DATA NETWORK SECURITY

CSE5DNS

2018

Credit points: 15

Subject outline

This subject begins with an overview of security attacks on system and network services, and a discussion of different existing security mechanisms. The main focus includes cryptography and its application in systems, networks and web security.  The students learn: (1) cryptographic algorithms and protocols, underlying network security applications including single-key and public-key encryption methods, hash functions, digital signatures and key exchange; (2) intrusion detection systems and firewalls that can be used to protect a computer system from security threats such as intruders, viruses and worm; (3) the use of cryptographic algorithms and security protocols for providing network and internet security in terms of user authentication / identification, IP security and Web security.  Students will also learn advanced information security through research papers, including mathematical cryptanalysis on single-key and public-key encryption algorithms.

SchoolSchool Engineering&Mathematical Sciences

Credit points15

Subject Co-ordinatorNaveen Chilamkurti

Available to Study Abroad StudentsYes

Subject year levelYear Level 5 - Masters

Exchange StudentsYes

Subject particulars

Subject rules

Prerequisites CSE5NEF

Co-requisitesN/A

Incompatible subjects CSE5NSW

Equivalent subjectsN/A

Special conditionsN/A

Graduate capabilities & intended learning outcomes

01. Analyse system / network security and identify security flaws in a system / network.

Activities:
Lectures will discuss existing security systems and what are the flaws in the security for these systems. Students will also learn about how to identify security loop holes for these systems and compare with new security systems.

02. Analyse cryptographic algorithms (encryption, hash functions, digital signature, key exchange etc.) and the underlying mathematical structures.

Activities:
The lectures will outline existing cryptography algorithms including digital signature, key exchange protocols, syn keys, Asynchronous keys, how these logarithms are developed will also be discussed. There will be couple of labs analyzing these algorithms.

03. Review and test important security tools and applications such as Kerberos, PGP, IPsec and SSL/TLS.

Activities:
Lectures will discuss selected security tools used in current cybersecurity context and review such tools for various case studies. Students will also do two labs to review security testing tools.

04. Identify and investigate ethical and social considerations relevant to information privacy and security issues.

Activities:
Lectures and tutorials will involve case studies about ethical and social considerations with respect to information privacy and security.

05. Review and analyse the functions and operation of firewalls and intrusion detection systems.

Activities:
Lectures and labs will discuss current firewall operations and Intrusion detection systems. The existing firewall techniques will be reviewed in depth.

06. Analyse system / network vulnerability and design access control mechanisms.

Activities:
Lectures and labs will discuss network vulnerablities and access control design and development issues.

Subject options

Select to view your study options…

Start date between: and    Key dates

City Campus, 2018, Semester 2, Day

Overview

Online enrolmentYes

Maximum enrolment sizeN/A

Enrolment information

Subject Instance Co-ordinatorNaveen Chilamkurti

Class requirements

Lecture Week: 31 - 43
One 2.0 hours lecture per week on weekdays during the day from week 31 to week 43 and delivered via face-to-face.

Computer Laboratory Week: 32 - 43
One 2.0 hours computer laboratory per week on weekdays during the day from week 32 to week 43 and delivered via face-to-face.

Assessments

Assessment elementComments% ILO*
One 2-hour laboratory-based practical exam20 01, 02, 03, 04, 05, 06
Two half-hour online tests ( 500 words each)30 01, 02
One final 3-hour exam50 01, 02, 03, 04, 05, 06