Information System SecuritySummer Term 2006 - 3
Arab Academy for Banking and Financial
- Grades will be posted here.
- You are supposed to choose a topic related to information security
in general. After collecting and reading enough references, you are
asked to prepare a presentation and a term paper for your project. You
are required to present your work in front of the class.
- Midterm Exam: Sat 12/8/2006 from
3:30-4:30 PM, in the class room
- Final Exam: Sat 2/9/2006 from
4:00-6:00 PM, in the class room
HW1 - DUE Sat 22/7/2005 by 11:30 PM
: Search the web and find 6 major computer and/or network security
companies and identify a product from each company. Provide the
1. URL of the company website,
2. URL of the product website,
3. A brief description of the product (one paragraph in your own words).
- HW2 - DUE Sat 29/7/2006 by
11:30 PM : Please solve the
following problems from Chapter 2:
- Review Problems: 2.1, 2.2, 2.5,
- Problems: 2.1, 2.5, 2.7
All homework assignments are submitted by email to :
email@example.com Please name
your file as your last name followed by homework number, for example,
Also make sure that your name is printed within the homework file.
Late HWs are not accepted
Week 1: Overview and Basic Concepts:
Week 2 : Introduction
Chapter 1, Classical Encryption
Week 3 : Block Ciphers and The Data Encryption Standard
Week 4: Confidentiality Using Symmetric Encryption
Chapter 7, Public-key
Cryptography and RSA.Chapter 9,
Week 5: Key Management and Other Public-key Techniques
Week 6: Message Authentication and Hash Functions, Authentication
Functions and Digital Signatures,
Chapter 11, 12, 13
Week 7: Kerberos Authentication Protocol
Chapter 14 , Electronic Mail Security
Chapter 15, IP Security
Week 8: Web Security-Secure Socket Layer
Chapter 17, Intruders-Password Management
Chapter 18, Firewalls
Week 9: Extra Material:
Mobile Code Security, Chinese Wall Model,
Denial of Service-DoS,
Water Marking , Computer Forensics
ObjectivesIn this course, we study the theoretical and
practical aspects of network security. We start with a threat model, and
describe vulnerabilities of computer networks to attacks by adversaries
and hackers using a variety of techniques. We then study methods and
techniques to circumvent or defend against these attacks and to minimize
their damage. In this context, we study cryptographic techniques and
protocols, network security protocols, digital signatures and
authentication protocols, network security practice, and wireless network
Catalog DescriptionSecurity attacks, mechanisms, and services.
Network security and access security models. Overview of secret-key and
public-key cryptography. Authentication protocols and key management.
Network security practice. Email security. IP security and web security.
Intrusion detection and prevention systems. Firewalls and virtual private
networks. Wireless network security.
- Introduction: Security attacks to information systems. Threat
model. Security services. Mechanisms for providing confidentiality,
authentication, integrity, nonrepudiation, and access control.
Cryptography in data and communication security.
- Secret-Key and Public-Key Cryptography: Cryptosystems and
cryptanalysis. Block ciphers and stream ciphers. DES, AES, and RC4.
Modes of operation. Confidentiality using encryption. Key distribution.
Random number generation. Hashes and message digests. One-way functions.
Trapdoor one-way functions. Public-key cryptosystems. RSA,
Diffie-Hellman, ElGamal, and elliptic curve cryptosystems.
- Authentication: Overview of authentication systems.
Authentication of people. Security handshake pitfalls. Strong password
protocols. Digital signatures. One-way and mutual authentication
- Network Security Standards and Practice: Kerberos V4 and V5.
PKI (Public Key Infrastructure). Real-time communication security. IPsec:
SSL/TLS. Electronic mail security. S/MIME, and PGP (Pretty Good
Privacy). Firewalls, Web security.
The BookW. Stallings. Cryptography & Network Security,
Fourth Edition, Prentice Hall, 2005.
More Information about the Book
- Assignments and Presentation: 20 %
- Term Paper: 20 %
- Midterm: 20 %
- Final: 40 %
PrerequisitesThis class is open to undergraduate students in the
Dr. Lo'ai A. Tawalbeh