Summer Quarter, 2001
Cynthia Irvine
|
|
|
|
|
|
|
|
Instructor:
Cynthia
Irvine
Office: Sp 528a
Phone: x2461
E-mail: irvine@cs.nps.navy.mil
Lectures:
Sp 221 -- 1000-1100, M,T, W, Th
Lab: Sp 506 or Sp 221 -- 1000 Th
This
course covers a broad range of topics in security for networked and internetworked
computer systems. It examines security and integrity objectives in terms
of high level policy and presents security services used to address those
requirements. Selection and management of cryptographic algorithms and
keys to achieve to achieve network security objectives is addressed. Network
security architectures are examined in terms of systems able to insure
that critical security functions are protected from unauthorized modification,
correct, and always invoked. Access control in networked systems is examined.
Case studies will be made of selected past and current multilevel security
architectures in DoD. Additional topics will include security peripherals
for cryptography and authentication; the cascade problem; guards; and filters
Course activities
Lectures, readings, homework, security project, three one-hour exams.
Text and Readings:
The required textbook is
Network Security Essentials, by William Stallings, Prentice-Hall, 2000.
Other books covering network security and can provide you with an alternate perspective on the subject. They are not required. One is a text, while the other is best used for reference.
1.Don Davis, Defective Sign & Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML
2.M. Burrows, M. Abadi, and R. Needham, A Logic of Authentication, Proc. R. Soc. Lond. A 426(1989) pp. 233-271. Also SRC Research Report 39, Digital Equipment Corp.
3.Butler Lampson, Martin Abadi, Michael Burrows, Edward Wobber, Authentication in Distributed Systems: Theory and Practice, ACM Transactions on Computer Systems, 12(1):3-32, February 1994.Also SRC Research Report 83, Digital Equipment Corp.
Homework
|
10%
|
Project - individual contribution
|
35%
|
Project - group accomplishment and report
|
10%
|
Class participation and demonstration of insight
|
10%
|
Quizzes - 2 equally weighted
|
35%
|
The first exam will be given during the sixth week of class and the second exam will be given during the last lab period
Prerequisites
and Course Difficulty
A prerequisite for this course is Introduction to Computer Security,
CS3600. New mathematics will be introduced during part of this course that
will depend on a comfort using algebra. Since the project will entail designing,
implementing, and or installing components, you are expected to be able
to use computers. In some cases, programming experience may be helpful.
My time is being pulled in many directions by transitions taking place at NPS. I will be traveling quite a bit. During those travel days, you will be expected to concentrate on difficult reading assignments and work on your laboratory activities. I plan to lecture during lab periods when I am here. It is my objective to make this class as rewarding as possible for you both in terms of learning some of the foundational material that helps us believe that we are doing the right thing when we design a secure network architecture and through the implementation of an aspect of network security.