, PGP, and efficiently use the code to encrypt and sign messages. (ABET Outcomes: c, e, k) 5. Develop SSL or Firewall based solutions against security threats, employ access control techniques to the existing computer platforms such as Unix and Windows NT. (ABET Outcomes: a, c, e, i, k) 6. Write an extensive analysis report on any existing security product or code, investigate the strong and weak points of the product or code. (ABET Outcomes: a, e, i, j, k, h) Topics Introduction: Security attacks to information systems. Threat model. Security services. Mechanisms for providing confidentiality, authentication, integrity, non-repudiation, and access control. Cryptography in data and communication security. Conventional Cryptography: Cryptosystems and cryptanalysis. Block ciphers and stream ciphers. Confidentiality using encryption. Key distribution. Random number generation. Public-Key Cryptography: One-way functions. Trapdoor one-way functions. Public-key cryptosystems. RSA, Diffie-Hellman, ElGamal, and elliptic curve cryptosystems. Message Authentication and Hash Functions: Cryptographic checksums. Message authentication codes. Hash functions. Security issues. Attacks and countermeasures. Digital Signatures and Strong Authentication: Digital signatures. One-way and mutual authentication protocols. Network Security Practice: Authentication applications. Kerberos. Directory services. PGP and S/MIME. IP Security and Web security. Wireless Network Security: Wireless networking protocols and security issues. 801.11 protocols, attacks, and countermeasures. Structure: Two 100-minute lectures per week. Difference between ECE 478 and ECE 578: ECE 578 students are expected to do a project and final, while the ECE 478 students choose either project or final. Original: 4/01 Revised: 9/01 Revised: 11/03