322 376: Information and Communication Technology Security (Fall 2012)


Course Description:
Introduction to computer security and information and communication technology, encryption techniques, introduction to number theory, public key algorithm, key management, hash function, digital signature and authentication protocol, electronic mail security, Internet Protocol (IP) security (IPsec), web security, virus, worm, firewall, information technology security management, computer security law.

Prerequisite: Basic Knowledge of Computer Network; Operating System; Computer Architecture; Database

Instructor: Chakchai So-In, Ph.D., chakso AT kku.ac.th
Office: SC 6706
Office Hours: Monday 02.30pm to 04.30pm (or email me for appointment)
Class homepage: http://web.kku.ac.th/chakso/322376_Fall12/
CNAP CCNA Security material: Cisco Network Academy CCNA Security
Teaching Assistant:
  • Kanokmon Rujirakul ace_kamikaze AT hotmail.com , Sunday 5.00pm to 06.00pm @6707
  • Sarayut Poolsanguan tktschool AT hotmail.com, Tuesday 05.00pm to 06.00pm @6707
  • Chatchai Poonriboon kengtaykung AT gmail.com, Wednesday 05.00pm to 06.00pm @6707

  • Location:
    Section I: - the class meets on Tuesday at room SC8505 from 09.00am to 12.00pm for lecture (with additional lab hours).
    Section II: - the class meets on Wednesday at room SC8405 from 01.00pm to 04.00pm for lecture (with additional lab hours).
    Facebook Group: Facebook Group
    Class Email: cs322376 AT gmail.com
    Textbook
    The main textbooks for the course are
    1.Computer and Network Security (Thai Edition) by Chakchai So-In, 2012.
    2. Cryptography and Network Security: Principles and Practice by William Stallings, 2010
    3. Network Security: Private Communication in a Public World by Charlie Kaufman, Radia Perlman, and Mike Specimner, 2002
    4. Law (ICT) Thailand

    (Optional) Supplementary
    1. Master in Security 2nd edition (Thai) by Jatuchai Pangjun, 2010
    2. Network and Computer Security Specialist #1, #2, #3 (Thai) by Minister of ICT, Thailand
    3.
    Hands-on Ethical Hacking and Network Defense by Michael T. Simpson, Kent Backman, and James E. Corley, 2012
    4. CEH Certified Ethical Hacker All-in-One Exam Guide by Matt Walker, 2011
    5. CEH Certified Ethical Hacker Study Guide by Kimberly Graves, 2010
    7. Applied Cryptography: Protocols, Algorithms, and Source Code in C by Bruce Scheier, 1996
    8. Network Security Essentials: Applications and Standards by William Stalling, 2010
    9. Hacking Exposed: Network Security Secrets and Solutions by Stuart McClure, Joel Scambray, and George Kurtz, 2009
    10. Network Security Architectures by Sean Convery, 2010
    11. CISSP Certified Information Systems Security Professional STUDY GUIDE by SYBEX, 2010

    Other good books are
    Slides from Prof. Raj Jain, Network Security Slides
    Most importantly, please READ all Computer and Network Security Wiki related topics.
    Network Programming (Bee)
    UNIX Tutorial for Beginners Tutorial@virginia.edu

    Example Project I (Class in 2011)

    Project I APP

    Mini Lab Project
    News
    Lecture Schedule: Tentative Subject to Change)
    ClassDayDateTopic
    1Monday10/22/2012Course Overview
    2Monday10/29/2012Encryption Techniques
    3Monday11/05/2012Block Ciphers and Encryption Standards
    4Monday11/12/2012Advanced Encryption Standard + Symmetric Cipher and Random Variable
    5Monday11/19/2012Introduction to Number Theory + Project Topic Selection + Encoragement
    6Monday11/26/2012Public Key Encryption
    7Monday12/03/2012Proposal Project Presentation + Paper Selection + Dhamma #1 + Dhamma #2 + Dhamma #3
    8Monday12/10/2012MAC and Hash Algorithms
    9Monday12/17/2012Review for Midterm
    10Monday12/24/2012Mid-Term Exam (week 12/24-12/28)
    Monday12/31/20122013 New Year (no class)
    11Monday01/07/2013Authentication Application
    12Monday01/14/2013Email Security + Web Security
    13Monday01/21/2013IP Security + Small Project Submission
    14Monday01/28/2013Firewall + Intruder + Malicious Software
    15Monday02/04/2013Review for Final + Final Project Presentation/Demo
    16Monday02/11/2013Final Exam (week 02/11-02/16)

    Note: For Section I; date+2 say Monday 10/22 = Wednesday 10/24
    Homework/Lab Assignments (Fall 2012 schedule) (Subject to Change)
    Four or ten homeworks will be assigned throughout the course. All assignment MUST be turned in as a HARDCOPY (during class or in my mail box). All submission MUST be turned in 7 mins before class. For all reasons, late penalty will be applied. Late homework will be assessed a 30% penalty. No homework will be accepted more than one day late. For EMERGENCY cases, you allow to email me to cs322376@gmail.com including title prefix = "322376_Fall2012_XX:HWY" such that XX is your section number and Y is your homework number.

