COSC362-15S2 (C) Semester Two 2015

Data and Network Security

15 points

Details:
Start Date: Monday, 13 July 2015
End Date: Sunday, 15 November 2015
Withdrawal Dates
Last Day to withdraw from this course:
  • Without financial penalty (full fee refund): Friday, 24 July 2015
  • Without academic penalty (including no fee refund): Friday, 9 October 2015

Description

The course provides a study of the principles and practice of security for both stored and transmitted information. It addresses the fundamental principles of computer and network security and covers: Internet Threats and Hacker Techniques, Firewall Security, Intrusion Detection Systems, Authentication, Encryption Technologies, Public Key Management, Virtual Private Networks and Wireless Network Security.

Prerequisites

COSC264 or INFO333. RP: It is recommended that COSC362 and COSC364 be taken together.

Restrictions

COSC 332, ACIS 323, AFIS 323

Recommended Preparation

It is recommended that COSC362 and COSC364 be taken together.

Assessment

Assessment Due Date Percentage 
Assignment 10%
Final Exam 35%
Lab Book 15%
Quizzes 10%
Mid-term Test 30%

Textbooks / Resources

Required Texts

William Stallings & Lawrie Brown; Computer Security: Principles and Practice ; 2; Prentice Hall.

Additional Course Outline Information

Grade moderation

The Computer Science department's grading policy states that in order to pass a course you must meet two requirements:
1. You must achieve an average grade of at least 50% over all assessment items.
2. You must achieve an average mark of at least 45% on invigilated assessment items.
If you satisfy both these criteria, your grade will be determined by the following University- wide scale for converting marks to grades: an average mark of 50% is sufficient for a C- grade, an average mark of 55% earns a C grade, 60% earns a B- grade and so forth. However if you do not satisfy both the passing criteria you will be given either a D or E grade depending on marks. Marks are sometimes scaled to achieve consistency between courses from year to year.

Aegrotats
If factors beyond your control (such as illness or family bereavement) prevent you from completing some item of course work (including laboratory sessions), or prevent you from giving your best, then you may be eligible for aegrotat, impaired performance consideration or an extension on the assessment. Details of these may be found in the University Calendar. Supporting evidence, such as a medical certificate, is normally required. If in doubt, talk to your lecturer.

Tentative Lecture Schedule

Week 1 Introduction and overview / Cryptographic tools (classical encryption)
Week 2 Symmetric encryption (DES, AES)  / Mode of operation
Week 3 Message authentication and hash functions / Public-key encryption
Week 4 (DH & RSA)  
Week 5 PKI / Internet Security protocols (IPsec)
Week 6 (Secure E-mail, SSL, HTTPS, etc)  
Mid-semester break
Week 7 Wireless Network Security
Week 8 Cyber and physical attacks / Vulnerability scanning
Week 9 Firewall / Intrusion Detection
Week 10 (continued) / Intrusion Response/Tolerance
Week 11 Security management / Other security issues (1)
Week 12 Other security issues (2) / Course review

Indicative Fees

Domestic fee $778.00

International fee $3,450.00

* All fees are inclusive of NZ GST or any equivalent overseas tax, and do not include any programme level discount or additional course-related expenses.

For further information see Computer Science and Software Engineering .

All COSC362 Occurrences

  • COSC362-15S2 (C) Semester Two 2015