COSC362-14S2 (C) Semester Two 2014

Data and Network Security

15 points

Details:
Start Date: Monday, 14 July 2014
End Date: Sunday, 16 November 2014
Withdrawal Dates
Last Day to withdraw from this course:
  • Without financial penalty (full fee refund): Sunday, 27 July 2014
  • Without academic penalty (including no fee refund): Sunday, 12 October 2014

Description

The course provides a study of the principles and practice of security for both stored and transmitted information. It addresses the fundamental principles of computer and network security and covers: Internet Threats and Hacker Techniques, Firewall Security, Intrusion Detection Systems, Authentication, Encryption Technologies, Public Key Management, Virtual Private Networks and Wireless Network Security.

Learning Outcomes

  • Students who achieve a good grade in the course should be able to:
  • understand and describe cryptographic algorithms, discuss their use and the issues of strength.
  • learn computer security technology and principles such as authentication, denial of services, intrusion detection, and firewalls
  • recognize security threats and their countermeasures in software, computer systems, networks
  • understand the protocols and standards used to provide security for communications across the Internet
  • apply the security fundamentals to management aspects of information and computer security.
  • develop the ability to compare and evaluate computer security techniques
  • develop an awareness of current and emerging computer and network security technologies
  • gain knowledge necessary for the study of advanced topics in the field of computer and network security.

Prerequisites

COSC264 or INFO333. RP: It is recommended that COSC362 and COSC364 be taken together.

Restrictions

COSC 332, ACIS 323, AFIS 323

Recommended Preparation

It is recommended that COSC362 and COSC364 be taken together.

Timetable Note

Depending on final student numbers, some of the advertised lab/tutorial streams may not run. Final lab/tutorial options will be available for self-allocation closer to the start of the semester through My Timetable.

Course Coordinator

Dong Seong Kim

Assessment

Assessment Due Date Percentage 
Assignment 15%
Final exam 40%
Lab book 15%
Test 30%

Textbooks / Resources

Required Texts

William Stallings & Lawrie Brown; Computer Security: Principles and Practice ; 2; Prentice Hall.

• Other books will be used in the course if necessary.
• Material (e.g., PowerPoint slides) from the course reader and lecture slides will be published on Learn as the course progresses.

Notes

There are several important documents available online about departmental regulations, policies and guidelines at the following site. We expect all students to be familiar with these.

Notices about this class will be posted to the class forum in the Learn system.

COSC students will also be made members of a class called “CSSE Notices”, where general notices will be posted that apply to all classes (such as information about building access or job opportunities).

Additional Course Outline Information

Grade moderation

The Computer Science department's grading policy states that in order to pass a course you must meet two requirements:
1. You must achieve an average grade of at least 50% over all assessment items.
2. You must achieve an average mark of at least 45% on invigilated assessment items.
If you satisfy both these criteria, your grade will be determined by the following University- wide scale for converting marks to grades: an average mark of 50% is sufficient for a C- grade, an average mark of 55% earns a C grade, 60% earns a B- grade and so forth. However if you do not satisfy both the passing criteria you will be given either a D or E grade depending on marks. Marks are sometimes scaled to achieve consistency between courses from year to year.

Aegrotats
If factors beyond your control (such as illness or family bereavement) prevent you from completing some item of course work (including laboratory sessions), or prevent you from giving your best, then you may be eligible for aegrotat, impaired performance consideration or an extension on the assessment. Details of these may be found in the University Calendar. Supporting evidence, such as a medical certificate, is normally required. If in doubt, talk to your lecturer.

Tentative Lecture Schedule

Week 1 Introduction and overview / Cryptographic tools (classical encryption)
Week 2 Symmetric encryption (DES, AES)  / Mode of operation
Week 3 Message authentication and hash functions / Public-key encryption
Week 4 (DH & RSA)  
Week 5 PKI / Internet Security protocols (IPsec)
Week 6 (Secure E-mail, SSL, HTTPS, etc)  
Mid-semester break
Week 7 Wireless Network Security
Week 8 Cyber and physical attacks / Vulnerability scanning
Week 9 Firewall / Intrusion Detection
Week 10 (continued) / Intrusion Response/Tolerance
Week 11 Security management / Other security issues (1)
Week 12 Other security issues (2) / Course review

Indicative Fees

Domestic fee $748.00

International fee $3,388.00

* All fees are inclusive of NZ GST or any equivalent overseas tax, and do not include any programme level discount or additional course-related expenses.

For further information see Computer Science and Software Engineering .

All COSC362 Occurrences

  • COSC362-14S2 (C) Semester Two 2014