362 006: Information and Communication Technology Security (Spring 2025)


Course Description:
Introduction to computer security and information and communication technology, encryption techniques, introduction to number theory, public key algorithm, key management, hash function, digital signature and authentication protocol, electronic mail security, Internet Protocol (IP) security (IPsec), Lan security, web security, virus, worm, firewall, intrustion detection and prevention, hacker, software and hardware security, information technology security management, risk analysis and management, digital forensics, ethic, computer security law.

Prerequisite: Basic Knowledge of Computer Network; Operating System; Computer Architecture; Database

Instructor:
  • Chakchai So-In, Ph.D., chakso AT kku.ac.th
  • Satit Kravenkit, Ph.D., satikr AT kku.ac.th

  • Office: @9523 (Applied Network Technology)
    Office Hours: Friday 08.30 to 10.30 (or email me for appointment)
    Class homepage: https://csperson.kku.ac.th/chakchai/362006_Spring25
    Cisco Networking Academy - Cybersecurity Essential: Cisco Netacad
    Huawei Talent Online: Huawei Talent
    Teaching Assistant:
  • Titaya Sriwuttisap titaya_s AT kkumail.com, Office hour Monday (Email -> Tentative)
  • Sirada Prawadsri Namsirada AT kkumail.com , Office hour Tuesday (Email -> Tentative)
  • Suthiphong Punpakdee Suthiphong.p AT kkumail.com, Office hour Wednesday (Email -> Tentative)

  • Location:
    Section I+II: - Lecture: on Tuesday at room @SC9127 from 13.00 to 15.00 (Sec I+II)
    - Lab: on Tuesday at room @SC9524 from 15.00 to 17.00 (Sec I)
    - Lab: on Tuesday at room @SC9524 from 17.00 to 19.00 (Sec II)
    Section III: - Lecture: on Thursday at room @SC9524 from 10.00 to 12.00 (Sec III+IV)
    - Lab: on Wednesday at room @SC9524 from 08.30 to 10.30 (Sec III)
    - Lab: on Wednesday at room @SC9524 from 10.30 to 12.30 (Sec IV)
    Facebook Group: Facebook Group
    Textbook
    The main textbooks for the course are
    1.Computer and Network Security (Thai Edition) by Chakchai So-In, 2011-2018.
    2.¤ÙèÁ×ÍàÃÕ¹áÅÐãªé§Ò¹ Network Security Lab ©ºÑºãªé§Ò¹¨ÃÔ§ by Chakchai So-In et al., 2018.

    Supplementary (Cisco Cybersecurity Essenteial)
    1.Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide by Shane Sexton and Raymond Lacoste, 2024.

    Supplementary
    1. Principles of Information Security (7th edition) by Michael E. Whitman and Herbert J. Mattord, 2021.
    2. Network Security: Private Communication in a Public World (3rd edition) by Charlie Kaufman, Radia Perlman, and Mike Specimner, 2022
    3. Effective Cybersecurity: A Guide to Using Best Practices and Standards by William Stallings, 2018
    4. Cryptography and Network Security: Principles and Practice (8th edition) by William Stallings, 2019
    5. Computer and Information Security Handbook (3rd edition) by John Vacca, 2017
    6. CCNA Security Course Booklet (version 1.1) by Cisco Systems, 2012.
    7. CompTIA Security+ Guide to Network Security Fundamentals (MindTap Course List) (7th edition) by Mark Ciampa, 2020.
    8. Law (ICT) Thailand

    Interesting Computer and Network Security Material
    1. Master in Security 3rd edition (Thai) by Jatuchai Pangjun, 2018
    2. ºÃÔËÒèѴ¡Òà Networking ´éÇ Windows 7 by ¾ÔÈÒÅ ¾Ô·ÂÒ¸ØÃÇÔÇѲ¹ì, 2012
    3. ¤ÑÁÀÕÃì Ubuntu Linux Server àÅèÁ 1 by ºÑ³±Ôµ ¨ÒÁÃÀÙµÔ, 2012
    4. ¤ÑÁÀÕÃì Ubuntu Linux Server àÅèÁ 2 by ºÑ³±Ôµ ¨ÒÁÃÀÙµÔ, 2012
    5. ¤ÑÁÀÕÃì Ubuntu Linux Server àÅèÁ 3 by ºÑ³±Ôµ ¨ÒÁÃÀÙµÔ, 2012
    6. µÔ´µÑé§Ãкºà¤Ã×Í¢èÒ Linux Server ÀÒ¤»¯ÔºÑµÔ by ¾ÔÈÒÅ ¾Ô·ÂÒ¸ØÃÇÔÇѲ¹ì, 2012
    7. Network and Computer Security Specialist #1, #2, #3 (Thai) by Minister of ICT, Thailand
    8.
    Hands-on Ethical Hacking and Network Defense by Michael T. Simpson, Kent Backman, and James E. Corley, 2018
    9. CEH Certified Ethical Hacker All-in-One Exam Guide by Matt Walker, 2011
    10. CEH Certified Ethical Hacker Study Guide by Kimberly Graves, 2010
    11. Applied Cryptography: Protocols, Algorithms, and Source Code in C by Bruce Scheier, 2096
    12. Network Security Essentials: Applications and Standards by William Stalling, 2010
    13. Hacking Exposed: Network Security Secrets and Solutions by Stuart McClure, Joel Scambray, and George Kurtz, 2009
    14. Network Security Architectures by Sean Convery, 2010
    15. CISSP Certified Information Systems Security Professional STUDY GUIDE by SYBEX, 2010

