TECH3701 Security June 2005
TECH3701 Security June 2005
Module Description:
Our computing usage nowadays is adversely affected by computer viruses, worms, spyware,
poorly designed software, and inadequate technology laws. New technological innovations
such as file sharing software and location based tracking tools have major political,
economical and social implications. These problems are aggravated by extensive use of
communication tools such as Internet and Email, our lack of basic knowledge and
understanding of security implications resulting in some cases in suffocation of technological
advancement.
The aim of this course is to provide an understanding of the issues involved in providing
system security underpinned with a strong practical basis in encryption and system security
techniques. Further, the course will describe, and discuss the challenges faced by the society
and computing industry.
Module aim
The aim of this module is:
• to introduce the students to the security principles,
• to give the students a thorough understanding of the network security issues,
• to provide them with sound knowledge of security standards,
• to provide them with an in-depth practical security knowledge in real-life.
Learning Outcomes:
On successful completion of this module, the learner will be able to:
• Define and describe network security,
• Discuss and relate the fundamental concepts of Security,
• List and outline various encryption techniques,
• Explain the principles behind various encryption techniques,
• Give examples of usage in practice of encryption techniques,
• Classify and analyse the nature and threat from viruses, worms, spyware,
• Design and develop best practice techniques of security,
• List national, regional and international security standards.
Module content:
Introduction to system security and cryptography
Symmetric Ciphers: Classical encryption Techniques, Data Encryption Standard and
Advanced Encryption Standard
Public-Key Encryption and hash Functions: Public-Key Cryptography, Message
Authentication, Digital Signatures, and Authentication Protocols.
Network Security Practice: Authentication Applications, Electronic Mail Security, IP
Security, Web Security.
System Security: Intruders, Viruses, Worms and Spyware, Firewalls
Digital payment, security issues.
Module Assessment :
The following methods will be used for assessment:
• Written Examination 70%
• Continuous Assessments 30%
Essential Reading:
1. William Stallings, 2003, Cryptography and Network Security: Principles and Practice,
Prentice Hall
2. Seymour Bosworth, M.E. Kabay, 2002, Computer Security Handbook, John Wiley &
Sons. Inc.
3. Raymond R. Panko, 2004, Corporate Computer and Network Security, Prentice hall
Supplemental Reading:
1. Bruce Schneier, 1996, Applied Cryptography: Protocols, Algorithms, and Source Code in
C, John Wiley & Sons. Inc.
2. Andrew Lockhart, 2004, Network Security Hacks 100 Industrial-Strength Tips & Tools,
O'Reilly
3. Bruce Schneier, 2004, Secrets and Lies: Digital Security in a Networked World, Hungry
Minds Inc
4. IEEE security & privacy
5. ACM Transactions on Information and System Security (TISSEC)
6. http://www.sans.org/rr/
Further Details:
2 hours of lecture 1 hour lab per week One semester long module