5027.17 - Internet Security


Course number
5027.17
Title
Internet Security
ECTS
7.5
Prerequisites
Computer Networks and Data Communication
Purpose
In this era of digital communication, security of computers, computer networks, and internet is crucial. Therefore, securing personal devices, networks, and communication is very important for organizations and individuals. This course is an introduction to networks/internet security and aim to provide important concepts and technologies that address the risky computer and network environment we face in our daily life. It will also provide an awareness about securing communications on internet.
Content
This course introduces the computer/internet security principles, basic threats and countermeasures of security problems in computing environments. This includes: model and attacks, security services (confidentiality, integrity, non-repudiation, availability, and accountability), cryptography: symmetric-key (block ciphers, stream ciphers, AES, DES, etc.) and asymmetric-key cryptography (RSA, diffie-helman, etc.), authentication (HMAC) and digital signature , key management and distribution, user authentication, intrusion detection and prevention, internet security (password selection, cloud security, wireless networks security, Email, IP security), viruses, firewalls, and security tools.
Learning and teaching approaches
Lectures, discussions on various security issues, and theoretical and computer based exercises.
Learning outcomes
Students successfully completing this course will be able to • Understand the basics of security concepts and how attacks occur. • Explain how some cryptographic protocols, tools, and algorithms work, and where and how they can be used; • Explain how authentication and access control can be done in various computer and information systems, and evaluate the strengths and weaknesses of those schemes and protocols; • Encrypt/decrypt texts using a variety of classical and modern ciphers, and explain the basic techniques of these classical ciphers that contributed in forming the modern cryptography (i.e., substitution and transposition). • Explain the basic mechanisms used for the detection of intrusion attempts in computer systems. • Learn about securing data at clouds and communications on internet, such as emails. • Use computers and internet in more secure manners.
Assessment method
4 hour written examination without any material and gadgets. Note: 1 mandatory test (without marking) need to be approved before appearing in the exam.
Examination
External
Marking scale
7-
Bibliography
Cryptography and Network Security: Principles and Practice (7th Edition) by William Stallings, Publisher: Pearson Education, 2016. ISBN-10: 1292158581. ISBN-13: 978-1292158587 https://www.amazon.co.uk/Cryptography-Network-Security-Principles-Practice/dp/1292158581/ref=tmm_pap_swatch_0?_encoding=UTF8&qid=1499093740&sr=8-1-fkmr0 Computer and Information Security Hand Book (3rd Edition) by John R. Vacca, Publisher: Morgan Kaufman, 2017. ISBN-10: 0128038438, ISBN-13: 978-0128038437 (optional)
Contact
Ali Kashif Bashir