0% found this document useful (0 votes)
79 views

TECH3701 Security June 2005

This module provides an introduction to system and network security. It aims to teach students the security principles, network security issues, security standards, and practical security knowledge. The module covers topics such as symmetric and public-key encryption techniques, network security practices including authentication and email security, system security threats like intruders and malware, and firewalls. Assessment includes a written exam and continuous assessments. The module is delivered through lectures, practical work, discussions, projects, and case studies.

Uploaded by

conor1990
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
79 views

TECH3701 Security June 2005

This module provides an introduction to system and network security. It aims to teach students the security principles, network security issues, security standards, and practical security knowledge. The module covers topics such as symmetric and public-key encryption techniques, network security practices including authentication and email security, system security threats like intruders and malware, and firewalls. Assessment includes a written exam and continuous assessments. The module is delivered through lectures, practical work, discussions, projects, and case studies.

Uploaded by

conor1990
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Dublin Institute of Technology

Pre-Requisite Co-Requisite ECTS Module Code Module Title


Modules Modules Credits
code(s) code(s)
None None 5
TECH3701 Security

Module author: Fredrick Japhet Mtenzi.

Module Description:
Our computing usage nowadays is adversely affected by computer viruses, worms, spyware,
poorly designed software, and inadequate technology laws. New technological innovations
such as file sharing software and location based tracking tools have major political,
economical and social implications. These problems are aggravated by extensive use of
communication tools such as Internet and Email, our lack of basic knowledge and
understanding of security implications resulting in some cases in suffocation of technological
advancement.
The aim of this course is to provide an understanding of the issues involved in providing
system security underpinned with a strong practical basis in encryption and system security
techniques. Further, the course will describe, and discuss the challenges faced by the society
and computing industry.

Module aim
The aim of this module is:
• to introduce the students to the security principles,
• to give the students a thorough understanding of the network security issues,
• to provide them with sound knowledge of security standards,
• to provide them with an in-depth practical security knowledge in real-life.

Learning Outcomes:
On successful completion of this module, the learner will be able to:
• Define and describe network security,
• Discuss and relate the fundamental concepts of Security,
• List and outline various encryption techniques,
• Explain the principles behind various encryption techniques,
• Give examples of usage in practice of encryption techniques,
• Classify and analyse the nature and threat from viruses, worms, spyware,
• Design and develop best practice techniques of security,
• List national, regional and international security standards.

Learning and Teaching Methods:


The following learning and teaching methods will be used throughout the course: Lectures,
Practical work in class, Discussion, Project work, and Case study.

Module content:
Introduction to system security and cryptography
Symmetric Ciphers: Classical encryption Techniques, Data Encryption Standard and
Advanced Encryption Standard
Public-Key Encryption and hash Functions: Public-Key Cryptography, Message
Authentication, Digital Signatures, and Authentication Protocols.
Network Security Practice: Authentication Applications, Electronic Mail Security, IP
Security, Web Security.
System Security: Intruders, Viruses, Worms and Spyware, Firewalls
Digital payment, security issues.

Module Assessment :
The following methods will be used for assessment:
• Written Examination 70%
• Continuous Assessments 30%

Essential Reading:
1. William Stallings, 2003, Cryptography and Network Security: Principles and Practice,
Prentice Hall
2. Seymour Bosworth, M.E. Kabay, 2002, Computer Security Handbook, John Wiley &
Sons. Inc.
3. Raymond R. Panko, 2004, Corporate Computer and Network Security, Prentice hall
Supplemental Reading:
1. Bruce Schneier, 1996, Applied Cryptography: Protocols, Algorithms, and Source Code in
C, John Wiley & Sons. Inc.
2. Andrew Lockhart, 2004, Network Security Hacks 100 Industrial-Strength Tips & Tools,
O'Reilly
3. Bruce Schneier, 2004, Secrets and Lies: Digital Security in a Networked World, Hungry
Minds Inc
4. IEEE security & privacy
5. ACM Transactions on Information and System Security (TISSEC)
6. http://www.sans.org/rr/
Further Details:
2 hours of lecture 1 hour lab per week One semester long module

Date of Academic Council Approval: June 2005

You might also like