    HomeworkDescriptionOut DateDue Date
    #1Basic Computer and Network Security + DES11/05/201211/19/2012
    #2AES11/19/201212/03/2012
    #3Number Theory + Random12/03/201212/17/2012
    #4Public Key Encryption 01/07/201301/21/2013
    #5Application Security 01/21/201302/04/2013

    Academic Integrity
    Students at Khon Khan University are engaged in the first step for their professional career with the highest standards. Please follow the academic integrity guideline at Cheating and Plagiarism [@CMU]. All these rules are enforced for the entire course.
    Project/Lab - Group of up to 10-12 students (You MUST include 3-4 students from STAT)
    Ethic Hacking Additional Labs following Hands-on Ethical Hacking and Network Defense by Michael T. Simpson, Kent Backman, and James E. Corley, 2010

    Main Project (Project I)
    Project Ideas:
  • Ideas at Stanford.edu
  • Ideas at Berkeley.edu
  • Ideas at MIT.edu
  • Ideas at DotCrime
  • Ideas at Sunysb.edu
  • Ideas at Berkeley.edu
  • Ideas at Udel.edu
  • Ideas at Fsu.edu
  • Ideas at Upenn.edu

  • In this semester, we focus on Mobile and Wireless Network Security including sensor network security; however, we do not limit on these.
    Project NSC2012 Examples
    Central; Isan; North; South; East; West
    Project NSC2013 Examples
    Central; Isan; North; South; East; West

    Small Project (Project II) Small Project (Security Lab)
    Submit Video Set up Presentation + .doc (manual) + show setup to TA

    Project Milestone

    Description

    Completion Date

    #1Project Topic Selection+15 mins Presentation (what is it)11/19/2012
    #2Proposal Submission +20 mins Presentation (story board - theory/objective/limitation/use case/activity diagram/..etc.) Click here for detail (page 33 BUT at least 15 pages - Check also Senior Project Guideline here page 18-19) Download Project Presentation Review Form here 12/03/2012
    #3Small Project Submission (Security Lab + Presentation01/21/2013
    #4Final Project Submission Click here for detail (page 36)+30 mins Presentation/Demo02/04/2013

    Note: These are group projects BUT grading individually *write who do what in what%?*
    Grading: (tentative)
    Mid-Term Exam25%
    Final Exam25%
    Homework + Quiz + Class participation20%
    Small Project5%+5% (grading individually)
    Term Project25%+5% (grading individually)

    Note that students are allowed to bring only "ONE" piece of A4 paper in each exam with additional non-memorized calculator
    The final exam material will be after the mid-term; however, all related contents will be also covered.
    The exam includes 1. True/False (+1, -1, and 0), 2. Numerical and Analysis, and 3. Fill in the blank.
    The final grade will be curved based on the overall performance of the whole class (probablistic clear cut-off point).
    Note: Extra Credits +2.5 to 5% 1st round competition; +5 to 10% Final round competition; Published Paper/NSC/Network Security Contest/CISSP Certification/CCNA or CCIE Security Certification/Imagine Cup/Samart etc. **>1% for taking a network security contest exam

    Other related computer and network security research links
    1. CCSS Center for Computer Systems Security, University of Southern California, http://ccss.usc.edu/
    2. UW CSE Systems, Networking, and Security Research, University of Washington, http://www.cs.washington.edu/research/systems.intro.html
    3. Cyber Security, Virginia Tech, http://www.cyber.vt.edu/research
    4. The Computer Security Group, UCSB, http://seclab.cs.ucsb.edu/
    5. Security Research Lab, UC Berkeley, http://security.cs.berkeley.edu/
    6. IBM Security and Privacy, IBM, http://researcher.ibm.com/view_project.php?id=151
    7. CyLab, CMU, http://www.cylab.cmu.edu/
    8. Computer Security Division, NIST, http://csrc.nist.gov/
    9. Networking and Security Research Center, PSU, http://nsrc.cse.psu.edu/
    10. Security Group @CA, University of Cambridge, http://www.cl.cam.ac.uk/research/security/
    11. Stanford Security Laboratory, Stanford University, http://seclab.stanford.edu/
    12. Network Operations and Internet Security Lab, GATECH (Prof. Nick Feamster), http://www.gtnoise.net/
    13. Illinois Security Lab, UIUC (Dr. Carl A. Gunter), http://seclab.illinois.edu/
    14. Systems and Internet Infrastructure Security (SIIS), PSU, http://siis.cse.psu.edu/
    15. Network Security Lab, Columbia University, http://nsl.cs.columbia.edu/
    16. CENTER FOR INFORMATION AND COMPUTATION SECURITY (CICS), UCLA, http://www.cs.ucla.edu/security/
    17. Center for Wireless Information Network Studies, WPI (Prof. Kaveh Pahlavan), http://www.cwins.wpi.edu/
    18. Maryland Cybersecurity Center, UMD, http://www.cyber.umd.edu/faculty/index.html
    19. Center for Research on Computation and Society (CRCS), Harvard, http://crcs.seas.harvard.edu/
    20. Systems and networking group, UCSD, http://sysnet.sysnet.ucsd.edu/sysnet/
    21. Information Security Research Group, UCL, http://sec.cs.ucl.ac.uk/
    22. Center for Information Assurance and Security, UTexas, http://www.cias.utexas.edu/index.htm
    23. Johns Hopkins University Information Security Institute (JHUISI), JHU, http://web.jhu.edu/jhuisi/
    24. University of Oregon Network Security Research Lab, University of Oregon, http://netsec.cs.uoregon.edu/

    Back to Chakchai So-In's Home Page