Computer Engineering BA (B), Network Security, 7.5 Credits

Please note that the literature can be changed/revised until: 
• June 1 for a course that starts in the autumn semester
• November 15 for a course that starts in the spring semester
• April 1 for a course that starts in the summer 


Print or save the syllabus as a PDF

You can easily print a syllabus from the website. Use the keyboard shortcut ctrl+p (Windows) or command+p (Mac). In the next step, you choose whether you want to print or save the course plan as a PDF.


Syllabus:
Datateknik GR (B), Nätverkssäkerhet, 7,5 hp
Computer Engineering BA (B), Network Security, 7.5 Credits

General data

  • Code: DT116G
  • Subject/Main field: Computer Engineering
  • Cycle: First cycle
  • Progression: (B)
  • Credits: 7,5
  • Progressive specialization: G1F - First cycle, has less than 60 credits in first-cycle course/s as entry requirements
  • Education area: Teknik 100%
  • Answerable faculty: Faculty of Science, Technology and Media
  • Answerable department: Department of Information Technology and Media
  • Approved: 2007-06-20
  • Date of change: 2012-05-18
  • Version valid from: 2012-06-08

Aim

The course is about the protocols, architecture and applications that are today used in the Internet to provide security. It gives you a basic understanding of the protocols for encryption, authentication, and authorization. You learn techniques to control various forms of attacks, and you analyze different types of tools for attacks with the goal to learn how to build better security mechanisms.

Course objectives

After finishing this course you should be able to:
- account for the mostly used protocols for encryption, digital signatures and certificates,
- explain how to build a network that provides secure operation and protection for users,
- apply secure communication protocols over the Internet, and
- describe how lacking network security can affect society.

Content

Fundamentals of encryption and integrity
- Symmetric- and asymetric encryption (e.g. DES, AES and RSA)
- Hash functions (e.g. HMAC)
- Block- and streamciphers
- Digital signatures
- Random and Pseudorandom numbergenerators
- Key distribution

IP Security
- Authentication header / Encryption Security Header
- Tunnel / transport modes
- Security associations
- Internet Key Exchange (IKE)

Applications for network security
- Authentication (e.g. Kerberos, X509)
- E-mail security (e.g. PGP/GPG, S/MIME)
- Web security (e.g. SSL, TLS)

Firewalls
- Types of firewalls
- Firewall location

Network threats
- Types of attacks ( e.g. worms, (D)DoS )
- Intrusion Detection

Ethical issues in network security
- Cybercrime
- Intellectual Property
- Privacy
- Ethical issues

Entry requirements

Computer Engineering BA (A), 15 credits, including Computer Networks, 7.5 Credits or Network Technology I, 7.5 Credits

Selection rules and procedures

The selection process is in accordance with the Higher Education Ordinance and the local order of admission.

Teaching form

.

Examination form

3.0 hp, L105, Laboratory exercises
Grade: Pass (P) or Fail (F).

1.5 hp, I105, Assignment
Grade: Pass (P) or Fail (F).

3.0 hp, T105: Exam
Grade: A, B, C, D, E, Fx and F. A-E are passing grades, Fx and F are failing grades.

Grading system

Seven-grade scale, A, B, C, D, E, Fx and F. Fx and F represent fail levels.

Course reading

Select litterature list:

Required literature

  • Author: William Stallings
  • Title: Network Security Essentials Pearson International Edition
  • Ort: Upper Saddle River
  • Edition: 4e eller senare
  • Publisher: Pearson Education
  • URL: http://williamstallings.com/NetworkSecurity/

Check if the literature is available in the library

The page was updated 10/14/2024