0315 - Networks and Network Security
Instructors:Dipl.-Inform. Anne Baumgraß
Type:PI
Weekly hours:2
Members (max.):25
Registration period:08/16/10 to 10/11/10
Class objective(s) (learning outcomes)
After absolving this course students know basic software-engineering aspects of networks and network security. They will have basic knowledge of how security concepts relate to the applications of communications technology.

With this course students have the ability to:
- Design and classify computer networks
- Characterize methods for data transmission
- Differentiate between the different communication and Internet protocols
- Identify and evaluate potential threats for software systems
- Plan and evaluate countermeasures
- Comprehend safety correlations in general

Prerequisites according to degree program
Für Studierende BW/ HW alt: Wahlpflichtveranstaltung (CP) in der SBWL Wirtschaftsinformatik
Für Studierende BW/ HW neu: Vertiefungsfach 1 der SBWL Wirtschaftsinformatik
Für Studierende des Wirtschaftsinformatik Bakkalaureats: Veranstaltung des CBK2

For Exchange Students:
Course in Information Systems, MIS or Computer Science

Teaching and learning method(s)
The course consists of    lectures of professional cohesion to data communication, computer networks and security, as well as security management with assigned textbook and paper readings.
Criteria for successful completion
The course demands mandatory attendance (prüfungsimmanent). The grade is composed of two midterms during the semester and a final exam at the end of the course:
•    20% of the grade from first midterm
•    20% of the grade from second midterm
•    60% of the grade from final exam
The time and points for the terms equal the percent. Therefore you get 20 minutes for the first and second midterm to get for each 20 points. For the final exam you have 60 minutes to earn 60 points.

To pass the course you need 50%, independent from which term(s) you earned these 50 points.

Availability of instructor(s) for contact by students
Office hours during the regular semester are Thursday 10:00 - 12:00, Department of Information Systems, UZA-II, 2H260, ground floor. Email: mailto:abaumgrass@wu.ac.at
Miscellaneous
Overview of computer networking and network security. Learning of base terminology, threats, countermeasures etc. Basic concepts of networks and network security with an emphasis of how security concepts relate to the applications of communications technology.
Detailed schedule
Day Date Time Room
Tuesday 10/12/10 05:00 PM - 07:00 PM VR Bibl. I (A)
Tuesday 10/19/10 05:00 PM - 07:00 PM VR Bibl. I (A)
Tuesday 11/02/10 05:00 PM - 07:00 PM VR Bibl. I (A)
Tuesday 11/09/10 05:00 PM - 07:00 PM VR Bibl. I (A)
Tuesday 11/16/10 05:00 PM - 07:00 PM VR Bibl. I (A)
Tuesday 11/23/10 05:00 PM - 07:00 PM VR Bibl. I (A)
Tuesday 11/30/10 05:00 PM - 07:00 PM VR Bibl. I (A)
Tuesday 12/07/10 05:00 PM - 07:00 PM VR Bibl. I (A)
Tuesday 12/14/10 05:00 PM - 07:00 PM VR Bibl. I (A)
Tuesday 12/21/10 05:00 PM - 07:00 PM VR Bibl. I (A)
Tuesday 01/11/11 05:00 PM - 07:00 PM VR Bibl. I (A)
Tuesday 01/18/11 05:00 PM - 07:00 PM VR Bibl. I (A)
Contents

Computer communications, signal transmission, channel capacity and data rates, analog vs. digital transmission, signal modulations, physical and logical channels

Unit Contents
1 Introduction, organization, course units overview.

Fundamentals of data communications:
computer communication, signal transmission, transmission capacity, analog and digital transmission, signal modulation, physical and logical channels

2 Fundamentals of computer networks:
classification of networks, network topologies, network layer models – ISO/OSI model
3 Functions of the data link layer:
error correction methods, synchronization methods, flow control, addressing, access methods
4 Network layer and switching elements:
routing, route selection, quality of service, hubs, switches, bridges, routers, gateways
5 Internet Protocol Suite (TCP/IP):
history, layer model of TCP/IP, Internet addressing, address assignments, ARP, IP-router, IP packages, Transmission control protocol (TCP), user datagram protocol (UDP), Sockets, network address port translation (NAPT), hypertext transfer protocol (HTTP)
6 Network security basic principles and terminology:
threats, vulnerabilities, countermeasures, security goals
7 Cryptography: Terminology and Applications
terminology and basic cryptographic techniques/procedures, cryptographic protocols (SSL/TLS,SSH,IPSec)

Wireless LAN Security

8 Firewalls and Intrusion Detection Systems
9 Fundamentals of access control
10 Exercises
11 Final exam
Literature

Tanenbaum, Andrew S.: Computer Networks, Prentice Hall, 3rd Edition, 1996; Content relevant for class examination: Keine Angabe; Content relevant for degree examination: Keine Angabe; Recommendation: Unbedingt notwendige Studienliteratur für alle Studierenden

Hansen/Neumann: Wirtschaftsinformatik 2, UTB Lucius& Lucius, 9th Edition, 2005; Content relevant for class examination: Keine Angabe; Content relevant for degree examination: Keine Angabe; Recommendation: Stark empfohlen (aber nicht absolute Kaufnotwendigkeit)

L. Subramanian, V. Padmanabhan, and R. Katz: Geographic Properties of Internet Routing, Proceedings of the USENIX Annual Technical Conference, Monterey, CA,, 2002; Content relevant for class examination: Keine Angabe; Content relevant for degree examination: Keine Angabe; Recommendation: Keine Angabe

