COURSE: TITLE: Computer Network Security CREDIT: 3 hours CLASS MEETINGS: FACULTY: PREREQUISITES: COURSE DESCRIPTION: This course is a study of key security issues and procedures in computer and mobile communication networks. Among the issues to be discussed are: the security of LANs, WANs, databases, and network operating systems; threats to computer networks through exploitation of network infrastructure design weaknesses; security flaws in the network infrastructure protocols; security of content in computer network services; risk assessment and security policies; and security in mobile communication networks. Procedures will include: networks intrusion detection and forensics technologies, cryptographic and authentication systems, capability and access control mechanisms, and new developments in Internet routing and transport protocols, secure mail, directory, and multimedia multicast services. Current trends and research in security policies and technologies will also be discussed. COURSE OBJECTIVES: To make students aware of the security perils and vulnerabilities in computing in general and in both fixed computer and mobile networks in particular To familiarize students with the important issues pertaining to protecting computer systems against unauthorized penetration and access and denial of service to computing systems To introduce to students current and effective procedures to deal with network security threats, including use of “best practices” software tools. To cultivate students’ interests in the search for network security solutions with the hope that some of them, in later years, may become lead scientists in this search for durable solutions To create and nurture an ideal atmosphere for academic dialogue, debate, and questionanswer sessions among students intended to deepen the understanding of security of their computerized and networked environments To improve, students' oral and written communication skills To affect students' behavior by challenging them to examine the role ethical and moral deliberations play in the security of their highly networked environments. COURSE REQUIREMENTS: Regular class attendance. Since there will be a good amount of class discussion, active class participation is essential. This means you must spend some quality time preparing for your next class. One mid semester examination and a comprehensive final examination will be given. Any exam make up will be on Reading Day. Homework assignments: absolutely no work passed through door and window holes (even if it survives our custodial staff) will be accepted. Late work is penalized 10% per day. While collaboration on labs and projects is permitted, blatant copying will not be tolerated. Since you have been issued with one UTC computer account ( I assume), you have a responsibility and an obligation to practice what you are learning in the course by preventing abuse and misuse of the university computer resources. Please read the UTC Computer Use Code of Conduct. Individual extra credit assignments for the purpose of propping up a bad grade will not be given. Note taking is encouraged. EVALUATION: Exercises 10% Midterm 20% Labs and Projects 40% Comprehensive Final Examination 20% Grading scale: 90+ = A; 80-89 = B; 70-79 = C; 60-69 = D; below 60 = F TOPICAL OUTLINE: Part I: Security Awareness Week 1: Basic Security Concepts–(Security: General, Information, Computer, and Network). Week 2 The Status of Computer Network Security: Security Threats; How pervasive are security attacks Week 3 Vulnerability of Computer Networks Week 4 Cyber Crimes and Hackers & Hostile Scripts Week 5 Security Assessment, Analysis and Assurance Part II: Dealing with Network Security Challenges Week 6 Access Control and Authorization Midterm Examination Week 7 Authentication - Week 8 Cryptography (Conventional and public-key encryption and hash Functions) Week 9 Cryptography (Encryption algorithms, confidentiality, key distribution, message authentication, digital signatures) Week 10 Kerberos, Firewalls & Network Security Practice (Authentication protocols: X.509 Directory Authentication Service) Week 11 Intrusion Detection Week 12 Network Security Practice( IP Sec, S/Mime, PGP) Week 13 Security Evaluations of Computer Products Part III: Security in Modern Mobile Communications Week 14 Mobile network infrastructure and protocols (Security protocols and operations Week 15 Site security summary Final Examination: TEXTBOOKS: Required: Kizza, J.M. Computer Network Security, Springer- Verlag ISBN 0-387-20473-3. Recommended: Stein, L.D. Web Security: A Step-by-Step Reference Guide. Addison Wesley Longman, Inc., 1998. ISBN 0-201-63489-9 Dieter Gollmann. Computer Security, , J. Wiley & Sons. Kaeo, Merike. Designing Network Security. Cisco Press,1999. ISBN 1-57870-043-4 SUPPLEMENTAL MATERIALS: (i) Course notes, lecture materials and links to other sites. (ii) Cryptographic algorithms and public key security standards, including RSA Labs PKS standards and IETF RFCs. http://williamstallings.com/Security2e.html (iii) Security Discussion Lists ( i.e. ipsec@lists.tislabs.com, bugtraq, Ntbugtraq, and Linux-alert) (iv) Emergency Response Centers ( i.e. CERT) (v) Software manuals OTHER READING MATERIALS: i. Network Security Essentials, W. Stallings, Prentice Hall. ii. PGP: pretty good privacy, S. Garfinkel, O'Reilley. iii. TCP/IP Network administration, Craig Hunt, O'Reilly & Assoc. iv. Practical UNIX security, Simson Garfinkel and Gene Spafford, O'Reilly Assoc. v. Building Internet Firewalls, D.B. Chapman and E.D.Zwicky, O'Reilly & Assoc. vi. Schneier, B. Applied Cryptography - Protocols, Algorithms, and Source Code in C,Second Edition. John Wiley and Sons, 1995, vii. Stinson, D.R. Cryptography - Theory and Practice. CRC Press, Boca Raton, FA, 1995, viii. Denning, D. Information Warfare and Security. ACM Press, 1999. ix. Denning, D., and J. Denning. Internet Besieged: Countering Cyberspace Scofflaws. ACM Press, 1998. x. Stein, L.D. Web Security: A Step-by-Step Reference Guide. Addison Wesley Longman, xi. Security reference, http://www.rootshell.com