322 376: Information and Communication Technology Security (Fall 2011)


Course Description:
Introduction to computer security and information and communication technology, encryption techniques, introduction to number theory, public key algorithm, key management, hash function, digital signature and authentication protocol, electronic mail security, Internet Protocol (IP) security (IPsec), web security, virus, worm, firewall, information technology security management, computer security law.

Prerequisite: Basic Knowledge of Computer Network; Operating System; Computer Architecture; Database

Instructor: Chakchai So-In, Ph.D., chakso AT kku.ac.th
Office: SC 6706
Office Hours: Wednesday 09.00am to 12.00pm (or email me for appointment)
Class homepage: http://web.kku.ac.th/chakso/322376_Fall11/
Teaching Assistant:
  • Nutnicha Weeramongkonlert nattyjang42 AT gmail.com, Friday 05.00pm to 07.00pm @6706
  • Kanokmon Rujirakul ace_kamikaze AT hotmail.com , Monday 5.00pm to 07.00pm @Ph.D. level 3 (Tentative)

  • Location:
    Section I: - the class meets on Wednesday at room SC8405 from 02.30pm to 05.30pm for lecture (with additional lab hours).
    Section II: - the class meets on Monday at room SC56204C from 09.00am to 12.00pm for lecture (with additional lab hours).
    Section III: - the class meets on Monday at room SC8505 from 01.00pm to 04.00pm for lecture (with additional lab hours).
    Facebook Group: Facebook Group
    Class Email: cs322376 AT gmail.com
    Textbook
    The main textbooks for the course are
    1. Computer and Network Security (Thai Edition) by Chakchai So-In, 2012.
    2. Cryptography and Network Security: Principles and Practice by William Stallings, 2010
    3. Network Security: Private Communication in a Public World by Charlie Kaufman, Radia Perlman, and Mike Specimner, 2002
    4. Law (ICT) Thailand

    (Optional) Supplementary
    1. Master in Security 2nd edition (Thai) by Jatuchai Pangjun, 2010
    2. Network and Computer Security Specialist #1, #2, #3 (Thai) by Minister of ICT, Thailand
    3.
    Hands-on Ethical Hacking and Network Defense by Michael T. Simpson, Kent Backman, and James E. Corley, 2010
    4. Applied Cryptography: Protocols, Algorithms, and Source Code in C by Bruce Scheier, 1996
    5. Network Security Essentials: Applications and Standards by William Stalling, 2010
    6. Hacking Exposed: Network Security Secrets and Solutions by Stuart McClure, Joel Scambray, and George Kurtz, 2009
    7. Network Security Architectures by Sean Convery, 2010
    8. CISSP Certified Information Systems Security Professional STUDY GUIDE by SYBEX, 2010

    Other good books are
    Slides from Prof. Raj Jain, Network Security Slides
    Most importantly, please READ all Computer and Network Security Wiki related topics.
    Network Programming (Bee)
    UNIX Tutorial for Beginners Tutorial@virginia.edu
    Project I: APP
    Project II: Paper Translation
    News
    Lecture Schedule: Tentative Subject to Change)
    ClassDayDateTopic
    1Monday10/10/2011Course Overview
    2Monday10/17/2011Encryption Techniques
    3Monday10/24/2011Block Ciphers and Encryption Standards
    4Monday10/31/2011Advanced Encryption Standard + Symmetric Cipher and Random Variable
    5Monday11/07/2011Introduction to Number Theory + Project Topic Selection + Encoragement
    6Monday11/14/2011Public Key Encryption
    7Monday11/21/2011Proposal Project Presentation + Paper Selection + Dhamma #1, #2, III, IV, V
    8Monday12/12/2011MAC and Hash Algorithms
    9Monday12/19/2011Review for Midterm
    10Monday12/26/2011Mid-Term Exam (week 12/23-12/29)
    Monday01/02/20122012 New Year (no class)
    11Monday01/09/2012Authentication Application
    12Monday01/16/2012Email Security + Web Security
    13Monday01/23/2012IP Security + Small Project Submission
    14Monday01/30/2012Firewall + Intruder
    15Monday02/06/2012Review for Midterm + Final Project Presentation/Demo
    16Monday02/13/2012Final Exam (week 02/13-03/01)

    Note: For Section I; date+2 say Monday 10/10 = Wednesday 10/12
    Assignments (Fall 2011 schedule) (Subject to Change)
    Four or six homeworks will be assigned throughout the course. All assignment MUST be turned in as a HARDCOPY (during class or in my mail box). All submission MUST be turned in 7 mins before class. For all reasons, late penalty will be applied. Late homework will be assessed a 30% penalty. No homework will be accepted more than one day late. For EMERGENCY cases, you allow to email me to cs322376@gmail.com including title prefix = "322376_Fall2011_XX:HWY" such that XX is your section number and Y is your homework number.

