BCPS 311 Computer and Network Security Course Outline
BCPS 311 Computer and Network Security Course Outline
Course Description
The course is a study of fundamental concepts and principles of computing
and network security. Data Communication, Computer Networks are pre-
requisite to this course and fair knowledge in System Administration.
Objectives(s)
Understand basic security terms such as plaintext, cipher-text,
encryption/decryption, and authentication.
Students will be able to explain the basic number theory required for
cryptographic applications, and manually encrypt/decrypt and
sign/verify signatures using cryptographic approaches.
Students will be able to identify typical security pitfalls in
authentication protocols, and outline the protocols, i.e., AH and ESP
protocols, for IP Security.
Use basic measurement tools to determine the real-time performance
of packet-based networks.
Understand information security’s importance in our increasingly
computer-driven world.
Clearly and coherently communicate (both verbally and in writing)
about complex technical information security issues.
Content
The course covers basic security topics, including symmetric and public key
cryptography, digital signatures, cryptographic hash functions,
authentication pitfalls, and network security protocols. The technical
content of the course gives a broad overview of essential concepts and
methods for providing and evaluating security in information processing
systems (operating systems and applications, networks, protocols, and so
on). In addition to its technical content, the course touches on the
importance of management and administration, the place information
security holds in overall business risk, social issues such as individual
privacy, and the role of public policy.
Security in Computing Environment, Basics of Cryptography, Encryption
and Decryption, Key Encryption, Protection of Computing Resources,
Designing Trusted Operating Systems, Network Security, IP Security, Web
Security, Electronic Mail Security and Firewalls.
Probably by the end of the course the student should be able to:
Analyze basic algorithms and protocols which permit secure
communication in information systems.
Demonstrate the most illustrative applications of the algorithms as
well as the theories that support them.
Master the key concepts of information security and how they work.
Develop a security mindset; learn how to critically analyze situations
of computer and network usage from a security perspective,
identifying the salient issues, viewpoints, and trade-offs.
Mode of Delivery
Lectures, Laboratory work, supervised group work Tutorials and
Assignments
Reading Materials
1. Richard R. Brooks, (2013), Introduction to Computer and Network
Security: Navigating Shades of Gray. CRC Press.
2. Rhodes-Ousley, (2013); Information Security, The Complete
Reference; Second Edition; McGraw-Hill.
3. Radia Perlman, Charlie Kaufman, Mike Speciner (2016), Network
Security: PRIVATE Communication in a PUBLIC World. Pearson
4. Janczewski and Colarik (2013), Cyber Warfare and Cyber Terrorism,
Information Science Reference.