INTERNATIONAL BURCH UNIVERSITY Department of Information Technologies COURSE Code Name Level Year Semester CEN 364 Introduction to Network Security BS Undergraduate III Fall Status Number of ECTS Credits Class Hours Per Week Total Hours Per Semester Elective/Com pulsory 5 3 45 Instructor Assoc. Prof. Dr. Abdülhamit Subaşı Class Schedule:Monday : 13:00-15:45 Office Hour:Open Door Policy asubasi@ibu.edu.ba 1. LEARNING OBJECTIVES AND GOALS Assistant Emina Alickovic Introduce computer and network security concepts. Introduce confidentiality, integrity and availability Develop some general design decisions that should be made when constructing secure systems Develop basic application of information security concepts. 2. STUDENT ASSESSMENT METHODS Pop Quizzes Subject Research Project Midterm Examination Final Examination 3. TEXTBOOK(S) 1. William Stallings and Lawrie Brown, Computer Security, Principles and Practice, Prentice Hall, 2008. 2. Dieter Gollmann, Computer Security, Wiley, 2005. 3. William Stallings, Cryptography and Network Security, Principles and Practices, Fourth Edition, Prentice Hall, 2005. 4. LANGUAGE OF INSTRUCTION English 5. EVALUATION POLICIES 6. PREREQUISITE 10% 20% 20% 20% 30% Examination dates and times set forth are firm. Students are requested to check their timetable and report possible conflicts with other courses. Absence in Mid Term examination and Quizzes, late delivery of research subject and project reports will be automatically marked as zero, unless the student presents a properly documented valid reason. Practical programming skills in any modern language. 7. SCHEDULE OF LECTURES AND READINGS Class Hours Topic Introduction to Computer and Network Security Week 1 3 Week 2 3 Week 3 3 User Authentication and Access Control Week 4 3 Database Security and Denial of Service Week 5 3 Intrusion Detection and Malicious Software Week 6 3 Firewalls and Intrusion Prevention Week 7 3 Trusted Computing and Multilevel Security Week 8 3 Buffer Overflow and Other Software Security Issues Week 9 3 Mid-term Week 10 3 Physical and Infrastructure Security Week 11 3 Human Factors and Security Auditing Week 12 3 Week 13 3 Week 14 3 Week 15 3 Cryptographic Tools IT Security Management and Risk Assessment, IT Security Controls, Plans and Procedures Legal and Ethical Aspects Symmetric Encryption and Message Confidentiality Public-Key Cryptography and Message Authentication Internet Security Protocols and Standards Internet Authentication Applications Unix/Linux Security Windows and Windows Vista Security Teaching Methods Lectures, Recitation, Practical Sessions Lectures, Recitation, Practical Sessions Lectures, Recitation, Practical Sessions Lectures, Recitation, Practical Sessions Lectures, Recitation, Practical Sessions Lectures, Recitation, Practical Sessions Lectures, Recitation, Practical Sessions Lectures, Recitation, Practical Sessions Lectures, Recitation, Practical Sessions Lectures, Recitation, Practical Sessions Lectures, Recitation, Practical Sessions Lectures, Recitation, Practical Sessions Lectures, Recitation, Practical Sessions Lectures, Recitation, Practical Sessions Reading 1. William Stallings and Lawrie Brown, Computer Security, Principles and Practice, Prentice Hall, 2008. 2. Dieter Gollmann, Computer Security, Wiley, 2005. Date Plagiarism Notice: Plagiarism is a serious academic offense. Plagiarism is a form of cheating in which a student tries to pass off someone else's work or part of it as his or her own. It usually takes the form of presenting thoughts, terms, phrases, passages from the work of others as one's own. When it occurs it is usually found in essays, research papers or term papers. Typically, passages or ideas are 'lifted' from a source without proper credit being given to the source and its author. To avoid suspicion of plagiarism you should use appropriate references and footnotes. If you have any doubt as to what constitutes plagiarism you should consult your instructor. You should be aware that there are now internet tools that allow each submitted paper to be checked for plagiarism. Remember plagiarism is serious and may result in a reduced or failing grade or other disciplinary actions. Cheating: Cheating in any form whatsoever is unacceptable and will subject you to IBU disciplinary procedures. Cheating includes signing in others for attendance, exams or anything else; using prohibited electronic and paper aides; having others do your work; having others do your work, copying from others or allowing others to copy from you etc. Please do not cheat in any way! Please consult me if you have any questions. Presentation At the end of the course, students will be required to perform a final presentation on a cryptography related subject. The presentation should be well prepared and should give an overview of a special topic in computer and network security.