cse3nsw networks sys and web security
NETWORKS SYSTEMS AND WEB SECURITY
CSE3NSW
2015
Credit points: 15
Subject outline
This subject begins with an overview of the Open Systems Interconnection (OSI) architecture and security attacks on system services, and a discussion of different existing security mechanisms. The main focus includes cryptography, system security, network and web security. The students learn: (1) cryptographic algorithms and protocols, underlying network security applications including symmetric-key and public-key encryption methods, hash functions, digital signatures and key exchange; (2) intrusion detection systems and firewalls that can be used to protect a computer system from security threats, such as intruders, viruses, and worm; (3) the use of cryptographic algorithms and security protocols for providing network and internet security in terms of user authentcaiton/identification, IP security and Web security.
SchoolSchool Engineering&Mathematical Sciences
Credit points15
Subject Co-ordinatorSomnath Ghosh
Available to Study Abroad StudentsYes
Subject year levelYear Level 3 - UG
Exchange StudentsYes
Subject particulars
Subject rules
Prerequisites CSE2NEF or equivalent
Co-requisitesN/A
Incompatible subjects CSE42FNS, CSE3NSS, CSE4FNS, CSE5NSW AND students enrolled in any Graduate Diploma or Masters by Coursework course.
Equivalent subjectsN/A
Special conditionsN/A
Graduate capabilities & intended learning outcomes
01. Apply the methodologies in regard to system-level security issues, including the threat of and counter-measures for intruders and viruses, and the use of firewalls and trusted systems.
- Activities:
- Two (1-hour) lectures on the topics of security attacks, security serivces and the OSI model. Two lectures on intrusion detection and malicious software. Two lectures on firewalls and tursted systems. Four (1-hour) associated tutorial sessions where students are given short and application problem statements and they are required to apply the technologies learned in class in relation to the problem statements.
- Related graduate capabilities and elements:
- Writing(Writing)
- Inquiry/ Research(Inquiry/ Research)
- Critical Thinking(Critical Thinking)
- Discipline-specific GCs(Discipline-specific GCs)
- Creative Problem-solving(Creative Problem-solving)
02. Describe cryptographic algorithms and protocols underlying network security applications, including encryption, hash functions, digital signatures, and key exchange.
- Activities:
- Three lectures on conventional (single-key) encryption. 1.5 lectures on message confidentiality. Three lectures on public-key cryptography. 1.5 lectures on message authentication. Two associated tutorial sessions for each of the topics: Single-key Encryption, Hash Functions, Digital Signatures, and Key Exchange. In each topic students will be given short application problem statements for discussions.
- Related graduate capabilities and elements:
- Quantitative Literacy/ Numeracy(Quantitative Literacy/ Numeracy)
- Inquiry/ Research(Inquiry/ Research)
- Discipline-specific GCs(Discipline-specific GCs)
- Writing(Writing)
- Critical Thinking(Critical Thinking)
- Creative Problem-solving(Creative Problem-solving)
03. Identify techniques for analysing security and privacy issues by using important network security tools and applications, including Kerberos, PGP, and IPSec, SSL/TLS.
- Activities:
- Three lectures on authentication applications and Kerberos. Three lectures on X.509 and PGP. Three lectures on IP security and web security. Two associated tutorial sessions for each of the topics: Kerberos, PGP, IPSec, and SSL/TLS. In each topic students will be given short and application problem statements for discussions.
- Related graduate capabilities and elements:
- Inquiry/ Research(Inquiry/ Research)
- Critical Thinking(Critical Thinking)
- Creative Problem-solving(Creative Problem-solving)
- Writing(Writing)
- Discipline-specific GCs(Discipline-specific GCs)
04. Identify possible risks and ethical and social considerations relevant to information privacy and security issues.
- Activities:
- Two tutorial sessions discuss ethical and social issues in relation to information security using two ethical case studies (Case #3 and #16) from the Australian Computer Society.
- Related graduate capabilities and elements:
- Ethical Awareness(Ethical Awareness)
Subject options
Select to view your study options…
Dandenong, 2015, Semester 2, Day
Overview
Online enrolmentYes
Maximum enrolment sizeN/A
Enrolment information
Subject Instance Co-ordinatorSomnath Ghosh
Class requirements
TutorialWeek: 31 - 43
Two 1.0 hours tutorial per week on weekdays during the day from week 31 to week 43 and delivered via face-to-face.
LectureWeek: 31 - 43
One 2.0 hours lecture per week on weekdays during the day from week 31 to week 43 and delivered via face-to-face.
Assessments
Assessment element | Comments | % | ILO* |
---|---|---|---|
Weekly problem solving workshops | These workshops aim at encouraging students to participate in learning activities on a regular basis. | 10 | 01, 02, 03, 04 |
Programming assignment | The programming assignment will require the students to implement a simple cryptographic/crypto-analysis algorithm studied in the first half of the semester. It will be a small programming task requiring design and testing of a program not longer than 300 lines in the commonly used programming languages (C/C++/Java) in the Department. | 10 | 02, 03 |
one 3-hour examination | Hurdle requirement: in order to pass the subject, the students must obtain an overall pass grade in the first instance, and obtain at least 50% in both the examination and the aggregated internal assessment components (weekly problem solving workshops, programming assignment and mid-semester test). | 60 | 01, 02, 03, 04 |
Mid-semester test | The mid-semester test will be a based on the material covered in Weeks 1 to 6. It will be designed to test the concepts and algoriths through small problems. It will be a short test of 40 minute duration conducted in a lecture slot in Week 7. | 20 | 01, 02, 03, 04 |
Melbourne, 2015, Semester 2, Day
Overview
Online enrolmentYes
Maximum enrolment sizeN/A
Enrolment information
Subject Instance Co-ordinatorSomnath Ghosh
Class requirements
PracticalWeek: 31 - 43
One 2.0 hours practical per week on weekdays during the day from week 31 to week 43 and delivered via face-to-face.
LectureWeek: 31 - 43
Two 1.0 hours lecture per week on weekdays during the day from week 31 to week 43 and delivered via face-to-face.
Assessments
Assessment element | Comments | % | ILO* |
---|---|---|---|
Weekly problem solving workshops | These workshops aim at encouraging students to participate in learning activities on a regular basis. | 10 | 01, 02, 03, 04 |
Programming assignment | The programming assignment will require the students to implement a simple cryptographic/crypto-analysis algorithm studied in the first half of the semester. It will be a small programming task requiring design and testing of a program not longer than 300 lines in the commonly used programming languages (C/C++/Java) in the Department. | 10 | 02, 03 |
one 3-hour examination | Hurdle requirement: in order to pass the subject, the students must obtain an overall pass grade in the first instance, and obtain at least 50% in both the examination and the aggregated internal assessment components (weekly problem solving workshops, programming assignment and mid-semester test). | 60 | 01, 02, 03, 04 |
Mid-semester test | The mid-semester test will be a based on the material covered in Weeks 1 to 6. It will be designed to test the concepts and algoriths through small problems. It will be a short test of 40 minute duration conducted in a lecture slot in Week 7. | 20 | 01, 02, 03, 04 |