Course Outline
Title
Credit Hours
Required Study Hours
Follow Up
Program Name
Aims and Objectives
ourse Outline:
Data and Network Security
3
Core
The cellular concept, cellular frequency planning, link control, handoffs, power control, traffic capacity, propagation modelling, digital transmission techniques, fading mitigation, multiple access techniques, wireless networking, examples of current and future wireless standards.
– Introduction and overview (1 Lecture)
–
–
–
–
–
–
–
Introduction to Cryptography: (2 lectures)
Terminology steganography, substitution and transformation ciphers, XOR, one-time pads,
Protocol Building Blocks: (3 Lectures)
Communications using symmetric cryptography, one-way hash functions, communications using public-key cryptography, digital signatures,
Basic Protocols: (2 lectures)
Key exchange, authentication, secret splitting, secret sharing, cryptographic protection of databases,
Intermediate Protocols: (2 lectures)
Time stamping services, subliminal channel, undeniable digital signatures,
Key Length: (2 lecture)
Symmetric key length, public-key key length, comparing symmetric and public-key key length,
Key Management: (3 Lectures)
Generating keys, transferring keys, verifying keys, using keys, updating keys, storing keys, compromised keys, lifetime of keys, destroying keys, public key management,
Algorithm Types and Modes: (10 Lecture)
Electronic codebook mode, block replay, cipher block chaining mode, stream ciphers, cipher-feedback mode, output feedback mode, choosing a cipher mode, block ciphers vs. stream ciphers, Choosing an Algorithm,
Choosing an algorithm, public-key vs. symmetric cryptography, encrypting communication channels, encrypting data for storage, Security Models, Windows, Linux, Web, Cookies, Biometrics ("gummy fingers"), Tempest,
Viruses, Firewalls, System/Comprehensive Security