2. Dieter Gollmann, Computer Security, Wiley, 2005.

advertisement
INTERNATIONAL BURCH UNIVERSITY
Department of Information Technologies
COURSE
Code
Name
Level
Year
Semester
CEN 364
Introduction to
Network Security
BS Undergraduate
III
Fall
Status
Number of ECTS Credits
Class Hours Per Week
Total Hours Per
Semester
Elective/Com
pulsory
5
3
45
Instructor
Assoc. Prof. Dr. Abdülhamit Subaşı
Class Schedule:Monday : 13:00-15:45
Office Hour:Open Door Policy
asubasi@ibu.edu.ba



1. LEARNING
OBJECTIVES AND
GOALS

Assistant
Emina Alickovic
Introduce computer and network security concepts.
Introduce confidentiality, integrity and availability
Develop some general design decisions that should be made when
constructing secure systems
Develop basic application of information security concepts.
2. STUDENT
ASSESSMENT
METHODS
Pop Quizzes
Subject Research
Project
Midterm Examination
Final Examination
3. TEXTBOOK(S)
1. William Stallings and Lawrie Brown, Computer Security, Principles and
Practice, Prentice Hall, 2008.
2. Dieter Gollmann, Computer Security, Wiley, 2005.
3. William Stallings, Cryptography and Network Security, Principles and
Practices, Fourth Edition, Prentice Hall, 2005.
4.
LANGUAGE OF
INSTRUCTION
English

5. EVALUATION
POLICIES
6. PREREQUISITE
10%
20%
20%
20%
30%

Examination dates and times set forth are firm. Students are requested to
check their timetable and report possible conflicts with other courses.
Absence in Mid Term examination and Quizzes, late delivery of research
subject and project reports will be automatically marked as zero, unless
the student presents a properly documented valid reason.

Practical programming skills in any modern language.
7. SCHEDULE OF LECTURES AND READINGS
Class
Hours
Topic
Introduction to Computer and
Network Security
Week 1
3
Week 2
3
Week 3
3
User Authentication and Access
Control
Week 4
3
Database Security and Denial of
Service
Week 5
3
Intrusion Detection and Malicious
Software
Week 6
3
Firewalls and Intrusion Prevention
Week 7
3
Trusted Computing and Multilevel
Security
Week 8
3
Buffer Overflow and Other Software
Security Issues
Week 9
3
Mid-term
Week 10
3
Physical and Infrastructure Security
Week 11
3
Human Factors and Security Auditing
Week 12
3
Week 13
3
Week 14
3
Week 15
3
Cryptographic Tools
IT Security Management and Risk
Assessment, IT Security Controls,
Plans and Procedures
 Legal and Ethical Aspects
 Symmetric Encryption and
Message Confidentiality
 Public-Key Cryptography and
Message Authentication
 Internet Security Protocols
and Standards
 Internet Authentication
Applications
 Unix/Linux Security
 Windows and Windows Vista
Security
Teaching
Methods
Lectures,
Recitation,
Practical Sessions
Lectures,
Recitation,
Practical Sessions
Lectures,
Recitation,
Practical Sessions
Lectures,
Recitation,
Practical Sessions
Lectures,
Recitation,
Practical Sessions
Lectures,
Recitation,
Practical Sessions
Lectures,
Recitation,
Practical Sessions
Lectures,
Recitation,
Practical Sessions
Lectures,
Recitation,
Practical Sessions
Lectures,
Recitation,
Practical Sessions
Lectures,
Recitation,
Practical Sessions
Lectures,
Recitation,
Practical Sessions
Lectures,
Recitation,
Practical Sessions
Lectures,
Recitation,
Practical Sessions
Reading
1. William Stallings and Lawrie Brown, Computer Security, Principles and Practice, Prentice Hall, 2008.
2. Dieter Gollmann, Computer Security, Wiley, 2005.
Date
Plagiarism Notice: Plagiarism is a serious academic offense. Plagiarism is a form of cheating in which a student
tries to pass off someone else's work or part of it as his or her own. It usually takes the form of presenting
thoughts, terms, phrases, passages from the work of others as one's own. When it occurs it is usually found in
essays, research papers or term papers. Typically, passages or ideas are 'lifted' from a source without proper
credit being given to the source and its author. To avoid suspicion of plagiarism you should use appropriate
references and footnotes. If you have any doubt as to what constitutes plagiarism you should consult your
instructor. You should be aware that there are now internet tools that allow each submitted paper to be
checked for plagiarism. Remember plagiarism is serious and may result in a reduced or failing grade or other
disciplinary actions.
Cheating: Cheating in any form whatsoever is unacceptable and will subject you to IBU disciplinary procedures.
Cheating includes signing in others for attendance, exams or anything else; using prohibited electronic and
paper aides; having others do your work; having others do your work, copying from others or allowing others
to copy from you etc. Please do not cheat in any way! Please consult me if you have any questions.
Presentation
At the end of the course, students will be required to perform a final presentation on a cryptography related
subject. The presentation should be well prepared and should give an overview of a special topic in computer
and network security.
Download