CSE 5473
Transcript Abbreviation:
Netw Security
Course Description:
Security threats and services, elements of cryptography, protocols for security services, network and internet security, advanced security issues and technologies.
Course Levels:
Undergraduate (1000-5000 level)
Graduate
Designation:
Elective
General Education Course:
(N/A)
Cross-Listings:
(N/A)
Credit Hours (Minimum if “Range”selected):
3.00
Max Credit Hours:
(N/A)
Select if Repeatable:
Off
Maximum Repeatable Credits:
(N/A)
Total Completions Allowed:
(N/A)
Allow Multiple Enrollments in Term:
No
Course Length:
14 weeks (autumn or spring)
12 weeks (summer only)
Off Campus:
Never
Campus Location:
Columbus
Instruction Modes:
In Person (75-100% campus; 0-24% online)
Prerequisites and Co-requisites:
Prereq: 3461 (677) or 5461.
Electronically Enforced:
No
Exclusions:
Not open to students with credit for 651.
Course Goals / Objectives:
Competent with some protocols for security services
Competent with network security threats and countermeasures
Familiar with fundamentals of cryptography
Familiar with network security designs using available secure solutions (such as PGP, SSL, IPSec, and firewalls)
Familiar with advanced security issues and technologies (such as DDoS attack detection and containment, anonymous communications, and security properties testing, verification and design)
Exposed to original research in network security
Check if concurrence sought:
No
Contact Hours:
Topic | LEC | REC | LAB | LAB Inst |
---|---|---|---|---|
Security threats and services | 3.0 | 0.0 | 0.0 | 0 |
Elements of cryptography: (1) Classic ciphers, modern ciphers, stream ciphers and block ciphers; (2) Secret key (symmetric): DES/AES and public key (asymmetric): RSA | 10.0 | 0.0 | 0.0 | 0 |
Protocols for security services: (1) Key distribution and management, (2) Data integrity and message authentication codes, (3) User authentication; (4) Non-repudiation and digital signatures | 10.0 | 0.0 | 0.0 | 0 |
Network and internet security: (1) Transport-level security, (2) Wireless network security, (3) Email security, (4) IP security | 10.0 | 0.0 | 0.0 | 0 |
Advanced security issues and technologies such as firewalls, intrusion detection, active worm defense, DDoS attacks and defense, anonymous communications, security in routing (OSPF and BGP), sensor network security | 9.0 | 0.0 | 0.0 | 0 |
Total | 42 | 0 | 0 | 0 |
Grading Plan:
Letter Grade
Course Components:
Lecture
Grade Roster Component:
Lecture
Credit by Exam (EM):
No
Grades Breakdown:
Aspect | Percent |
---|---|
Homework assignments and lab exercises | 35% |
Midterm exam | 35% |
Research project | 30% |
Representative Textbooks and Other Course Materials:
Title | Author | Year |
---|---|---|
Cryptography and Network Security: Principles and Practice | William Stallings | |
Applied Cryptography (2nd Edition) | Paul Campbell, et al. | |
Network Security: Private Communication in a Public World | Charlie Kaufman, Radia Perlman and Mike Speciner |
ABET-CAC Criterion 3 Outcomes:
Outcome | Contribution | Description |
---|---|---|
1 | Significant contribution (7+ hours) | Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions. |
2 | Significant contribution (7+ hours) | Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline. |
3 | Some contribution (1-2 hours) | Communicate effectively in a variety of professional contexts. |
4 | Some contribution (1-2 hours) | Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles |
5 | Significant contribution (7+ hours) | Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline |
6 | Significant contribution (7+ hours) | Apply computer science theory and software development fundamentals to produce computing-based solutions. |
ABET-ETAC Criterion 3 Outcomes:
(N/A)
ABET-EAC Criterion 3 Outcomes:
Outcome | Contribution | Description |
---|---|---|
1 | Significant contribution (7+ hours) | an ability to identify, formulate, and solve complex engineering problems by applying principles of engineering, science, and mathematics |
2 | Significant contribution (7+ hours) | an ability to apply engineering design to produce solutions that meet specified needs with consideration of public health, safety, and welfare, as well as global, cultural, social, environmental, and economic factors |
3 | Some contribution (1-2 hours) | an ability to communicate effectively with a range of audiences - pre-2019 EAC SLO (g) |
4 | Some contribution (1-2 hours) | an ability to recognize ethical and professional responsibilities in engineering situations and make informed judgments, which must consider the impact of engineering solutions in global, economic, environmental, and societal contexts |
5 | Significant contribution (7+ hours) | an ability to function effectively on a team whose members together provide leadership, create a collaborative and inclusive environment, establish goals, plan tasks, and meet objectives |
6 | Significant contribution (7+ hours) | an ability to develop and conduct appropriate experimentation, analyze and interpret data, and use engineering judgment to draw conclusions |
7 | Some contribution (1-2 hours) | an ability to acquire and apply new knowledge as needed, using appropriate learning strategies |
Embedded Literacies Info:
Attachments:
(N/A)
Additional Notes or Comments:
(N/A)
Basic Course Overview:
CSE_5473_basic.pdf
(10.2 KB)