Information Security I
Revised: December 2008 (Andrew Dalton)
Course Description
Cryptography, authentication, integrity, and non-repudiation; trusted intermediaries, key distribution, and certification; access control and firewalls; attacks and counter-measures.
Text
Charlie Kaufman, Radia Perlman, & Mike Speciner, Network Security, Private Communication in a Public World, Second Edition, Prentice Hall, 2002
Grading Procedure
Grading procedures and factors influencing course grade are left to the discretion of individual instructors, subject to general university policy.
Attendance Policy
Attendance policy is left to the discretion of individual instructors, subject to general University policy.
Course Outline
Topics Include
* Cryptography
- Origins
- Secret- and Public-Key
- Digital Signatures
- Authentication
- Non-Repudiation
* Man-in-the-Middle Attacks
- ARP Poisoning
- ICMP Redirection
- DHCP Spoofing
- Methods to prevent and tools to monitor for MitM attacks
* Rootkits
- Implementation of Kernel-Level rootkits using Linux
- Implementation of Library-Level rootkits using Linux
* Wireless Security
- Dangers
- Encryption methods
- Weaknesses
* On-Disk Data Encryption
- Encrypted files
- Encrypted partitions
- Tools and methods for creating each
* Packet Sniffing
- How packet sniffing works
- Tools that enable packet sniffing
- Legitimate reasons to packet sniff
* Denial of Service (DoS) Attacks
- How DoS attacks are conducted and why
- How to try to protect yourself against DoS attacks
* System Administration and Security
- Logging and remote log hosts
- Tools to monitor users on Linux machines
- How to respond when your system is compromised
- Configuring a chroot jail
- Breaking out of a chroot jail
* Firewalls
- Configuring a Linux-based packet-filtering firewall using iptables
- Configuring a Linux-based packet-filtering firewall using Shorewall
- Application-level firewalls









