Teaching Responsibility
LJMU Schools involved in Delivery:
Computer Science and Mathematics
Learning Methods
Lecture
Practical
Tutorial
Module Offerings
7133COMP-JAN-CTY
Aims
To develop an understanding of various security vulnerabilities in and threats to computer networks as well as the importance of network security.
To assess critically a variety of generic security technologies for protection of computer networks.
To promote the use of appropriate security techniques to solve network security problems.
Learning Outcomes
1.
Demonstrate critical awareness of network security threats and vulnerabilities
2.
Apply security analysis skills to complex security problems for a given application.
3.
Critically evaluate security protocols and mechanisms for the provision of security services needed for secure networked applications.
4.
Demonstrate comprehensive understanding of security techniques to solve network security problems.
Module Content
Outline Syllabus:
Fundamentals of network security: security concepts, security policies, security threats and vulnerabilities, authentication principles and means, trust management, and importance of network security and its applications. Cryptographic techniques: cryptanalytic attacks, conventional/symmetric cryptography, public-key/asymmetric cryptography, cryptographic key distribution, key establishment, hash functions, message authentication code and digital signatures. Security measures: message integrity, message confidentiality, user and message authentication, public-key certification, key certificate validation and revocation, X.509 key certification standard and related PKI services. Network security applications: network-based authentication protocols and services (e.g. Kerberos), IP security (e.g. IPSec) and for secure Internet-based communications, virtual private networks (VPN), web security (e.g. SSL/TLS), e-mail security (e.g. PGP), and wireless security.
Fundamentals of network security: security concepts, security policies, security threats and vulnerabilities, authentication principles and means, trust management, and importance of network security and its applications. Cryptographic techniques: cryptanalytic attacks, conventional/symmetric cryptography, public-key/asymmetric cryptography, cryptographic key distribution, key establishment, hash functions, message authentication code and digital signatures. Security measures: message integrity, message confidentiality, user and message authentication, public-key certification, key certificate validation and revocation, X.509 key certification standard and related PKI services. Network security applications: network-based authentication protocols and services (e.g. Kerberos), IP security (e.g. IPSec) and for secure Internet-based communications, virtual private networks (VPN), web security (e.g. SSL/TLS), e-mail security (e.g. PGP), and wireless security.
Module Overview:
The growth of the Internet means that it is more important than ever to be aware of security threats to computer networks. This module explores security vulnerabilities and threats, emphasising the importance of network security. It looks at security issues and solutions to network protection, critically assessing security technologies and promoting the use of security techniques.
The growth of the Internet means that it is more important than ever to be aware of security threats to computer networks. This module explores security vulnerabilities and threats, emphasising the importance of network security. It looks at security issues and solutions to network protection, critically assessing security technologies and promoting the use of security techniques.
Additional Information:
The spectacular growth of the Internet has spawned a great demand for awareness of security threats to computer networks and application of security techniques to network protection. In response to the demand, this module examines various security issues and solutions to network protection.
The spectacular growth of the Internet has spawned a great demand for awareness of security threats to computer networks and application of security techniques to network protection. In response to the demand, this module examines various security issues and solutions to network protection.