The first half of this course focuses on cryptographic technologies. The functions and mechanisms of cryptographic technologies such as cryptosystems and authentication scheme that are used in the Internet are explained. The latter half focuses on network security. Various attack techniques, Web security, DNS/Email security, and techniques for defense are explained.
Threat to communication networks grows every year, and a variety of security technologies are investigated to defend networks. Still, they are not defended completely. Learning the security technologies, students are expected to be able to investigate and analyze appropriately the situation.
At the end of this course, students will be able to :
1) have an understanding of fundamental knowledge to defend networks from threat,
2) appropriately investigate and analyze the situation of networks,
3) select and use appropriate security technologies.
Cryptosystem, authentication, digital signature, PKI, access control, malicious software, port scan, DoS attack, firewall, Anti-Virus Software
✔ Specialist skills | Intercultural skills | Communication skills | Critical thinking skills | ✔ Practical and/or problem-solving skills |
In the first half, mainly the lecturer introduces various techniques using slides.
The latter half includes practical training using computers.
Course schedule | Required learning | |
---|---|---|
Class 1 | History of cryptosystem and private-key cryptosystem | In daily life, have an interest in security and the technology used there . |
Class 2 | Message authentication | |
Class 3 | DH Key exchange and public-key cryptosystem | |
Class 4 | Digital signature and Public-key infrastructure | |
Class 5 | User authentication | |
Class 6 | Other cryptographic technologies | |
Class 7 | Summary of first half and intermediate examination | |
Class 8 | Overview of network security 1: vulnerability, outline of attacks and access control | |
Class 9 | Overview of network security 2: vulnerability and malicious softwares | |
Class 10 | Various attack techniques 1: port scanning, DoS attack, etc. | |
Class 11 | Various attack techniques 2: session hijacking, social engineering, etc. | |
Class 12 | Security on Web | |
Class 13 | Security on DNS and Email | |
Class 14 | Defense techniques: firewall, Anti-Virus Software, etc. |
To enhance effective learning, students are encouraged to spend approximately 100 minutes preparing for class and another 100 minutes reviewing class content afterwards (including assignments) for each class.
They should do so by referring to textbooks and other course material.
none
The teaching materials will be distributed in each class.
Students will be assessed on their understanding of fundamental concepts and usage of cryptographic techniques and network security, and their ability to investigate and analyse current security situation.
Their scores are based on intermediate exam (50%) and final exam (50%). (The assessment method may change depending on the situation.)
No prerequisites.