CENG 561

Advanced Information Security

Concepts and applications of system and data security. Topics include risks and vulnerabilities, policy formation, controls and protection methods, database security, encryption, authentication technologies, host-based and network-based security issues, personnel and physical security issues, issues of law and privacy. Areas of particular focus include secure network design, implementation and transition issues, and techniques for responding to security breaches.

Course Objectives

To teach the fundamental topics and theorems of computer security. To teach the doing research, problem analyzing, defining alternative solutions, comparing them and modeling the solution techniques for the ICT security. To teach the hot topic concepts, research areas and problems of computer science which are related to ICT security.

Recommended or Required Reading

Aleph One – Smashing the Stack for Fun and Profit: http://www.phrack.org/issues.html?issue=49&id=14#article ,US Security Awareness (.org): http://www.ussecurityawareness.org/highres/index.html ,NSU InfoSec web site (of course): http://infosec.nova.edu/ ,Bruce Schneier – Crypto-gram Newsletter: http://www.schneier.com/crypto-gram.html ,Microsoft Security Guidance Center: http://www.microsoft.com/security/guidance/default.mspx ,B. Matt, Introduction to Computer Security ,Addison-Wesley, Pearson Education, 2005 ,SNORT.ORG: http://www.snort.org/

Learning Outcomes

1 . The analyzing and modelling capability for the security architectures of the Information and Communication systems which are the coming with technological improvements.

2.  Defining and modelling capability of security problems of new technological improvements and related hot topic security research problems.

3.  To have the estimate and plan capability for the future study and research areas of security and the theoretical parts of computer science.

4. To be able to design and manage new information security interdisciplinary projects which have the positive impact to social life.

Topics
Introduction Module 1: Introduction to Computer Security and Assurance
Introduction Module 1: Introduction to Computer Security and Assurance
Introduction Module 1: Introduction to Computer Security and Assurance
Module 2: Policies
Module 2: Policies
Module 3: Cryptography and Key Management
Module 3: Cryptography and Key Management
Module 3: Cryptography and Key Management
Module 4: Authentication and Access Control
Module 4: Authentication and Access Control
Module 5: Network Security and Intrusion Detection
Module 5: Network Security and Intrusion Detection
Course Project completion
Course Project completion

Grading

Midterm 25%

Presentation 40%

Final 35%