cse3nsw networks sys and web security

NETWORKS SYSTEMS AND WEB SECURITY

CSE3NSW

2016

Credit points: 15

Subject outline

This subject begins with an overview of the Open Systens Interconnection (OSI) architecture and security attacks on system services, and a discussion of different existing security mechanisms. The main focus includes cryptography, system security, network and web security. The students learn: (1) cryptographic algorithms and protocols, underlying network security applications including single-key and public-key encryption methods, hash functions, digital signartures and key exchange; (2) intrusion detection systems and firewalls that can be used to protect a computer system from security threats, such as intruders, viruses, and worm; (3) the use of cryptographic algorithms and security protocols for providing network and internet security in terms of user authentication/identification, IP security and Web security.

SchoolSchool Engineering&Mathematical Sciences

Credit points15

Subject Co-ordinatorSomnath Ghosh

Available to Study Abroad StudentsYes

Subject year levelYear Level 3 - UG

Exchange StudentsYes

Subject particulars

Subject rules

Prerequisites CSE2NEF or equivalent

Co-requisitesN/A

Incompatible subjects CSE42FNS, CSE3NSS, CSE4FNS, CSE5NSW AND students enrolled in any Graduate Diploma or Masters by Coursework course.

Equivalent subjectsN/A

Special conditionsN/A

Graduate capabilities & intended learning outcomes

01. Apply the methodologies in regard to system-level security issues, including the threat of and counter-measures for intruders and viruses, and the use of firewalls and trusted systems.

Activities:
Two (1-hour) lectures on the topics of security attacks, security serivces and the OSI model. Two lectures on intrusion detection and malicious software. Two lectures on firewalls and tursted systems. Four (1-hour) associated tutorial sessions where students are given short and application problem statements and they are required to apply the technologies learned in class in relation to the problem statements.
Related graduate capabilities and elements:
Writing(Writing)
Inquiry/ Research(Inquiry/ Research)
Critical Thinking(Critical Thinking)
Discipline-specific GCs(Discipline-specific GCs)
Creative Problem-solving(Creative Problem-solving)

02. Describe cryptographic algorithms and protocols underlying network security applications, including encryption, hash functions, digital signatures, and key exchange.

Activities:
Three lectures on conventioanl (single-key) encryption. 1.5 lectures on message confidentiality. Three lectures on public-key cryptography. 1.5 lectures on message authenticaiton. Two associated tutorial sessions for each of the topics: Single-key Encryption, Hash Functions, Digital Signatures, and Key Exchange. In each topic students will be given short and application problem statements for discussions.
Related graduate capabilities and elements:
Quantitative Literacy/ Numeracy(Quantitative Literacy/ Numeracy)
Inquiry/ Research(Inquiry/ Research)
Discipline-specific GCs(Discipline-specific GCs)
Writing(Writing)
Critical Thinking(Critical Thinking)
Creative Problem-solving(Creative Problem-solving)

03. Identify techniques for analysing security and privacy issues by using important network security tools and applications, including Kerberos, PGP, and IPSec, SSL/TLS.

Activities:
Three lectures on authentication applications and Kerberos. Three lectures on X.509 and PGP. Three lectures on IP security and web security. Two associated tutorial sessions for each of the topics: Kerberos, PGP, IPSec, and SSL/TLS. In each topic students will be given short and application problem statements for discussions.
Related graduate capabilities and elements:
Inquiry/ Research(Inquiry/ Research)
Critical Thinking(Critical Thinking)
Creative Problem-solving(Creative Problem-solving)
Writing(Writing)
Discipline-specific GCs(Discipline-specific GCs)

04. Identify possible risks and ethical and social considerations relevant to information privacy and security issues.

Activities:
Two tutorial sessions discuss ethical and social issues in relation to information security using two ethical case studies (Case #3 and #16) from the Australian Computer Society.
Related graduate capabilities and elements:
Ethical Awareness(Ethical Awareness)

Subject options

Select to view your study options…

Start date between: and    Key dates

Dandenong, 2016, Semester 2, Day

Overview

Online enrolmentYes

Maximum enrolment sizeN/A

Enrolment information

Subject Instance Co-ordinatorSomnath Ghosh

Class requirements

LectureWeek: 31 - 43
One 2.0 hours lecture per week on weekdays during the day from week 31 to week 43 and delivered via face-to-face.

TutorialWeek: 31 - 43
Two 1.0 hours tutorial per week on weekdays during the day from week 31 to week 43 and delivered via face-to-face.

Assessments

Assessment elementComments%ILO*
Assignment 1/Lab Work - information security and management (Approx 350 words)1001
Assignment 2/Test - Internet Security (Approx 1150 words)Hurdle requirement: In order to pass the subject, students must obtain an overall pass grade in the first insatnce, and obtain at least 50% in both the examination and the assignment components.3002, 03
one 3-hour examination6001, 02, 03, 04

Melbourne, 2016, Semester 2, Day

Overview

Online enrolmentYes

Maximum enrolment sizeN/A

Enrolment information

Subject Instance Co-ordinatorSomnath Ghosh

Class requirements

LectureWeek: 31 - 43
Two 1.0 hours lecture per week on weekdays during the day from week 31 to week 43 and delivered via face-to-face.

PracticalWeek: 31 - 43
One 2.0 hours practical per week on weekdays during the day from week 31 to week 43 and delivered via face-to-face.

Assessments

Assessment elementComments%ILO*
Assignment 1/Lab Work - information security and management (Approx 350 words)1001
Assignment 2/Test - Internet Security (Approx 1150 words)Hurdle requirement: In order to pass the subject, students must obtain an overall pass grade in the first insatnce, and obtain at least 50% in both the examination and the assignment components.3002, 03
one 3-hour examination6001, 02, 03, 04