|
Highlight
|

|
Duration:
17 weeks including lectures, experiments and final examination
|
|

|
Audience: Undergraduate
(junior or senior) and graduate students
|
|

|
Pre-requisites: C
programming; internet basics; operating system basics
|
|

|
Meetings:
Lectures (12 x 3 hrs) and experiments (4 x 3 hrs)
|
Abstract
This
semester-long course explores three expanding areas of Internet security: communication
security, information security and trustworthy computing. It
also exams the hierarchical organization in each area based on the
partition among mechanisms, services and management infrastructure. The
course aims at achieving three goals:
|

|
Introduce the process of
security system design consisting of vulnerability assessment, security
architecture and system implementation
|
|

|
Explain the use of
cryptography and communication technology in building interlocking
security services through the examination of security protocols
|
|

|
Discuss development
trends of security services, mechanisms and management in global
information infrastructure
|
Agenda
The course will cover six
topics:
|

|
Security System Design:
Vulnerability Analysis, Policy Specification and Countermeasure Deployment
|
|

|
OSI Security
Architecture: Services, Mechanisms and Protocol Mapping
|
|

|
Modern Cryptography,
Overview
|
|

|
Communication Security
and Security Protocols
|
|

|
Information Security and
Trustworthy Computing
|
|

|
Security System
Management
|
Four three-hour laboratory sessions will supplement weekly lectures
to provide students with hand-on experience in specific security system
techniques:
|

|
System Vulnerability
Analysis — with
Password Cracking and Static System Scanning
|
|

|
Network Vulnerability
Analysis — with
Protocol Analyzer and Network Scanners
|
|

|
Firewall/VPN Deployment
and Management — using NetFilter and FreeSwan
|
|

|
Intrusion Detection and
Responses — with DDoS Attack Simulation and Snort Analyzer
|
Format
|

|
Class interaction will consist of three hours of lectures
every week and a three-hour laboratory session every three weeks (with a total
of four sessions throughout the course).
|
|

|
Homework will consist of four bi-weekly problem sets
aiming at deepening students’
understanding of course contents.
|
|

|
A three-hour final examination will be held at the end of
the semester to assess students’ proficiency
of the subject.
|
Grading
|

|
Problem
Sets:
4 x 5% = 20%
|
|

|
Laboratory
Sessions:
4 x 10% = 40%
|
|

|
Final
Examination:
= 40%
|
Course Documents
Presentation Slides:
Supplemental Materials:
Assignments
Literature
Textbook:
|

|
Charles Kaufman, Mike Speciner, Radia Perlman, Network
Security: Private Communication in a Public World, 2nd Ed., Pearson
Education, April 2002
|
References:
|

|
Warwick Ford, Computer
Communication Security: Principles, Standard Protocols & Techniques,
Prentice Hall, September 1993
|
|

|
Ruixi Yuan, Timothy Strayer, Virtual Private Networks: Technology
& Solution, Pearson Education, April 2001
|
|

|
Edward Amoroso, Intrusion Detection: An Introduction to
Internet Surveillance, Correlation, Trace Back, Traps & Response,
Intrusion.Net Books, March 1999
|
|