    Homework

    Description

    Out DateDue Date
    #1Basic Computer and Network Security HW1 and HW210/31/201111/14/2011
    #2Random Number HW312/11/201112/18/2011
    #3Public Key Encryption HW401/04/201201/18/2012
    #4Application Security01/18/201202/01/2012

    Note:For homework and lab assignment; you MUST include the cover letter with students' signature OTHERWISE they WILL NOT be graded.
    Academic Integrity
    Students at Khon Khan University are engaged in the first step for their professional career with the highest standards. Please follow the academic integrity guideline at Cheating and Plagiarism [@CMU]. All these rules are enforced for the entire course.
    Project/Lab - Group of up to 3-6 students
    Lab
    1. CS Whitehat vs. Blackhat Hacker = 2 teams; one team setting secure system providing network services (mail, dns, web, ftp, etc. for a month). Once finishing set-up, the other team is hacking the system, and see who win? You MUST record all activities, and submit all log/record.
    2. Additional Labs following Hands-on Ethical Hacking and Network Defense by Michael T. Simpson, Kent Backman, and James E. Corley, 2010

    Main Project (Project I)
    Project Ideas:
  • Ideas at Stanford.edu
  • Ideas at Berkeley.edu
  • Ideas at MIT.edu
  • Ideas at DotCrime
  • Ideas at Sunysb.edu
  • Ideas at Berkeley.edu
  • Ideas at Udel.edu
  • Ideas at Fsu.edu
  • Ideas at Upenn.edu

  • In this semester, we focus on Mobile and Wireless Network Security including sensor network security; however, we do not limit on these.
    Project NSC2011 Examples
    Central; Isan; North; South; East; West

    Small Project (Project II)
    Paper (Recent Journal >2007) translation (computer and network security) (Don't Submit the paper only after google translator)
    Examples: (ieeexplore.ieee.org = Search "computer network security survey") OR
    (www.sciencedirect.com = Search "computer and network security survey")

    Project Milestone

    Description

    Completion Date

    #1Project Topic Selection+5mins Presentation (what is it)11/07/2011
    #2Proposal Submission + Paper Selection+20 mins Presentation (story board - theory/objective/limitation/use case/activity diagram/..etc.) Click here for detail (page 33 BUT at least 15 pages - Check also Senior Project Guideline here page 18-19) Download Project Presentation Review Form here 11/21/2011
    #3Small Project Submission (Translation) + CS Whitehat/Blackhat Hacker Report01/23/2012
    #4Final Project Submission Click here for detail (page 36)+30 mins Presentation/Demo02/13/2012

    Note: These are group projects BUT grading individually *write who do what in what%?*
    Grading: (tentative)
    Mid-Term Exam20%
    Final Exam25%
    (Lab) Homework + Quiz + Class participation20%+5%
    Small Project5%+5% (grading individually)
    Term Project25%+5% (grading individually)

    Note that students are allowed to bring only "ONE" piece of A4 paper in each exam with additional non-memorized calculator
    The final exam material will be after the mid-term; however, all related contents will be also covered.
    The exam includes 1. True/False (+1, -1, and 0), 2. Numerical and Analysis, and 3. Fill in the blank.
    The final grade will be curved based on the overall performance of the whole class (probablistic clear cut-off point).
    Note: Extra Credits +5% 1st round competition; +10% Final round competition; Published Paper/NSC/Network Security Contest/CISSP Certification/CCNA or CCIE Security Certification/Imagine Cup/Samart etc. **>1% for taking a network security contest exam registerd by 10/31/2554

    Other related computer and network security research links
    1. CCSS Center for Computer Systems Security, University of Southern California, http://ccss.usc.edu/
    2. UW CSE Systems, Networking, and Security Research, University of Washington, http://www.cs.washington.edu/research/systems.intro.html
    3. Cyber Security, Virginia Tech, http://www.cyber.vt.edu/research
    4. The Computer Security Group, UCSB, http://seclab.cs.ucsb.edu/
    5. Security Research Lab, UC Berkeley, http://security.cs.berkeley.edu/
    6. IBM Security and Privacy, IBM, http://researcher.ibm.com/view_project.php?id=151
    7. CyLab, CMU, http://www.cylab.cmu.edu/
    8. Computer Security Division, NIST, http://csrc.nist.gov/
    9. Networking and Security Research Center, PSU, http://nsrc.cse.psu.edu/
    10. Security Group @CA, University of Cambridge, http://www.cl.cam.ac.uk/research/security/
    11. Stanford Security Laboratory, Stanford University, http://seclab.stanford.edu/
    12. Network Operations and Internet Security Lab, GATECH (Prof. Nick Feamster), http://www.gtnoise.net/
    13. Illinois Security Lab, UIUC (Dr. Carl A. Gunter), http://seclab.illinois.edu/
    14. Systems and Internet Infrastructure Security (SIIS), PSU, http://siis.cse.psu.edu/
    15. Network Security Lab, Columbia University, http://nsl.cs.columbia.edu/
    16. CENTER FOR INFORMATION AND COMPUTATION SECURITY (CICS), UCLA, http://www.cs.ucla.edu/security/
    17. Center for Wireless Information Network Studies, WPI (Prof. Kaveh Pahlavan), http://www.cwins.wpi.edu/
    18. Maryland Cybersecurity Center, UMD, http://www.cyber.umd.edu/faculty/index.html
    19. Center for Research on Computation and Society (CRCS), Harvard, http://crcs.seas.harvard.edu/
    20. Systems and networking group, UCSD, http://sysnet.sysnet.ucsd.edu/sysnet/
    21. Information Security Research Group, UCL, http://sec.cs.ucl.ac.uk/
    22. Center for Information Assurance and Security, UTexas, http://www.cias.utexas.edu/index.htm
    23. Johns Hopkins University Information Security Institute (JHUISI), JHU, http://web.jhu.edu/jhuisi/
    24. University of Oregon Network Security Research Lab, University of Oregon, http://netsec.cs.uoregon.edu/

    Back to Chakchai So-In's Home Page