ELEC5616: Computer and Network Security (2013 - Semester 1)
|Unit:||ELEC5616: Computer and Network Security (6 CP)|
|Faculty/School:||School of Electrical and Information Engineering|
A/Prof Leong, Philip
|Session options:||Semester 1|
|Versions for this Unit:|
|Site(s) for this Unit:||
|Brief Handbook Description:||This unit examines the basic cryptographic building blocks of security, working through to their applications in authentication, key exchange, secret and public key encryption, digital signatures, protocols and systems. It then considers these applications in the real world, including models for integrity, authentication, electronic cash, viruses, firewalls, electronic voting, risk assessment, secure web browsers and electronic warfare. Practical cryptosystems are analysed with regard to the assumptions with which they were designed, their limitations, failure modes and ultimately why most end up broken.|
|Assumed Knowledge:||A programming language, basic maths.|
Mr Barrie, Matt
|T&L Activities:||Laboratory: One 2-hour lab working on a project.
Project Work - own time: Students will work in groups of 2 to design and build a software security system/
Independent Study: Self study and independent learning is a key to success in this UoS.
Attributes listed here represent the key course goals (see Course Map tab) designated for this unit. The list below describes how these attributes are developed through practice in the unit. See Learning Outcomes and Assessment tabs for details of how these attributes are assessed.
|Attribute Development Method||Attribute Developed|
|Application of knowledge by analysis of current systems, their limitations and failure modes. Different design criteria for security systems are presented and analysed. Students are required to design their own security system in the project work.||Design (Level 4)|
|Gain an understanding of the cryptographic building blocks of security.
Various security systems widely used in real applications are introduced and analysed.
|Engineering/IT Specialisation (Level 5)|
|Master the mathematical and computer science fundamentals of cryptography and security||Maths/Science Methods and Tools (Level 3)|
|Intensive research will be included in the project work and the assignment. Students need to collect comprehensive information from various sources in order to perform well.||Information Seeking (Level 2)|
|Project reports are one of the main assessment elements for the project work. Students need to write concisely, accurately and convincingly. Each team is also required to give a presentation about their project at the end of the semester.||Communication (Level 2)|
|The project work requires students to form groups and manage their progress through the entire project, including conceiving, design, building, testing and demonstrating the project.||Project Management and Teamwork (Level 2)|
For explanation of attributes and levels see Engineering & IT Graduate Outcomes Table.
Learning outcomes are the key abilities and knowledge that will be assessed in this unit. They are listed according to the course goal supported by each. See Assessment Tab for details how each outcome is assessed.Design (Level 4)
Project: Three project reports plus demo
Assignment: Two assignments
Quiz: Two quizzes
|Faculty Policies & Procedures:||Academic Honesty in Coursework. All students must submit a cover sheet for all assessment work that declares that the work is original and not plagiarised from the work of others.
Coursework assessment and examination policy. The faculty policy is to use standards based assessment for units where grades are returned and criteria based assessment for Pass/Fail only units. Norm referenced assessment will only be used in exceptional circumstances and its use will need to be justified to the Undergraduate Studies Committee. Special consideration for illness or misadventure may be considered when an assessment component is severely affected. This policy gives the details of the information that is required to be submitted along with the appropriate procedures and forms.
Special Arrangements for Examination and Assessment. In exceptional circumstances alternate arrangements for exams or assessment can be made. However concessions for outside work arrangements, holidays and travel, sporting and entertainment events will not normally be given.
Student Appeals against Academic Decisions. Students have the right to appeal any academic decision made by a school or the faculty. The appeal must follow the appropriate procedure so that a fair hearing is obtained.
Note that policies regarding assessment submission, penalties and assessment feedback depend upon the individual unit of study. Details of these policies, where applicable, will be found above with other assessment details in this unit outline.
All university policies can be found at http://sydney.edu.au/policy
Various request forms for the Faculty of Engineering and IT can be found at http://sydney.edu.au/engineering/forms/
Note: Students are expected to have a personal copy of all books listed.
|Online Course Content:||http://www.ee.usyd.edu.au/~mattb/2009/|
|Note on Resources:||
Security Engineering (Wiley), Ross Anderson, 2001.
Applied Cryptography, 2nd Edition (Wiley), Bruce Schneier, 1996
Firewalls and Internet Security: Repelling the Wily Hacker (Addison-Wesley Professional Computing), W R. Cheswick, S M. Bellovin, 1994
Decrypted Secrets (Springer), F. L. Bauer, 1997
Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design (O’Reilly), Electronic Frontier Foundation, 1998
The Code Breakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet (Schribner), David Kahn, 1996
Practical Unix and Internet Security, S Garfinkel and G Spafford, 2 ed. (O'Reilly), 1996
Professional Java Security, J. Garms, D. Somerfield (Wrox), ISBN: 1-861004-25-7.
TCP/IP Illustrated, Volume 1: The Protocols, W. Richard Stevens 1994
Note that the "Weeks" referred to in this Schedule are those of the official university semester calendar https://web.timetable.usyd.edu.au/calendar.jsp
|Week 1||Hash Functions|
|Week 2||Symmetric Cyphers, DES|
|Week 3||Attacks on DES|
|Week 4||Introduction to Number Theory|
|Week 6||Crypto Protocols I|
|Crypto Protocols II|
|Week 8||E-Commerce Protocols|
|Week 9||Overview of Network Security|
|Network Protocols II|
|Network Protocols I|
|Week 10||Hardware Security|
|Week 11||Guest Lecture: Paul "The Duck" Ducklin (Head of Technology, Sophos)|
|The Politics of Crypto|
|Week 12||Live Demo!|
|Modern Multi-stage Malware -- how it works and how to stop it?|
|Exam Period||Assessment Due: Final Exam|
The following is a list of courses which have added this Unit to their structure.
This unit contributes to the achievement of the following course goals:
|Design (Level 4)||Yes||31.75%|
|Engineering/IT Specialisation (Level 5)||Yes||25.5%|
|Maths/Science Methods and Tools (Level 3)||Yes||24%|
|Information Seeking (Level 2)||Yes||6.25%|
|Communication (Level 2)||Yes||6.25%|
|Professional Conduct (Level 2)||No||0%|
|Project Management and Teamwork (Level 2)||Yes||6.25%|
These goals are selected from Engineering & IT Graduate Outcomes Table which defines overall goals for courses where this unit is primarily offered. See Engineering & IT Graduate Outcomes Table for details of the attributes and levels to be developed in the course as a whole. Percentage figures alongside each course goal provide a rough indication of their relative weighting in assessment for this unit. Note that not all goals are necessarily part of assessment. Some may be more about practice activity. See Learning outcomes for details of what is assessed in relation to each goal and Assessment for details of how the outcome is assessed. See Attributes for details of practice provided for each goal.