CSC 474 - Network Security
Catalog Description:Basic concepts and techniques in information security and management such as risks and vulnerabilities, applied cryptography, authentication, access control, multilevel security, multilateral security, network attacks and defense, intrusion detection, physical security, copyright protection, privacy mechanisms, security management, system assurance and evaluation, and information warfare. Coverage of high-level concepts such as confidentiality, integrity, and availability applied to hardware, software, and data. Credit not allowed for both CSC 474 and CSC 574.
Contact Hours:
- Lecture: 3 hours
Co-requisites: None
Restrictions: None
Coordinator: Dr. Bradley Reaves
Textbook: Computer Security and the Internet
Course Outcomes:
By the end of this course, students will be able to:
- Explain concepts related to applied cryptography, including plaintext, ciphertext, symmetric cryptography, asymmetric cryptography, digital signatures.
- Outline the requirements and mechanisms for identification and authentication of users and computer systems, including authentication protocols and key management. Identify the possible threats to each mechanism and ways to protect against these threats.
- Explain common network and Web vulnerabilities and attacks, defense mechanisms against these attacks, and cryptographic protection mechanisms.
- Describe the methods and motivation of Internet malware, and explain existing defense mechanisms and their limitations.
Topics:
- Security Fundamentals
- Symmetric Cryptography
- Hashes and MACs
- Asymmetric Cryptography
- Key Management
- User Authentication
- Authentication Protocols
- Networking Review
- Transport Layer Security
- TCP/IP Attacks
- Firewalls and Tunnels
- Routing Security
- DNS Security
- Malware
- Intrustion Detection Systems
- Wireless Security
- Anonymity
- Web Security
See Course Listings