H. Zimmermann: OSI Reference Model-The ISO Model of Architecture for Open Systems Interconnection, Communications, IEEE Transactions on 28(4), 1980; Content relevant for class examination: Keine Angabe; Content relevant for degree examination: Keine Angabe; Recommendation: Keine Angabe

Steven M. Bellovin: A Technique for Counting NATted Hosts, IMW’02, Marseille, France, 2002; Content relevant for class examination: Keine Angabe; Content relevant for degree examination: Keine Angabe; Recommendation: Keine Angabe

Fielding, R. et al.: Hypertext Transfer Protocol–HTTP/1.1., ftp://ftp.rfc-editor.org/in-notes/rfc2616.txt, Section 9 and 10, 1999; Content relevant for class examination: Keine Angabe; Content relevant for degree examination: Keine Angabe; Recommendation: Keine Angabe

B. Krishnamurthy, J. C. Mogul, and D. M. Kristol: Key differences between http/1.0 and http/1.1, Computer Networks, vol. 31(11-16), 1999; Content relevant for class examination: Keine Angabe; Content relevant for degree examination: Keine Angabe; Recommendation: Keine Angabe

Neumann, P. G.: Risks of Insiders, Communications of the ACM, 42(12), 1999; Content relevant for class examination: Keine Angabe; Content relevant for degree examination: Keine Angabe; Recommendation: Keine Angabe

S. Bellovin: Security Problems in theTCP/IP Protocol Suite, Computer Communications Review 2:19, 1989; Content relevant for class examination: Keine Angabe; Content relevant for degree examination: Keine Angabe; Recommendation: Keine Angabe

B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna: Your Botnet is My Botnet: Analysis of a Botnet Takeover, UCSB Technical Report, Santa Barbara, CA, USA, 2009; Content relevant for class examination: Keine Angabe; Content relevant for degree examination: Keine Angabe; Recommendation: Keine Angabe

Ross Andersen: Why Information Security is Hard - An Economic Perspective, Proceedings of the 17th Annual Computer Security Applications Conference December 10-14, 2001 New Orleans, Louisiana, 2001; Content relevant for class examination: Keine Angabe; Content relevant for degree examination: Keine Angabe; Recommendation: Keine Angabe

Levi, A.; Koc, C. K.: Risks in Email Security, CACM, 44(8), 2001; Content relevant for class examination: Keine Angabe; Content relevant for degree examination: Keine Angabe; Recommendation: Keine Angabe

Schneider, B.: Risks of Relying on Cryptography, CACM, 42(10), 1999; Content relevant for class examination: Keine Angabe; Content relevant for degree examination: Keine Angabe; Recommendation: Keine Angabe

Abelson, H. et al.: The Risks of Key Recovery, Key Escrow, & Trusted Third Party Encryption, 1998; Content relevant for class examination: Keine Angabe; Content relevant for degree examination: Keine Angabe; Recommendation: Keine Angabe

Dawn X. Song and Adrian Perrig: Advanced and Authenticated Marking Schemes for IP Traceback, Computer Science Division (EECS) University of California Berkeley, California 94720, Report No. UCB/CSD-00-1107, 2000; Content relevant for class examination: Keine Angabe; Content relevant for degree examination: Keine Angabe; Recommendation: Keine Angabe

Rolf Oppliger: Internet Security: Firewalls and Beyond, COMMUNICATIONS OF THE ACM Vol. 40, No. 5, 1997; Content relevant for class examination: Keine Angabe; Content relevant for degree examination: Keine Angabe; Recommendation: Keine Angabe

Know Your Enemy: Honeynets, http://www.honeynet.org, 2003; Content relevant for class examination: Keine Angabe; Content relevant for degree examination: Keine Angabe; Recommendation: Keine Angabe

Housley, R.; Arbaugh, W.:: Security Problems in 802.11-Based Networks, COMMUNICATIONS OF THE ACM Vol. 46, No. 5, 2003; Content relevant for class examination: Keine Angabe; Content relevant for degree examination: Keine Angabe; Recommendation: Keine Angabe

Berghel, H.: The Code Red Worm. Malicious software knows no bounds., COMMUNICATIONS OF THE ACM Vol. 44, No. 12, 2001; Content relevant for class examination: Keine Angabe; Content relevant for degree examination: Keine Angabe; Recommendation: Keine Angabe

Sandhu, R. S. et al.: Role-Based Access Control Models, IEEE Computer, 29(2), 1996; Content relevant for class examination: Keine Angabe; Content relevant for degree examination: Keine Angabe; Recommendation: Keine Angabe

Strembeck, M.: Embedding Policy Rules for Software-Based Systems in a Requirements Context, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY’05), 2005; Content relevant for class examination: Keine Angabe; Content relevant for degree examination: Keine Angabe; Recommendation: Keine Angabe

European Information Society Group: Policing the Internet - Democratically accountable partnerships or self-protection groups?, Somerset, England: EURIM,, 2006; Content relevant for class examination: Keine Angabe; Content relevant for degree examination: Keine Angabe; Recommendation: Keine Angabe

Bellia, Patricia L.: Spyware and the Limits of Surveillance Law, Berkeley Technology Law Journal, Vol. 20,, 2005; Content relevant for class examination: Keine Angabe; Content relevant for degree examination: Keine Angabe; Recommendation: Keine Angabe

Jim Harper: Understanding Privacy -- and the Real Threats to It, Cato Policy Analysis no. 520, 2004; Content relevant for class examination: Keine Angabe; Content relevant for degree examination: Keine Angabe; Recommendation: Keine Angabe



Back