CSC8421 Network Security
|Semester 2, 2013 External Toowoomba|
|Faculty or Section :||Faculty of Sciences|
|School or Department :||Maths and Computing|
|Version produced :||21 July 2014|
Examiner: Hua Wang
Moderator: Ron Addie
Pre-requisite: Students must be enrolled in one of the following Programs: MCOP or MPIT or MCOT or MCTE or MSSC or MENC or MEPR or MENS or METC or MSST
Recommended prior study: Know basics of programming in C, C++, Java, or other high level language such as obtained in the courses CSC1401 or CSC2402, or possess basic knowledge of any field related to cryptology.
Network security has become an important and challenging goal in the design of computer networks that involves all activities to protect the value and ongoing usability of assets and the integrity and continuity of operations. An effective network security strategy requires identifying threats and then choosing the most effective set of tools to combat them. This course provides students with key knowledge about the nature and challenges of network security, it covers theory and practice of computer security, focusing in particular on the security aspects of the web and Internet. It surveys authentication, TCP/IP, SSL, IPSEC, TLS, PGP, S/MIME, SET cryptographic and security protocols and systems, remote access technologies, email and web security, firewalls, intrusion detection and forensic computing.
The course gives a broad overview of methods of implementing network security based on security technology in today's communication networks. Topics to be covered include the fundamentals of contemporary security approach and its application to network services, such as advanced cryptography, access control, distributed authentication, TCP/IP security, firewalls. New ideas in IPSec, Virtual Private Networks, intrusion detection systems, and advanced topics such as wireless security, identity management are provided.
On completion of this course students will be able to:
- Analyse and address a number of situations in which security in networks can be compromised;
- Understand and apply selected technologies used to ensure security;
- Apply the algorithms behind some current network security protocols;
- Demonstrate understanding of how insecure systems can be attacked;
- Understand firewalls and their applications;
- Demonstrate detailed knowledge of TCP/IP;
- Demonstrate detailed knowledge of identity management approaches;
- Design and develop techniques and algorithms that are used to implement network security protocols.
|1.||Overview of computer networks and protocols||10.00|
|2.||Review of Network Security||10.00|
|6.||Prevention, detection and removal||15.00|
|7.||Virtual Private Networks||10.00|
|9.||Privacy protection in Network||10.00|
|10.||Network security applications||15.00|
Text and materials required to be purchased or accessed
ALL textbooks and materials available to be purchased can be sourced from USQ's Online Bookshop (unless otherwise stated). (https://bookshop.usq.edu.au/bookweb/subject.cgi?year=2013&sem=02&subject1=CSC8421)
Please contact us for alternative purchase options from USQ Bookshop. (https://bookshop.usq.edu.au/contact/)
William Stallings 2007, Network Security Essentials: Applications and Standards, 3rd edn, Prentice Hall.
Cheswick, WR & Bellovin, SM 2003, Firewalls and internet security, 2nd edn, Addison-Wesley Professional.
Garfinkel, S & Spafford, G 2003, Practical unix and internet security, 3rd edn, O'Reilly & Associates.
(Online from Library.)
William Stallings 2010, Cryptography and Network Security: Principles and Practice, 5th edn, Prentice Hall.
Finally, there are many relevant and interesting resources on the web, from newsgroups such as ci.crypt.research and comp.risks through hacker and CERT sites to organisations involved in crypto policy and, of course, researchers' home pages (http://www.swcp.com/~mccurley/cryptographers/cryptographers.html).
Student workload requirements
|Description||Marks out of||Wtg (%)||Due Date||Notes|
|PROJECT PROPOSAL||10||10||13 Aug 2013|
|PROJECT IMPLEMENTATION||40||40||30 Sep 2013|
|FINAL RESEARCH REPORT||50||50||05 Nov 2013|
Important assessment information
It is the students' responsibility to attend and participate appropriately in all activities (such as lectures, tutorials and practical work) scheduled for them, and to study all material provided to them or required to be accessed by them to maximise their chance of meeting the objectives of the course and to be informed of course-related activities and administration.
Requirements for students to complete each assessment item satisfactorily:
To satisfactorily complete an assessment item a student must achieve at least 50% of the marks. Students do not have to satisfactorily complete each assessment item to be awarded a passing grade in this course. Refer to Statement 4 below for the requirements to receive a passing grade in this course.
Penalties for late submission of required work:
If students submit assignments after the due date without (prior) approval of the examiner then a penalty of 5% of the total marks gained by the student for the assignment may apply for each working day late up to ten working days at which time a mark of zero may be recorded.
Requirements for student to be awarded a passing grade in the course:
To be assured of receiving a passing grade a student must achieve at least 50% of the total weighted marks available for the course.
Method used to combine assessment results to attain final grade:
The final grades for students will be assigned on the basis of the aggregate of the weighted marks obtained for each of the summative assessment items in the course.
There is no examination in this course.
Examination period when Deferred/Supplementary examinations will be held:
As there are no examinations in this course, there will be no deferred or supplementary examinations.
University Student Policies:
Students should read the USQ policies: Definitions, Assessment and Student Academic Misconduct to avoid actions which might contravene University policies and practices. These policies can be found at http://policy.usq.edu.au.
It is studentsí responsibility to discuss possible projects with the Examiner.
Students must retain a copy of each item submitted for assessment. This must be produced within five days if required by the Examiner.
The due date for an assignment is the date by which a student must despatch the assignment to the USQ. The onus is on the student to provide proof of the despatch date, if requested by the Examiner.
In accordance with University Policy, the Examiner may grant an extension of the due date of an assignment in extenuating circumstances.
Supplementary assessment will be considered for offer by the Board of Examiners to a student who has undertaken all of the required summative assessments in a course who has failed to achieve a passing grade by 5% or less of the aggregated weighted marks or equivalent in the grading scale.
Students who, for medical, family/personal, or employment-related reasons, are unable to complete an assignment may apply to defer an assessment in a course. Such a request must be accompanied by appropriate supporting documentation. The following temporary grade IDM (Incomplete Deferred Make-up) may be awarded.
Students need to be conversant with and will require access to e-mail and internet access to UConnect for this course.
Students can expect that questions in assessment items in this course may draw upon knowledge and skills that they can reasonably be expected to have acquired before enrolling in the course. This includes knowledge contained in pre-requisite courses and appropriate communication, information literacy, analytical, critical thinking, problem solving or numeracy skills. Students who do not possess such knowledge and skills should not expect to achieve the same grades as those students who do possess them.