cse3nsw networks sys and web security

NETWORKS SYSTEMS AND WEB SECURITY

CSE3NSW

2015

Credit points: 15

Subject outline

This subject begins with an overview of the Open Systems Interconnection (OSI) architecture and security attacks on system services, and a discussion of different existing security mechanisms. The main focus includes cryptography, system security, network and web security. The students learn: (1) cryptographic algorithms and protocols, underlying network security applications including symmetric-key and public-key encryption methods, hash functions, digital signatures and key exchange; (2) intrusion detection systems and firewalls that can be used to protect a computer system from security threats, such as intruders, viruses, and worm; (3) the use of cryptographic algorithms and security protocols for providing network and internet security in terms of user authentcaiton/identification, IP security and Web security.

SchoolSchool Engineering&Mathematical Sciences

Credit points15

Subject Co-ordinatorSomnath Ghosh

Available to Study Abroad StudentsYes

Subject year levelYear Level 3 - UG

Exchange StudentsYes

Subject particulars

Subject rules

Prerequisites CSE2NEF or equivalent

Co-requisitesN/A

Incompatible subjects CSE42FNS, CSE3NSS, CSE4FNS, CSE5NSW AND students enrolled in any Graduate Diploma or Masters by Coursework course.

Equivalent subjectsN/A

Special conditionsN/A

Graduate capabilities & intended learning outcomes

01. Apply the methodologies in regard to system-level security issues, including the threat of and counter-measures for intruders and viruses, and the use of firewalls and trusted systems.

Activities:
Two (1-hour) lectures on the topics of security attacks, security serivces and the OSI model. Two lectures on intrusion detection and malicious software. Two lectures on firewalls and tursted systems. Four (1-hour) associated tutorial sessions where students are given short and application problem statements and they are required to apply the technologies learned in class in relation to the problem statements.
Related graduate capabilities and elements:
Writing(Writing)
Inquiry/ Research(Inquiry/ Research)
Critical Thinking(Critical Thinking)
Discipline-specific GCs(Discipline-specific GCs)
Creative Problem-solving(Creative Problem-solving)

02. Describe cryptographic algorithms and protocols underlying network security applications, including encryption, hash functions, digital signatures, and key exchange.

Activities:
Three lectures on conventional (single-key) encryption. 1.5 lectures on message confidentiality. Three lectures on public-key cryptography. 1.5 lectures on message authentication. Two associated tutorial sessions for each of the topics: Single-key Encryption, Hash Functions, Digital Signatures, and Key Exchange. In each topic students will be given short application problem statements for discussions.
Related graduate capabilities and elements:
Quantitative Literacy/ Numeracy(Quantitative Literacy/ Numeracy)
Inquiry/ Research(Inquiry/ Research)
Discipline-specific GCs(Discipline-specific GCs)
Writing(Writing)
Critical Thinking(Critical Thinking)
Creative Problem-solving(Creative Problem-solving)

03. Identify techniques for analysing security and privacy issues by using important network security tools and applications, including Kerberos, PGP, and IPSec, SSL/TLS.

Activities:
Three lectures on authentication applications and Kerberos. Three lectures on X.509 and PGP. Three lectures on IP security and web security. Two associated tutorial sessions for each of the topics: Kerberos, PGP, IPSec, and SSL/TLS. In each topic students will be given short and application problem statements for discussions.
Related graduate capabilities and elements:
Inquiry/ Research(Inquiry/ Research)
Critical Thinking(Critical Thinking)
Creative Problem-solving(Creative Problem-solving)
Writing(Writing)
Discipline-specific GCs(Discipline-specific GCs)

04. Identify possible risks and ethical and social considerations relevant to information privacy and security issues.

Activities:
Two tutorial sessions discuss ethical and social issues in relation to information security using two ethical case studies (Case #3 and #16) from the Australian Computer Society.
Related graduate capabilities and elements:
Ethical Awareness(Ethical Awareness)

Subject options

Select to view your study options…

Start date between: and    Key dates

Dandenong, 2015, Semester 2, Day

Overview

Online enrolmentYes

Maximum enrolment sizeN/A

Enrolment information

Subject Instance Co-ordinatorSomnath Ghosh

Class requirements

TutorialWeek: 31 - 43
Two 1.0 hours tutorial per week on weekdays during the day from week 31 to week 43 and delivered via face-to-face.

LectureWeek: 31 - 43
One 2.0 hours lecture per week on weekdays during the day from week 31 to week 43 and delivered via face-to-face.

Assessments

Assessment elementComments%ILO*
Weekly problem solving workshopsThese workshops aim at encouraging students to participate in learning activities on a regular basis.1001, 02, 03, 04
Programming assignmentThe programming assignment will require the students to implement a simple cryptographic/crypto-analysis algorithm studied in the first half of the semester. It will be a small programming task requiring design and testing of a program not longer than 300 lines in the commonly used programming languages (C/C++/Java) in the Department.1002, 03
one 3-hour examinationHurdle requirement: in order to pass the subject, the students must obtain an overall pass grade in the first instance, and obtain at least 50% in both the examination and the aggregated internal assessment components (weekly problem solving workshops, programming assignment and mid-semester test).6001, 02, 03, 04
Mid-semester testThe mid-semester test will be a based on the material covered in Weeks 1 to 6. It will be designed to test the concepts and algoriths through small problems. It will be a short test of 40 minute duration conducted in a lecture slot in Week 7.2001, 02, 03, 04

Melbourne, 2015, Semester 2, Day

Overview

Online enrolmentYes

Maximum enrolment sizeN/A

Enrolment information

Subject Instance Co-ordinatorSomnath Ghosh

Class requirements

PracticalWeek: 31 - 43
One 2.0 hours practical per week on weekdays during the day from week 31 to week 43 and delivered via face-to-face.

LectureWeek: 31 - 43
Two 1.0 hours lecture per week on weekdays during the day from week 31 to week 43 and delivered via face-to-face.

Assessments

Assessment elementComments%ILO*
Weekly problem solving workshopsThese workshops aim at encouraging students to participate in learning activities on a regular basis.1001, 02, 03, 04
Programming assignmentThe programming assignment will require the students to implement a simple cryptographic/crypto-analysis algorithm studied in the first half of the semester. It will be a small programming task requiring design and testing of a program not longer than 300 lines in the commonly used programming languages (C/C++/Java) in the Department.1002, 03
one 3-hour examinationHurdle requirement: in order to pass the subject, the students must obtain an overall pass grade in the first instance, and obtain at least 50% in both the examination and the aggregated internal assessment components (weekly problem solving workshops, programming assignment and mid-semester test).6001, 02, 03, 04
Mid-semester testThe mid-semester test will be a based on the material covered in Weeks 1 to 6. It will be designed to test the concepts and algoriths through small problems. It will be a short test of 40 minute duration conducted in a lecture slot in Week 7.2001, 02, 03, 04