Computer & Network Security

advertisement
Course Outline
IAS3333 – Computer and Network Security
Faculty of Computer Science and Information technology
Lecturer : Zuraidy bin Adnan
Phone : 012-2200762
zuraidy@unisel.edu.my
SYNOPSIS
Having knowledge in computer and network security is important in securing computer systems
and network environment. This subject will provide students with a necessary knowledge and
good understanding on the concepts of computer security and the methods to secure the
networks from malicious attacks.
OBJECTIVE
Students should know the importance of security policy and user awareness on a secure network
operation, and its positive impacts to the organization.
TIMETABLE
Day/
Time
Time
Venue
Tuesday (Lab)
Tuesday (Lab)
Thursday
11-1pm
GL105
2-4pm
GL105
2-4pm
BS3
REFERENCES
1. Eric Cole, Ronald L. Kruz, James W. Conley, “Network Security Fundamentals, Wiley 2007 (Main
reference).
2. Wm. Arthur Conklin et al., Principles of Computer Security, Security+ and Beyond, McGraw Hill 2004.
3. Charles P. Pfleeger, Shari Lawrence Pfleeger, “Security in Computing”, Third edition, Prentice Hall
2003.
4. Joseph M. Kizza, “Computer Network Security”, Springer 2005.
5. Rick Lehtinen, “Computer Security Basics”, O'Reilly Media 2006.
ASSESSMENT
Type of Assessment
Assignment
Project
Quizzes/ Test
Mid Sem Test.
Final Exam.
Weightage
10 %
15 %
15 %
20 %
40 %
Frequency
2
1
3
1
1
1
Course Outline:
Week
1&2
3
4
5
6
7
8
9
10
Topic
Chapter 1
General Security Concepts
 Basic Security Terminology
 Security Models
Chapter 2
Network Fundamentals
 Network Architecture
 Network Topology
 Network Protocols
 Packet Delivery
Coursework
Chapter 2, main
reference
(1) Quiz 1
Chapter 3
Attacks and Malware
 Attacking Computer Systems and
Networks
 Auditing
Chapter 6
The role of people in security
 People – A Security problem
 People as a security tool
Chapter 16, main
reference
(1) Quiz 2
(2) Assignment 1
initiated
Chapter 17, main
reference
(1) Midterm exam
(2) Group project
initiated
Chapter 4, main
reference
Semester Break
Chapter 7
Security Baselines
 Overview baselines
(1) Assignment 1
 Password selection
submission
 Operating system and NOS hardening
(2) Assignment 2
 Network hardening
initiated
 Application hardening
Chapter 8
Infrastructure security
 Devices
 Media
 Security concerns for transmission
media
 Removable media
Chapter 9, main
reference
Chapter 15, main
reference
Chapter 4
Email
 Security of email transmissions
 Malicious code
 Hoax emails
 Spam emails
 Mail Encryption
Chapter 5
Web Components
 Current web components and concerns
 Protocols
 Code-based vulnerabilities
Reference
Chapter 14, main
reference
Chapter 10, main
reference
2


11
12
13
14
Security topologies
Tunneling
Chapter 9
Risk Management
 Overview of risk management
 Business risk
 Risk management models
 Qualitatively assessing risk
 Quantitatively assessing risk
 Quali vs Quanti risk assessment
 Tools
Chapter 10
Disaster recovery, business continuity,
and organizational policies
 Disaster recovery
 Policies and procedures
Chapter 11
Computer forensics
 Evidence
 Collecting evidence
 Chain of custody
 Free space vs slack space
 Message digest and Hash
 Analysis
(1) Assignment 2
submitted
Chapter 20, main
reference
(1) Quiz 3
Chapter 19, main
reference
(1) Group project
presentation
Chapter 23, main
reference
(1) Group project
presentation
Revision Week
Final exam
REMINDER
1. Students who fail to comply 80% of attendance can be subjected to be barred
from taking final examination
2. You are now bachelor degree students. So, act, behave, and dress like one.
3. Simple rules - attend class, attend all the quizzes, submit all assignments, and
finished your project.
3
Download