UTI502/UBI528
NETWORK SECURITY
2023-2024 SPRING
Catalog
Data: Network
Security, 3 hour lectures
Principles of Network Attacks and Defenses, Cryptography, Authentication
and E-mail security
Instructor: PROF.DR.M.E.DALKILIC
Textbooks
·
Counter Hack, 2nd. Ed., Ed Skoudis,
2005
·
W. Stallings, Cryptography and Network Security:
Principles and Practice, 4th ed., Prentice-Hall, 2006
·
C. Kaufman, R. Perlman and M. Speciner,
Network Security 2nd ed,
Pren-Hall,2003
Referenences
·
Computer Networking, 6th ed. Kurose and Ross, 2013
Goals: A survey of network security technology. Each of the basic
building blocks of network security, including conventional and public-key
cryptography, authentication, and digital signatures are covered. In addition methods for countering hackers and viruses are
explored. The course covers important network security applications such as
PGP, PEM, Kerberos, and X509, DSS security
Prerequisites: Fundamental Concepts in Computer Networks, Graduate
standing
Topics:
·
Introduction
·
Attacks
·
Hash functions
·
User/Web authentication
·
Symmetric Encryption
·
Attacks, Denial of Service
·
Spam, Antispam
·
Wi-fi, RFID, VoIP
security
·
Intruders, viruses and worms
·
Public key cryptography
·
PKI and certificates
·
IP and WEB security
·
Firewalls
·
Anonimity networks
Grading (tentative):
HOMEWORK POLICY:
I. You can discuss homework with other
people (especially with your classmates). However, you must write the
answers to the homework questions alone, using your OWN WORDS. Copying and
sharing homeworks will be penalized severly.
II. If you submit your homework on time*
you get 20% bonus, if you submit late* you receive 20% penalty, otherwise
you get 0 points for that homework. Max. you can get from any homework is
100%.
III. On time* means you submit (upload) the
homework before or on the due date to the system (EGEDERS).
IV. Late* : Late homeworks
can be submitted via system (EGEDERS) at most within a week after the due
date. After a week no late homeworks will be
accepted by the system.
Final Exam date: TBA Important Note: Two A4 help sheet is allowed during the
midterm exam. You can write (no photocopying allowed!) on both sides of the
help sheet.
Morning section (UBI528)
exam starts at: 09:30
Evening section (UTI502) exam starts at: 18:30
BÜTÜNLEME date: TBA Important
Note: Two A4 help sheet is allowed during the midterm exam. You can write
(no photocopying allowed!) on both sides of the help sheet.
Morning section (UBI528) exam starts at: 09:30
Evening section (UTI502) exam starts at: 18:30
Useful material mostly from Keith
Ross’s Network Security Course
Project Dates:
(Submit
via EGEDERS. If late e-mail to
mehmet.emin.dalkilic@ege.edu.tr)
· Presentation : last week
of the term i.e., TBA (in class) (submit via
EGEDERS)
· Report : During the
presentation (submit via EGEDERS)
· Individual or two-people projects are allowed
·
Implementation projects or literature survey/ product
security analysis type projects are accepted
·
All Reports and Presentations will be in TURKISH!
·
Sample
Project topics:
1. Internet Privacy
2. Internet
anonymity
3. Malware
4. Steganography
5. Digital
Watermarking
6. Mobile
(electronic) signature
7. Smart Card
applications
8. Authentication
applications- BAN Logic
9. secure electronic
voting
10. e-money (bitcoin)
11. Latest
Firewall technology
12. Latest IDS
technology
13. White box
cryptography
14. Block Chain
Technology
15. Mobile
application security
Midterm Exam date: TBA Important Note: An A4 help sheet is allowed during the
midterm exam. You can write (no photocopying allowed!) on both sides of the
help sheet.
Send any comments
or suggestions to dalkilic
Last revised in March, 10 1997
|