COMP38411 Cryptography & Network Security syllabus 2014-2015
The popularity of the Internet, coupled with the explosive growth of mobile computing devices (phones, personal digital assistants (PDAs) and laptops), has led to the world of universal electronic connectivity. In this connected world, people access data and services on the Internet and communicate with each other anywhere and anytime. While this level of connectivity may bring us many benefits such as improving our quality of life and running services with global presence but with reduced costs, it does open vast opportunities for unauthorised access to data, services and other resources and for fraud and forgeries in commercial and business activities. Therefore, it is of paramount importance to increase both awareness and knowledge in protecting data and resources from unauthorised disclosure, in guaranteeing the authenticity of data in transit, and in protecting networked systems against attacks.
This course unit aims to introduce the principles and practice of cryptography and network security. It covers cryptography, network-based security threats and vulnerabilities, and practical solutions to system and network security. It is designed for students who have some understanding of computer networks and protocols, but no background in security.
Introduction to Security
basic notions of security (confidentiality, integrity and availability), risk assessment, security threats, models, policies, and mechanisms
conventional ciphers, block cipher and stream cipher operations, introduction to number theory, public-key ciphers, message authentication code and cryptographic hash functions, digital signatures, Public Key Infrastructures (PKIs), cryptographic key management and distribution
System and Software Security
user identification and authentication, single sign on, authorisation, software security
IP security, transport layer security, web security
Advanced Security Topics
wireless local area network (WLAN) security, ad hoc network security, e-commerce security, Cloud computing security
Feedback methodsVia question/answer sessions.
- Lectures (22 hours)
- Practical classes & workshops (16 hours)
- Analytical skills
- Problem solving
|Programme outcome||Unit learning outcomes||Assessment|
|A3||Understand the principles and practices of cryptographic techniques.|
|A3 B1||Understand a variety of generic security threats and vulnerabilities, and identify and analyse particular security problems for a given application.|
|A3||Understand the design of security protocols and mechanisms for the provision of security services needed for secure networked applications.|
|A3||Appreciate the application of security techniques and technologies in solving real-life security problems in practical systems.|
|B1||Design security protocols and methods to solve specified security problems.|
|C4||Be familiar with current research issues and directions of network security.|
|Cryptography and network security: principles and practice (7th edition)||Stallings, William||9781292158587||Pearson||2017||✔|
|Security+ guide to network security fundamentals (5th edition)||Ciampa, Mark||9781305093911||CENGAGE Learning||2014||✖|
|Introduction to computer security||Bishop, Matt||9780321247445||Addison-Wesley||2004||✖|
|Computer security (3rd edition)||Gollmann, Dieter||9780470741153||Wiley||2010||✖|
Course unit materials
Links to course unit teaching materials can be found on the School of Computer Science website for current students.