جامعة المجمعة Majmaah University College of Science in AL-Zulfi Department Computer Science& Information CourseTitle Information and Network Security Instructor Name Dr. Loai Bani Melhim Text Book Course Description كلية العلوم بالزلفي قسم علم الحاسوب و المعلومات Course No. CIS 446 Credit Hrs Prerequisite 3 CIS 313 Year (semester) 1431- 1432 (spring) Lec./Lab. Credit Lecture: 3 e-mail/Web Site Web site loaibm@yahoo.com http://faculty.mu.edu.sa/lbanimelhim/secu rity Cryptography and Network Security Principles and Practices, 5th Ed., William Stallings, Printice Hall, 2010 The course introduces computer & network security concepts: security goals and Services. Conventional encryption: classical techniques and modern techniques are explained. Data Encryption Standard (DES), publickey encryption, RSA algorithm, authentication applications, IP security, web security, and system security: viruses, worms and firewalls are examined. Students are required to complete a practical course project; projects are of two types: either to write a code for each explained technique or to get a security package from the market and to make a present of the package's features. Aims This course aims to introduce the main concepts of computer and network security. The course introduces security goals and services. It also defines security threats and system's vulnerabilities. Classical and modern encryption techniques are explained. The course includes sufficient information about network security such as Authentication, IP security, and web security. Finally, the course looks at system-level security such as threats of viruses and the use of firewalls. Objectives Introduce students with the importance of security for computer systems. Introduction to security goals and the services of security system. Explain available methods of defense. Distinguish between Cryptography and Steganography. Describe classical encryption techniques (Caesar, Mono-alphabetic, and poly-alphabetic ciphers) Describe transposition techniques. Introduce Data Encryption Standard algorithm with great details. Compare between different symmetric key encryption algorithms. Introduce Public-key encryption concept and detailed RSA algorithm Introduce students with authentication service , IP security, and web security Introduce students with malicious programs such as viruses, worms, logic bombs and Trojan horses. Introduction to firewalls. 1 Course Contents : Week 1, 2 3, 4 5 6 7 8 9 10 11 12 13 14 15 16 Topics Introduction Classical Encryption Techniques Block Cipher and Data Encryption Standard Advanced Encryption Standard Contemporary Symmetric Ciphers Confidentiality using symmetric encryption Publick-key encryption and RSA Message Authenication and Hash Functions Digital Signatures and Authentication Protocols Network Security Practice Network Security Practice System Security Projects Discussion Topic Details Security Threats, vulnerabilities, and Attacks, security mechanisms, security goals and services, model for network security, methods of defense Conventional encryption principles, Cryptography, Steganography, Substitution Techniques, Transposition Techniques, Rotor Machines. Simplified DES, Block Cipher Principles, The Data Encryption Standard. Evaluation Criteria for AES, The AES Cipher Reference Ch. 1 Ch. 2 Ch. 3 Ch. 5 First Exam IDEA, Blowfish, RC5, CAST-128 Ch. 6 Placement of encryption function, Traffic confidentiality, Key distribution, random number generation. Ch. 7 Discussion of Progress report Principles of Public–key Cryptosystems, The RSA Algorithm Ch. 9 Authentication Requirements, Authentication Functions, Hash Functions. Second Exam Digital Signatures, Authentication Protocols, Digital Signature Standard Authentication Applications, Electronic Mail Security, IP Security, Web Security and Auditing Intruders, Malicious Software, Firewalls. Group Presentation and Discussion Each group is given 10-15 minutes to present and discuss its project Final Exam 2 Ch. 11 Ch. 13 Ch. 14, 15 Ch. 16, 17 Ch. 18, 19, 20 Assign. Assesment and Grade Distribution Assesment I.Group Work Project Presentation & Discusion II. Individual Work Attendance, Participation, and Home works Quizzes First Exam Second Exam A Comprehensive Final Examination Points Total 10% 7% 3% 85% Chapter Homeworks, Discsstions, Presentations UnAnnounced Short quizes Multiple Choice Questions worth 25% of Grade. Essay Questions worth 75% of grade. Multiple choice questions worth 25% of grade. Essay questions worth 75% of grade. Multiple Choice Questions worth 25% of Grade. Essay Questions worth 75% of grade. TOTAL Short 5% exam exam 15% exam exam 20% exam exam 50% 100% References: [1] [2] [3] William Stallings. Cryptography and Network Security: Principles and Practices. Prentice Hall, (3rd Ed. 2003), (4th Ed. 2005), (5th Ed. 2010). Charles P. Pfleeger and Shari L. Pfleeger . Security in Computing. Prentice Hall, (3rd Ed. 2003), (4th Ed. 2006). Lecture's notes. COURSE POLICIES The University Regulations on Academic Dishonesty will be strictly enforced! Please check the University Statement on plagiarism. Make-up Exams: Only students with valid excuses are allwed to have make up exams. All excuses must be signed by the Faculty Dean. Student has the responsibility to arrange with his/her instructor for an exam date before the occurrence of the next regular exam. All assignment and class work must be submitted at the specified due date. No late work will be accepted. Attendance policy will be stricktly enforeced (refer to student's Handbook). No make up for quizzes under any circumstance. 3