The course begins with a study of classical cryptosystems and the methods used to break them. The major currently used systems, DES, AES and RSA, are then introduced and examined from a design and security perspective. It then reviews how these tools are utilized in the Internet protocols and applications such as SSL/TLS, IPSEC, Kerberos, PGP and others including wireless. They will learn how to identify network security threats.System security issues are also covered, such as viruses, intrusion and firewalls. The design, implementation and configuration of system security for operating systems, databases and servers with attention given to defense and prevention systems, intrusion detection systems and trace-back systems. They will also learn how to select and deploy firewalls and manage VPNs.This module provides students with a solid theoretical and practical foundation for building secure distributed systems. Students will discover how to protect systems against malicious attacks, using technologies (both hardware and software) such as: cryptology, software reliability, VPN, IDS and IPS.
Intended learning outcomes
Knowledge &understand
A critical understanding of the technology underpinning intrusion detection and firewalls, secure networking and internetworking, and digital content protection.
A critical understanding of cryptology.
An understanding of issues concerning physical security and biometrics.
An understanding of issues concerning wireless security.
mental skills
Designing secure information systems.
Analysis of security over certain information system.
The ability to use different methods of encryption.
To gain knowledge for wireless networks security design.
Practical & professional skills
An ability to build secure protocols.
An ability to recognize distributed denial of service attacks.
Diagnosis of problems and use of diagnostic and auditing tools.