Module title: Network Security and Cryptography

SCQF level: 09:
SCQF credit value: 20.00
ECTS credit value: 10

Module code: CSN09112
Module leader: Bill Buchanan
School School of Computing
Subject area group: Cyber Security and Networking
Prerequisites

CSN08102

Level 8 equivalent networking-related module or module in software development.

2019/0, Trimester 1, Blended, Edinburgh Napier University
Occurrence: 002
Primary mode of delivery: Blended
Location of delivery: MERCHISTON
Partner: Edinburgh Napier University
Member of staff responsible for delivering module: Bill Buchanan
Module Organiser:


Learning, Teaching and Assessment (LTA) Approach:
Learning & Teaching methods including their alignment to LOs

• The module will use an advanced cloud infrastructure which virtualises hosts and devices, and allows complex network architectures to be created [LO1 and LO2].
• The Asecuritysite Web package contains a completely managed learning environment, where the students can track their performance [LO1 and LO2].
• The coursework will involve the design, implementation, evaluation and critical analysis of a system to a given set of security requirements for an intrusion detection system [LO3].

Embedding of employability/PDP/Scholarship Skills
The module uses industry-standard methods, protocols, equipment and software.

Assessment (formative or summative)
There will be two methods of assessment:

• Coursework [50%]. This relates to a coursework on the design, implementation, evaluation and critical analysis of a prototype of a security infastructure system, based on a range of requirements for an intrusion detection system [LO2 and LO3].
• On-line tests [50%]: This involves two on-line tests which cover the key areas of network security and cryptography [LO1 and LO2].


Formative Assessment:
The University is currently undertaking work to improve the quality of information provided on methods of assessment and feedback. Please refer to the section on Learning and Teaching Approaches above for further information about this module’s learning, teaching and assessment practices, including formative and summative approaches.

Summative Assessment:
The University is currently undertaking work to improve the quality of information provided on methods of assessment and feedback. Please refer to the section on Learning and Teaching Approaches above for further information about this module’s learning, teaching and assessment practices, including formative and summative approaches.

Student Activity (Notional Equivalent Study Hours (NESH))
Mode of activityLearning & Teaching ActivityNESH (Study Hours)
Face To Face Lecture 24
Face To Face Practical classes and workshops 24
Independent Learning Guided independent study 152
Total Study Hours200
Expected Total Study Hours for Module200


Assessment
Type of Assessment Weighting % LOs covered Week due Length in Hours/Words
Digital Examination (not Centrally Timetabled) 25 1,2 9 HOURS= 1, WORDS= 0
Project - Written 50 3 12 HOURS= 50, WORDS= 0
Digital Examination (not Centrally Timetabled) 25 1, 2 14 HOURS= 1, WORDS= 0
Component 1 subtotal: 100
Component 2 subtotal: 0
Module subtotal: 100

Description of module content:

The aim of the module is to develop a deep understanding network security and cryptography, that will allow graduates to act professionally in the design, analysis, implementation, and reporting related to network security. An outline of the main areas includes:

- Network Architectures and Network Device Configuration. Robust, scalable and secure architectures. Firewalls/IDS/IPS/Log/DMZ Configuration.
- Hosts, servers and services. Configuration of the range of hosts, services and servers used in network architectures, including covering related test/debug tools.
- Intrusion Detection Systems. Techniques, Snort, IDS Rules, Distributed/Agent-based, Signature/Anomaly detection, and IDS signature generation.
- Cloud/grid computing. Principles, distributed architectures, dynamic infrastructures, and layered approaches.
- Introduction to Network Protocols/Forensics.
- Secret Codes. Encoding, Substitution codes, key-based codes, secret sharing, and a wide range of methods.
- Encryption. Prime Numbers, Weaknesses, Public/private key, CBC/ECB. Coverage of methods: RSA, AES, and so on.
- Key exchange methods. Diffie-Hellman, El-Gamal, Kerberos, and so on.
- Hashing methods. Including MD5, SHA-1, and so on. Adding Salt. Collisions, One-time passwords.
- Authentication methods. Authentication methods, Digital Certificates.
- Data Integrity. Checksums, Message Authentication Codes (MACs), CRC-32, and other associated methods.
- Code cracking methods. Brute force, rainbow methods, parallel processing, Man-in-the-middle, known weaknesses.

Learning Outcomes for module:

Upon completion of this module you will be able to

LO1: Develop an advanced knowledge of key security/cryptography principles and methods.

LO2: Understand the key academic principles and practical skills required to build security architectures.

LO3: Develop, implement, evaluate and appraise a system to a given set of security requirements for intrusion detection.

Indicative References and Reading List - URL:

Core - BUCHANAN WJ (2009) SECURITY AND NETWORK FORENSICS: AUERBACH PUBLISHERS INC, 1st ed. - ISBN: 9780849335686
Core - BUCHANAN WJ (2012) ADVANCED CLOUD AND VIRTUALISATION: CRC PRESS, 1st ed. - ISBN: 9781439880371
Core - ASECURITY SITE - WWW.ASECURITYSITE.COM
Core - BRUCE SCHNEIER (2011) SECRETS AND LIES: DIGITAL SECURITY IN A NETWORKED WORLD, 1st ed. - ISBN: 9780471453802
Click here to view the LibrarySearch.