COE451: Computer and Network Security - Spring 2013 (T122)
Lecture: Sunday/Tuesday | 10:00 - 11:15 | 22/130
Instructor: Ahmad Almulhem
Office: 22/407-2
Email: ahmadsm at kfupm
Office Hours:Saturday/Sunday/Monday/Tuesday 11:00 - 12:00 and by appointment (email me)
Description
Introduction to computer security (concepts, threats, attacks, assets, scope, trends).
Cryptographic Protocols and standards. Integrity verification mechanisms. Wireless network
security and associated protocols. Software tools to apply security in user environments.
Access Control models and mechanisms. Database security, Intrusion detection systems, Firewalls.
Malicious software, DoS attacks, Trusted computing and multilevel security.
Note: Cannot be taken for credit with ICS 444
A note on ethics: Techniques and tools
discussed in class are strictly for educational purpose.
DO NOT try them on a system/data that
you don't own or for which you don't have permission. Otherwise, you might get yourself in
serious legal consequences.
Prerequisite:
COE 344
Textbook
Mark Stamp, Information security: principles and practice, 2nd edition, Wiley 2011.
Evaluation
- 30% - Homework
- 30% - Major Exam (DATE TBA)
- 30% - Final Exam
- 10% - Attendance and Participation (-1 per absence)
- Bonus points are rewarded for exceptional work
Letter grades are assigned according to the following table:
Letter Grade | A+ | A | B+ | B | C+ | C | D+ | D | F |
Range | 95-100 | 90-94 | 85-89 | 80-84 | 75-79 | 70-74 | 65-69 | 60-64 | 0-59 |
Tentative Topics (3 hours equals 1 week of class time)
- Introduction
- Crypto
- Chapter 2: Crypto Basics (3 hours)
- Chapter 3: Symmetric Key Crypto (4 hours)
- Chapter 4: Public Key Crypto (4 hours)
- Chapter 5: Hash Functions and Other Topics (4 hours)
- Access Control
- Chapter 7: Authentication (4 hours)
- Chapter 8: Authorization (2 hour)
- Protocols
- Chapter 9: Simple Authentication Protocols (4 hours)
- Chapter 10: Real-World Security Protocols (5 hours)
- Software
- Chapter 11: Software Flaws and Malware (4 hours)
- Chapter 12: Insecurity in Software (4 hours)
- Chapter 13: Operating Systems and Security (4 hours)
Lecture slides, errata, and other resources are available at the textbook's page
here
Policies
- Attendance is checked in each class. A DN grade is reported after 6 absences (20%).
- No makeup quizzes or exams.
- Late submissions are not accepted.
- No tolerance for cheating and plagiarism. KFUPM regulations will be enforced in such cases.
Resources
- Handbook of
Applied Cryptography, A. Menezes, P. van
Oorschot, and S. Vanstone, CRC Press, 1996.
- Security in
Computing, 4th Edition, Charles P. Pfleeger, Prentice Hall
- Practical
Unix and Internet Security, Simon Garfinkel and Gene Spafford
- Cryptography: An Introduction,
2nd Edition, Nigel Smart