Computer and Network Security (CS 475)

 Announcments  Lectures  Programs  Course Resources   Assignments and Solutions  Grading Policy
Course Description
The key objective of this class is to provide a thorough understanding of technologies and methodologies with which computer networks can be protected. Topics that are covered include: Key Management Credentials, Steganography and Watermarking, Networking Security (VPNs, Firewalls, Intrusion Detection) and System Security Policies.
Course Objectives
  1. Understand basic cryptography theory, including some well known algorithms for symmetric and public key encryption, digital signatures, key management, etc.
  2. Understand how crypto can be used as an effective tools in providing assurances concerning privacy and integrity of information, non-repudiation, etc.
  3. Understand the principles of computer and network security.
  4. Appreciate the issues involved in creating secure systems (robust software, security in depth, policy, attack mitigation, etc.)
Audience
Undergraduate computer science, mathematics, engineering, interested in computer and network security.
Prerequisites
Operating Systems (CS 370) and Computer Networking (CS 472).
Some knowledge of linear algebra and statistics.
Instructor
Jeremy Johnson (with guest lectures by Spiros Mancoridis and Bill Regli
Office: University Crossings 100
phone: (215) 895-2669
e-mail: jjohnson AT cs DOT drexel DOT edu
office hours: TR 2-3. Additional hours by appointment.
Meeting Time
TR 12:30-1:50 in University Crossings 153
Course Announcemens, Questions, and Discussion
Please use BBvista (webct) for questions and discussions related to the course. If you know the answer to someone's question, please feel free to jump in, as long as well it is not an answer to a homework problem. Course announcements will also be posted there.
Textbook
  1. C. Pfleeger, Security in Computing, 3rd Ed. Upper Saddle River NJ: Prentice Hall, 2003.
  2. Maple version 11. Maple is available free of charge to Drexel University students through a University site license. See IRT Software. Course notes will be made available as Maple worksheets. Additional resources will be made available as needed.


Topics

  1. Elements of Cryptography (Chapters 2 and 10)
  2. Public Key Encryption
  3. Cryptographic standards and protocols
  4. Applications to network security
  5. Network security
  6. Program security
  7. Secure systems


Grading

  1. Homework assignments and labs (50%)
  2. Midterm (25%)
  3. Final Project (25%)
Assignments and exams will be returned on a regular basis to provide feedback to students. All students must do their own work, unless explicitly stated otherwise. Any violation of this will result in a zero grade for the assignment. A second violation may lead to an F for the course.


Resources

Reference Books
Web Pages
  1. Waterloo Maple


Go to BBvista for announcements


Lectures

This list is tentative and may be modified at the instructor's discretion.
  1. Week 1 (Introduction to Cryptography and Cryptanalysis - Chapter 2)
    1. Jan. 8, 2008 (Monoalphabetic Substitution Cyphers)
    2. Jan. 10, 2008 (Polyalphabetic Substitution Cyphers)
  2. Week 2 (Introduction to Cryptography and Cryptanalysis - Chapter 2 and Maple Documentation)
    1. Jan. 15, 2008 (Modular Arithmetic and Affine Cyphers)
    2. Jan. 17, 2008 (Linear Algebra and Hill Cyphers)
  3. Week 3 (Symmetric Key Encryption and DES Standard- Chapter 2 and 10)
    1. Jan. 22, 2008 (Data Encryption Standard)
    2. Jan. 24, 2008 (Data Encryption Standard)
  4. Week 4 (Public Key Encryption - Chapter 2 and 10)
    1. Jan. 29, 2008 (RSA Public Key Encryption)
    2. Jan. 31, 2008 (RSA Public Key Encryption)
  5. Week 5 (Midterm)
    1. Feb. 5, 2008 (Review and Finish Labs)
    2. Feb. 7, 2008 (Midterm Exam)
  6. Week 6 (Network Security and Cryptographic Protocols)
    1. Feb. 12 2008 (Public Key Cryptography Systems - Signatures, Hash Functions, and Authentication Mechanisms)
    2. Feb. 14 2003 (Key Exchange Methods - Diffie-Hellman)
  7. Week 7 (Network Security and Cryptographic Protocols)
    1. Feb. 19, 2008 (Applications - IPSEC and SSL/SSH/PGP)
    2. Feb. 21, 2008 (Security Tools Lab - OpenSSL CA Functions, RSA Key Generation, Ethereal/Wireshark)
  8. Week 8 (Malware)
    1. Feb. 26, 2008 (Types of Malware)
    2. Feb 28, 2008 (Case Studies)
  9. Week 9 (Software Security Vulnerability)
    1. March 4, 2008 (Types of Software Security Vulnerabilities)
    2. March 6, 2008 (Detecting and Avoiding Software Security Vulnerabilities)
  10. Week 10 (Software Security Lab)
    1. March 11, 2008 ()
    2. March 13, 2008 ()
  • Week 11 (Final Projects)
    1. Project List


    Programs and Worksheets


    Assignments

    Solutions

    Created: 3/24/01 (revised 5/22/01) by jjohnson AT cs DOT drexel DOT edu