Com411cours Descriptor
Com411cours Descriptor
Course Description
This module provides the learner with the underlying theory and practical
skills required to secure networks and to send data safely and securely over
network communications. It also looks at the technologies employed to
secure a network. It is designed to provide students with knowledge of the
fundamental principles and techniques employed in securing information and
networks.
Prerequisites
Page 1
Required Texts
Core Reading:
1) Title: International Standards Organization. Information Technology —
Code of Practice for Information Security Management, ISO/IEC
Author: 17799:2000(E). Geneva, Switzerland: ISO, 2000
Year: 2000
2) Title: Security Architecture: Design, Deployment and Operations. New
York:
Author: King, Christopher M; Curtis E. Dalton; and T. Ertem Osmanoglu.
Publisher: Osborn/McGraw-Hill,
Year: 2001.
Supplementary Reading:
1) Title: Hacking Exposed: Network Security Secrets & Solutions,
Author: Scambrey, J., McClure, S. and Kurtz, J.
Edition: 2nd Edition
Publisher: McGraw Hill
Year: 2009
2) Title: Building Internet Firewalls,
Author: Zwicky, E.D.
Edition: 2nd Edition.
Year: 2010.
Publisher: Pearson Education Ltd
Online Resources
1) www.cs.iit.edu/~cs549/lectures/CNS-1.pdf
2) https://www.amazon.com/Cryptography-Network-Security-
Principles.../0133354695
3) www.vssut.ac.in/lecture_notes/lecture1428550736.pdf
Course Delivery
Lectures
Page 2
Discussions
Group work
Laboratory work
Page 3
Home Work: You have found an old ciphertext, where you know that the
plaintext discusses cryptographic methods. You suspect that a Vigenere
cipher has been used and therefore look for repeated strings in the
ciphertext.
You find that the string TICRMQUIRTJR occurs twice in the ciphertext. The first
occurrence starts at character position 10 in the text and the second at
character position 241 (we start counting from 1).
You make the inspired guess that this ciphertext sequence is the encryption
of the plaintext word cryptography. If this guess is correct, what is the key?
Hint: Analyze the possible periods.
WEEK 2:
WEEK 3:
Readings: https://www.amazon.com/Cryptography-Network-Security-
Principles.../0133354695
Page 4
Problem sets:
Research Internet Key Exchange (IKE) as used in IPSec and note its purpose
and key features.
WEEK 4:
Problem sets:
1. Describe email security mechanisms,
2. In pairs, send an e-mail to each other. Examine the email header,
make a note of each part and determine the information this gives
you. Use the remaining time to write a report of your findings.
WEEK 5:
Problem sets:
1. Briefly explain how invertible matrix is used in data cryptography.
2. Give reasons whether invertible matrix algorithm is a symmetric or asymmetric
algorithm.
3. Describe how a man-in-the-middle attack may be performed on a Wi-Fi network and the
consequences of such an attack.
4. Briefly discuss the protocols that comprise SSL.
WEEK 7:
Page 5
Topic 6: Vulnerability assessment
Problem sets:
1. What is Single Sign On (SSO) and explain how this is achievable in the
case study above.
2. What are the key security aspects of a bank transaction?
3. List the classes of intruders regarding the case study.
4. Explain what Kerberos is and how it provides authenticated services.
WEEK 8:
Topic 7: Authentication
Problem sets:
1. Research and make a note of the twenty most common passwords
used in common applications (replace any rude words or swearing with
***)
WEEK 9:
Readings:
1. International Standards Organization. Information Technology — Code
of Practice for Information Security Management, ISO/IEC
2. Hacking Exposed: Network Security Secrets & Solutions,
3. https://www.amazon.com/Cryptography-Network-Security
Page 6
Problem sets:
1. Briefly describe the key expansion algorithm.
2. What is the difference between SubBytes and SubWord?
3. What is the difference between ShiftRows and RotWord?
4. What is the difference between the AES decryption algorithm and the
equivalent
inverse cipher?
WEEK 10:
Readings:
1. International Standards Organization. Information Technology — Code
of Practice for Information Security Management, ISO/IEC.
2. Hacking Exposed: Network Security Secrets & Solutions,
Problem sets:
Page 7
Part 4: Grading Policy
Graded Coursework, assignments and examinations
Teamwork
Letter Grades
Page 8
students.
2. Participation in group work or teamwork is required whenever such
work is assigned.
3. In case of any emergency that disenables a student from attending
classes or completing work, the student is expected to communicate
with the lecturer or dean as soon as possible.
4. Students with disabilities should inform the dean of the faculty of
any special needs that they may have.
Page 9
Make up of Missed Classes
1. There will be special make up classes for each class that is missed
because the lecturer could not come to class on a particular day
Page 10