COE451: Computer and Network Security - Fall 2013 (T131)
Lecture: Mon/Wed | 10:00 - 11:15 | 24/180
Instructor: Ahmad Almulhem
Email: ahmadsm at kfupm
Office Hours:Sun/Mon/Tue/Wed:11:15-12:15 and by appointment (email me)
Introduction to computer security (concepts, threats, attacks, assets, scope, trends).
Cryptographic Protocols and standards. Integrity verification mechanisms. Wireless network
security and associated protocols. Software tools to apply security in user environments.
Access Control models and mechanisms. Database security, Intrusion detection systems, Firewalls.
Malicious software, DoS attacks, Trusted computing and multilevel security.
Note: Cannot be taken for credit with ICS 444
A note on ethics: Techniques and tools
discussed in class are strictly for educational purpose.
DO NOT try them on a system/data that
you don't own or for which you don't have permission. Otherwise, you might get yourself in
serious legal consequences.
Mark Stamp, Information security: principles and practice, 2nd edition, Wiley 2011.
- 30% - Homework
- 30% - Major Exam (DATE TBA)
- 30% - Final Exam
- 10% - Attendance and Participation (-1 per absence)
- Bonus points are rewarded for exceptional work
Letter grades are assigned according to the following table:
Tentative Topics (3 hours equals 1 week of class time)
Lecture slides, errata, and other resources are available at the textbook's page
- Chapter 2: Crypto Basics (3 hours)
- Chapter 3: Symmetric Key Crypto (4 hours)
- Chapter 4: Public Key Crypto (4 hours)
- Chapter 5: Hash Functions and Other Topics (4 hours)
- Access Control
- Chapter 7: Authentication (4 hours)
- Chapter 8: Authorization (2 hour)
- Chapter 9: Simple Authentication Protocols (4 hours)
- Chapter 10: Real-World Security Protocols (5 hours)
- Chapter 11: Software Flaws and Malware (4 hours)
- Chapter 12: Insecurity in Software (4 hours)
- Chapter 13: Operating Systems and Security (4 hours)
- Attendance is checked in each class. A DN grade is reported after 6 absences (20%).
- No makeup quizzes or exams.
- Late submissions are not accepted.
- No tolerance for cheating and plagiarism. KFUPM regulations will be enforced in such cases.
- Handbook of
Applied Cryptography, A. Menezes, P. van
Oorschot, and S. Vanstone, CRC Press, 1996.
- Security in
Computing, 4th Edition, Charles P. Pfleeger, Prentice Hall
Unix and Internet Security, Simon Garfinkel and Gene Spafford
- Cryptography: An Introduction,
2nd Edition, Nigel Smart