UTI502/UBI528
NETWORK SECURITY
2022-2023 SPRING
Catalog
Data: Network
Security, 3 hour lectures
Principles of Network Attacks and Defenses, Cryptography, Authentication
and E-mail security
Instructor: PROF.DR.M.E.DALKILIC
Textbooks
·
Counter Hack, 2nd. Ed., Ed Skoudis,
2005
·
W. Stallings, Cryptography and Network Security:
Principles and Practice, 4th ed., Prentice-Hall, 2006
·
C. Kaufman, R. Perlman and M. Speciner,
Network Security 2nd ed,
Pren-Hall,2003
Referenences
·
Computer Networking, 6th ed. Kurose and Ross, 2013
Goals: A survey of network security technology. Each of the basic
building blocks of network security, including conventional and public-key
cryptography, authentication, and digital signatures are covered. In addition methods for countering hackers and viruses are
explored. The course covers important network security applications such as
PGP, PEM, Kerberos, and X509, DSS security
Prerequisites: Fundamental Concepts in Computer Networks, Graduate
standing
Topics:
·
Introduction
·
Attacks
·
Hash functions
·
User/Web authentication
·
Symmetric Encryption
·
Attacks, Denial of Service
·
Spam, Antispam
·
Wi-fi, RFID, VoIP
security
·
Intruders, viruses and worms
·
Public key cryptography
·
PKI and certificates
·
IP and WEB security
·
Firewalls
·
Anonimity networks
Grading (tentative):
HOMEWORK POLICY:
I. You can discuss homework with other
people (especially with your classmates). However, you must write the
answers to the homework questions alone, using your OWN WORDS. Copying and
sharing homeworks will be penalized severly.
II. If you submit your homework on time*
you get 20% bonus, if you submit late* you receive 20% penalty, otherwise
you get 0 points for that homework. Max. you can get from any homework is
100%.
III. On time* means you hand in the homework on
the due date (or early) to the Professor (that’s me) at the start of the class.
IV. Late* : Late homeworks
can be submitted only to the TA at
most within a week after the due date. After a week no late homeworks will be accepted.
Final Exam date: TBA Important Note: Two A4 help sheet is allowed during the
midterm exam. You can write (no photocopying allowed!) on both sides of the
help sheet.
Morning section (UBI528)
exam starts at: 09:30
Evening section (UTI502) exam starts at: 18:30
BÜTÜNLEME date: TBA Important
Note: Two A4 help sheet is allowed during the midterm exam. You can write
(no photocopying allowed!) on both sides of the help sheet.
Morning section (UBI528) exam starts at: 09:30
Evening section (UTI502) exam starts at: 18:30
Useful material mostly from Keith
Ross’s Network Security Course
Project Dates:
(e-mail to mehmet.emin.dalkilic@ege.edu.tr)
· Presentation : last week
of the term i.e., TBA (in class)
· Report : During the
presentation (submit hard copy)
· Individual or two-people projects are allowed
·
Implementation projects or literature survey/ product
security analysis type projects are accepted
·
All Reports and Presentations will be in TURKISH!
·
Sample
Project topics:
1. Internet Privacy
2. Internet
anonymity
3. Malware
4. Steganography
5. Digital
Watermarking
6. Mobile
(electronic) signature
7. Smart Card
applications
8. Authentication
applications- BAN Logic
9. secure electronic
voting
10. e-money (bitcoin)
11. Latest
Firewall technology
12. Latest IDS
technology
13. White box
cryptography
14. Block Chain
Technology
15. Mobile
application security
Midterm Exam date: TBA Important Note: An A4 help sheet is allowed during the
midterm exam. You can write (no photocopying allowed!) on both sides of the
help sheet.
Send any comments
or suggestions to dalkilic
Last revised in March, 10 1997
|