CSCI 415
Computer and Network Security
Coordinator: Nazli Hardy
Credits: 4.0
Description
This course is designed to introduce
Prerequisites
CSCI 362
Sample Textbooks
William Stallings, Network Security Essentials: Applications and Standards, 3rd Edition, Pearson, 2007
Gildas Avoine et al, Computer System Security: Basic Concepts and Solved Exercises, EPFL Press, 2004
Jonathan Katz and Yehuda Lindell, Introduction to Modern Cryptography, Chapman & Hall/CRC Press, 2007
Douglas Jacobson, Introduction to Network Security, Chapman & Hall/CRC Computer & Information Science Series, 2008
Course Outcomes
On successful completion of this course, the student should be able to:
- explain the nature of attacks, security mechanisms, types and motivation of attacks;
- describe and explain symmetric encryption and public key encryption, authentication, cryptography algorithms and application of public key infrastructure;
- describe the key aspects of several network security elements like secure sockets layer (SSL), transport layer security (TLS), secure electronic transaction (SET);
- demonstrate a solid understanding of current network security vulnerabilities, for example, SQL injection, cross-site scripting,
over flow . - describe and design a secure network, complete with the physical components, equipped with appropriate bandwidth, protocols, and internetworking concepts that are covered as theory in class. They also required to be able to identify and assess the efficiencies of a network
- demonstrate a practical insight on secure electronic transactions
Major Topics Covered
A. The Fundamentals
- Course Overview
- Common exploits and defense, attacks and their attackers, security cornerstones, security baselines
- Buffer overflow
- Global offsets table with pointers for root shells
- Tools for writing application code for security
- Catch security holes
- Viruses, spyware,
sysbots , malware, and other malicious and current security threats - Tracking botnets
- Access control mechanisms, protecting the computer system, sandboxing
- Cryptography (1), symmetric key
- Cryptography (2), Digital envelopes and signatures, and the underlying math
B. Web and Database Security
- Web exploits and their defense, cross-site scripting, SQL injections
- User authentication, password management, user interface exploits, phishing and other current threats
- Protecting Browser State from Web Privacy Attacks
C. Network Security
- Security problems in network protocols: TCP, DNS, SMTP, and routing
- Network defense tools: firewalls, intrusion detection, and filter
- Distributed Denial of service attacks and worms
- Privacy and anonymous browsing
- The Voting Machines
D. Security Controls and Management
- Network Defense
- Counterterrorism
- Ethical Hacking
- Auditing
- Forensics & Investigations
Sample Laboratory Projects
Programming Projects
Building a Secure Distributed Bank using Public key cryptography for secrecy, integrity-protection, and authentication (group project)
Implement a strong password authentication protocol called SRP (Secure Remote Password), a proposed Internet Standard
Remote Buffer Overflow Attack
Encoding x.509 (Cryptography standard)
Programming Access control in client authentication
Simple secure e-mail service
Data encryption experiments
Lempel-Ziv-Welsh compression algorithm
Security Testing Applications (group project)
Research Projects
Network Defense in Counterterrorism
Ethical Hacking
Auditing, Forensics & Investigations
Other Relevant Labs
Wireshark and Traceroute Lab