Module title: Network Security and Cryptography

SCQF level: 09:
SCQF credit value: 20.00
ECTS credit value: 10

Module code: CSN09412
Module leader: Bill Buchanan
School School of Computing
Subject area group: Computer Systems
Prerequisites

A basic background in computer systems hardware and programming. The equivalent of SCQF 07 in these areas. - Advanced Higher or HND Computing.


Description of module content:

The aim of the module is to develop a deep understanding network security and cryptography, that will allow graduates to act professionally in the design, analysis, implementation, and reporting related to network security. An outline of the main areas includes:

- Network Architectures and Network Device Configuration. Robust, scalable and secure architectures. Firewalls/IDS/IPS/Log/DMZ Configuration.
- Hosts, servers and services. Configuration of the range of hosts, services and servers used in network architectures, including covering related test/debug tools.
- Intrusion Detection Systems. Techniques, Snort, IDS Rules, Distributed/Agent-based, Signature/Anomaly detection, and IDS signature generation.
- Cloud/grid computing. Principles, distributed architectures, dynamic infrastructures, and layered approaches.
- Introduction to Network Protocols/Forensics.
- Secret Codes. Encoding, Substitution codes, key-based codes, secret sharing, and a wide range of methods.
- Encryption. Prime Numbers, Weaknesses, Public/private key, CBC/ECB. Coverage of methods: RSA, AES, and so on.
- Key exchange methods. Diffie-Hellman, El-Gamal, Kerberos, and so on.
- Hashing methods. Including MD5, SHA-1, and so on. Adding Salt. Collisions, One-time passwords.
- Authentication methods. Authentication methods, Digital Certificates.
- Data Integrity. Checksums, Message Authentication Codes (MACs), CRC-32, and other associated methods.
- Code cracking methods. Brute force, rainbow methods, parallel processing, Man-in-the-middle, known weaknesses.

Learning Outcomes for module:

Upon completion of this module you will be able to
LO1: Analyse the requirements and synthesise a hardware design using the technologies of embedded processor systems
LO2: Design and implement software systems to building safe and secure embedded systems
LO3: Synthesise appropriate hardware and software interfaces for embedded processor applications.

Indicative References and Reading List - URL:

Please contact your Module Leader for details
Click here to view the LibrarySearch.