Computer Engineering Department Islamic University of Gaza ECOM 5347 Network Security
description
Transcript of Computer Engineering Department Islamic University of Gaza ECOM 5347 Network Security
1
Computer Engineering DepartmentIslamic University of Gaza
ECOM 5347Network Security
Undergraduate CourseFall 2013
Prof. Mohammad A. MikkiRoom I215
Tel. Ext. 2876 email: [email protected]
Skype id: mohammad.mikkiHomepage: http://site.iugaza.edu.ps/mmikki/
Lecture 1
Syllabus
3
Mohammad A. Mikki
Professor of Computer Engineering
ECE Department , Faculty of Engineering
Instructor
Where to find me
4
My Office: IT bldg: Room I215Office Hours: TBA and by appointmentMy Email: [email protected] My homepage: http://site.iugaza.edu.ps/mmikki/Skype id: mohammad.mikkiTel.: +970-8-2860700 Ext. 2876Fax: +970-8-2860800
TA
• Eng. Jihad El-Dahdouh
5
Course Information
Course Code: ECOM 5347 Course Name: Network Security (Undergraduate Course) Number of credits: 3
6
Course Description
Principles of practical computer security to enable students to defend themselves against malicious threats. Firewalls, anti-virus, secure setup of a wireless access point. Cryptography basics and its application. Embedded devices and related security issues. Network technologies and their vulnerabilities.
7
Course Objectives
• All students, and most of the general population, use computers and computer-based systems everyday, and entrust those systems with life-critical and cost-critical functions.
• In spite of the high level of trust placed in computer-based systems, even advanced computer users have little awareness of their exposure to security threats.
• The general lack of understanding of basic computer security concepts leads to increased risk and costs involved in using computers.
• This course will introduce computer security basics in a practical way and give students the understanding that they need to protect themselves, and their data, from malicious attack. Students will learn about the mechanisms behind most computer attacks and they will learn about standard defense tools including firewalls and anti-virus programs.
• The course will provide a practical introduction to a broad range of computer security topics.
8
Course Outcomes
At completion of the course students should be able to:Explain common security threats, including malware. Analyze security vulnerabilities in computer systems. Apply authentication and cryptography to secure computer systems. Use open source tools to improve system security. Understand the fundamentals of network security. Describe the processes of auditing and incident response. Understand ethical and legal considerations encountered when working in information security.
9
Course Website
http://moodle.iugaza.edu.ps
please check this webpage at least once a week for lecture notes, homework assignments, solutions, useful links, supplementary material, announcements
10
Class Information
Class location, days and time
Sec. 101: SMW 8:00 am – 9:00 am K513
Sec. 201: SMW 9:00 am – 10:00 am L508
11
Required Textbook and Material
Michael T. Goodrich and Roberto Tamassia, Introduction to Computer Security, Addison-Wesley, 1 edition (October 25, 2010)
ISBN-10: 0321512944
ISBN-13: 978-0321512949
12
Required Textbook (TOC)
Table of Content
13
Class Expectations
Class participation – Your input is needed for good discussion
Keep up with reading material
Follow academic integrity code
16
Working Schedule
17
Week Slides Work Due
1 Sat.07.Sep.2013
Ch.1 : IntroductionCh01-Introduction.pptx
2Sat. 14.Sep.2013
Ch.3: Operating Systems SecurityCh03-OS.pptxCh03-FilesystemSecurity-slides 1-14.pptx (pages 114-129)Ch03-FilesystemSecurity-slides15-28.pptx (Section 3.2-3.3)
Quiz1 on Ch.1
3Sat.21.Sep.2013
Ch03-OSSec.pptx (Section 3.2-3.3) ApplicationSecurity.pptx (Section 3.4) Ch03-BufferOverflow.pptx (Section 3.4)
Lab1
4Sat.28.Sep.2013
Ch.4: MalwareCh04-Malware-slides1-23.pptx (Sections 4.1-4.3.2) Ch04-Malware-slides 24-41.pptx
Quiz2 on Ch. 3 Lab2
Working Schedule
18
Week Slides Work Due
5Sat.5.Oct.2013
Ch.5: Network Security I Ch05-NetworkModelsARP.pptx Ch05-NetworksTCP-IP.pptx
Quiz3 on Ch.4 Lab3
6Sat. 12.Oct.2013
Ch05-NetworksTCP-IP-part C.pptx Lab4
7Sat.19.Oct.2013
Ch.6: Network Security II Ch06-NetworksDNS Ch06-Firewalls.pptx
Quiz4 on Ch.5 Lab5
8Sat.26.Oct.2013
(Beginning of midterms)Ch.7: Web SecurityCh07-Web.pptxCh07-Web-slides 45-72.pptx
Quiz5 on Ch.6 Lab6
9Tuesday2.Nov.2013
Ch07-Web-slides 73-89.pptx Midterm Exam Lab7
Working Schedule
19
Week Slides Work Due
10 Sat.9.Nov.2013
Ch.8: CryptographyCh08-CryptoConcepts-slides 1-28.pptxCh08-CryptoConcepts-slides 29-50.pptx
Quiz6 on Ch.7 Lab8
11 Sat.16.Nov.2013
Ch08-CryptoConcepts-slides 51-57.pptx Ch08-DataIntegrity.pptx
Lab9
12 Sat.23.Nov.2013
Ch.10: Distributed Applications SecurityCh10-DatabaseCh10-DRMCh10-PaymentSystemsCh10-SpamCybercrime
Quiz7 on Ch.8 Lab10 (Last Lab)
13 Sat.30.Nov.2013
Quiz8 on Ch.10 Paper presentations
14 Sat.7.Dec.2013
Paper presentations
Sat.28.Dec.2013
Beginning of final exams
Grading Scheme
Quizzes 10%
10 Lab experiments 20%
Attendance, class participation, moodle chat and forums
10%
Paper presentations 10%
Midterm Exam 20%
Final exam 30%
20
Research Report (Not required for the undergraduate students)
• Select a research topic in network security• Select 3-5 recent papers on the topic• Summarize these papers in a 10-15 page report• Submit an intermediate report by 8th week of the semester• Submit a final report by 13th week of the semester• Make a 15 minutes presentation in front of the class in weeks 14 and 15
21
Quizzes
8 quizzes Quizzes are given after completion of each textbook chapter.
22
Lab
23
There will be a total of 10 laboratory experiments that will cover the current tools used in computer and network security. The TA will assist in conducting these exps
24
any questions