5027.20 - Internet Security

Course number
Internet Security
Algorithms and Data Structures; Computer Networks and Data Communication; Discrete Mathematics
In this era of digital communication, security of computers, computer networks, and internet is crucial. Therefore, securing personal devices, networks, and communication is very important for organizations and individuals. This course is an introduction to networks/internet security and aim to provide important concepts and technologies that address the risky computer and network environment we face in our daily life. It will also provide an awareness about securing communications on internet.
This course introduces the computer/internet security principles, basic threats and countermeasures of security problems in computing environments. This includes: model and attacks, security services (confidentiality, integrity, non-repudiation, and availability), cryptography: symmetric-key (block ciphers, stream ciphers, AES, DES, etc.) and asymmetric-key cryptography (RSA, Diffie-Hellman, etc.), authentication (HMAC) and digital signature, key management and distribution, user authentication, intrusion detection and prevention, internet security (password selection, wireless networks security, Email, IP security), firewalls, and security tools.
Learning and teaching approaches
Lectures, discussions on various security issues, and theoretical and computer based exercises.
Learning outcomes
Students successfully completing this course will be able to • Understand the basics of security concepts and how attacks occur; • Explain how some cryptographic protocols, tools, and algorithms work, and where and how they can be used; • Explain how authentication and access control can be done in various computer and information systems, and evaluate the strengths and weaknesses of those schemes and protocols; • Encrypt/decrypt texts using a variety of classical and modern ciphers, and explain the basic techniques and principles of these classical ciphers; • Explain the basic mechanisms used for the detection of intrusion attempts in computer systems; • Explain how to secure data at communications on internet, such as wireless networks and emails; • Use computers and internet in more secure manners.
Assessment method
 one assessment will be given during the lectures o 0% contribution to the final marks but a passed mark is a necessary condition to get the permission for the examination  4-hour written examination (paper and pen based) o course related materials are NOT allowed o 100% contribution to the final marks
Marking scale
Cryptography and Network Security: Principles and Practice (7th Edition) by William Stallings, Publisher: Pearson Education, 2016. ISBN-10: 1292158581. ISBN-13: 978-1292158587 https://www.amazon.co.uk/Cryptography-Network-Security-PrinciplesPractice/dp/1292158581/ref=tmm_pap_swatch_0?_encoding=UTF8&qid=1499093740&sr=8-1-fkmr0
Hans Blaasvær