CS 430 Syllabus

Information Security I

Revised: December 2008 (Andrew Dalton)

Course Description

Cryptography, authentication, integrity, and non-repudiation; trusted intermediaries, key distribution, and certification; access control and firewalls; attacks and counter-measures.

Text

Charlie Kaufman, Radia Perlman, & Mike Speciner, Network Security, Private Communication in a Public World, Second Edition, Prentice Hall, 2002

Grading Procedure

Grading procedures and factors influencing course grade are left to the discretion of individual instructors, subject to general university policy.

Attendance Policy

Attendance policy is left to the discretion of individual instructors, subject to general University policy.

Course Outline

Topics Include
    * Cryptography
          - Origins
          - Secret- and Public-Key
          - Digital Signatures
          - Authentication
          - Non-Repudiation
    * Man-in-the-Middle Attacks
          - ARP Poisoning
          - ICMP Redirection
          - DHCP Spoofing
          - Methods to prevent and tools to monitor for MitM attacks
    * Rootkits
          - Implementation of Kernel-Level rootkits using Linux
          - Implementation of Library-Level rootkits using Linux
    * Wireless Security
          - Dangers
          - Encryption methods
          - Weaknesses
    * On-Disk Data Encryption
          - Encrypted files
          - Encrypted partitions
          - Tools and methods for creating each
    * Packet Sniffing
          - How packet sniffing works
          - Tools that enable packet sniffing
          - Legitimate reasons to packet sniff
    * Denial of Service (DoS) Attacks
          - How DoS attacks are conducted and why
          - How to try to protect yourself against DoS attacks
    * System Administration and Security
          - Logging and remote log hosts
          - Tools to monitor users on Linux machines
          - How to respond when your system is compromised
          - Configuring a chroot jail
          - Breaking out of a chroot jail
    * Firewalls
          - Configuring a Linux-based packet-filtering firewall using iptables
          - Configuring a Linux-based packet-filtering firewall using Shorewall
          - Application-level firewalls

Copyright 2013 by Western Carolina University       •     Cullowhee, NC 28723       •      Contact WCU
Maintained by the Office of Web Services       •      Directions       •      Campus Map       •      Emergency Information       •      Text-Only

Office of Web Services