Teaching Responsibility
LJMU Schools involved in Delivery:
LJMU Partner Taught
Learning Methods
Lecture
Practical
Tutorial
Module Offerings
7533CYQR-APR-PAR
7533CYQR-JAN-PAR
7533CYQR-SEP_NS-PAR
Aims
To develop an understanding of various security vulnerabilities in and threats to computer networks as well as the importance of network security.
To assess critically a variety of generic security technologies for protection of computer networks.
To promote the use of appropriate security techniques to solve network security problems.
Learning Outcomes
1.
Demonstrate critical awareness of network security threats and vulnerabilities
2.
Apply security analysis skills to complex security problems for a given application.
3.
Critically evaluate security protocols and mechanisms for the provision of security services needed for secure networked applications.
4.
Demonstrate comprehensive understanding of security techniques to solve network security problems.
Module Content
Outline Syllabus:Fundamentals of network security: security concepts, security policies, security threats and vulnerabilities, authentication principles and means, trust management, and importance of network security and its applications.
Cryptographic techniques: cryptanalytic attacks, conventional/symmetric cryptography (e.g. DES), public-key/asymmetric cryptography (e.g. RSA), cryptographic key distribution, key establishment, hash functions (e.g. SHA), message authentication code and digital signatures (e.g. DSA).
Security measures: message integrity, message confidentiality, user and message authentication, public-key certification, key certificate validation and revocation, and X.509 directory authentication services.
Network security applications: network-based authentication protocols and services (e.g. Kerberos), IP security (e.g. IPSec) for secure Internet-based communications, virtual private networks, web security (e.g. SSL/TLS), e-mail security (e.g. PGP), and wireless security.
Additional Information:The spectacular growth of the Internet has spawned a great demand for awareness of security threats to computer networks and application of security techniques to network protection. In response to the demand, this module examines various security issues and solutions to network protection.