    Other good books are
    Slides from Prof. Raj Jain, Network Security Slides
    Most importantly, please READ all Computer and Network Security Wiki related topics.
    Network Programming (Bee)
    UNIX Tutorial for Beginners Tutorial@virginia.edu
    Example Toos/Testbed (Networking/Security/Mobile and Wireless Technology)
    Click Here to see a list of testbed/tools
    Youtube Project: Project (Testbed) (Class in 2024)
    Project (Testbed) (Class in 2023)
    Project (Testbed) (Class in 2022) More Examples Click Here
    News
    Lecture Schedule: (Tentative Subject to Change)
    ClassDayDateTopic
    1Tuesday19/11/2024Chapter 1: Course Overview
    2Tuesday26/11/2024Chapter 2: Need for Security
    3Tuesday03/12/2024 (Father Day => Zoom/Onsite Saturday 07/12/2024 09.00-10.45)Chapter 3: Risk Analysis
    4Tuesday10/12/2024 (Constitution Day => Zoom/Onsite Saturday 07/12/2024 10.45-12.00)Chapter 4: Classicial Encryption Techniques
    5Tuesday17/12/2024 (Graduation Ceremony => Zoom/Onsite Saturday 28/12/2024 09.00-10.45)Chapter 5_1 (Part I): Application Security
    6Tuesday24/12/2024 Chapter 5_1 (Part II) + Chapter 5_2: (Cont.) + LAN (Layer 2) Security
    7Tuesday31/12/2024 (New Year => Zoom/Onsite Saturday 28/12/2024 10.45-12.00)Chapter 6_1: Malicious Software
    8Tuesday07/01/2025Security Topic Selection Proposal (PPT) + Review for Midterm + Dhamma #1 + Dhamma #2 + Dhamma #3 + Encoragement
    9Tuesday14/01/2025Mid-Term Exam (week 13/01-20/01) = Saturday 11/01 (09.00-12.00)
    10Tuesday21/01/2025Chapter 6_2 (Part I + II): Hacker and IDS/IPS
    11Tuesday28/01/2025Chapter 7 + Chapter 8: VPN and IPSec Security + Firewall
    12Tuesday04/02/2025Chapter 9 + Chapter 10 + Chapter 11: Authentication/Authorization/Accounting (AAA) + Physical (Hardware) Security + Block Cipher and Encryption Standard
    13Tuesday11/02/2025 (Makha Bucha => Zoom/Onsite Saturday 15/02/2024 09.00-10.45)Chapter 12: Public Key Cryptography and Key Management
    14Tuesday18/02/2025Chapter 13: Hashing and Digital Signature
    15Tuesday25/02/2025Chapter 14 (Part I + II + III): Ethic + Computer Crime Law + Cyber Security Law
    16Tuesday04/03/2025Review for Finalterm + Final Security Tool/App Presentation PPT + Demo + Poster + Video (youtube) + Code/Configuration/Testbed
    17Tuesday11/03/2025Final-Term Exam (week 17/03-24/03) = 23/03 (09.00-12.00)

    Homework/LabHW Assignments (Spring 2025 schedule): (Subject to Change)
    Ten or eleven homeworks will be assigned (as Cisco Cybersecurity = Chapters + Exams) throughout the course. Click here https://www.netacad.com.
    Ten or eleven lab-homeworks will be assigned (at the end of lab chapter) throughout the course. Click here https://serazu.com/web/product/view?id=704.
    Note: Some of the questions will be used as QUIZ during the lecture.

    Submission:
    All assignment should be turned via Google Drive = 362006_Spring25. Late lab homework will be assessed a 30% penalty.
    Each group-homework should include title prefix = "GroupID_HWID" such that ID is your Group/HW number.
    Each group-lab-homework should include title prefix = "GroupID_LabHWID" such that ID is your Group/Lab number.
    Note: For homework and lab assignment; you MUST include the cover letter with students' signature OTHERWISE they WILL NOT be graded.
    Lab Schedule: (Tentative Subject to Change)
    LabDescription
    #1Lab1: Install Virtual Machine + Windows OS + Basic Security + AntiVirus + Basic User Configuration (Lab1.pdf)
    #2Lab2: Shared Files (Chapter 4) + Basic Encryption/Decryption (Chapter 12)
    #3Lab3: Network Service Security (telnet/ftp/www) + Wireshark (Chapter 3)
    #4Lab4: Network Managenment Tools (Chapter 5)
    #5Lab5: Web and Database Security (Lab5.pdf)
    #6Lab6: Password Security (Lab6.pdf)
    #7Lab7: Malwares and Attacks (Chapter 9)
    #8Lab8: IDS (Chapter 7)
    #9Midterm Lecture Exam (allow 2*A4)
    #10Lab9: IPSec + VPN + Email Security (Chapter 6)
    #11Lab10: Firewall + Proxy + NAT (Chapter 8)
    #12Lab11: Radius + Syslog Server + Backup (Chapter 10)
    #13Lab12: Set up Script + Stenography (Chapter 11)
    #14Lab13: Encryption/Decryption + Hashing (Chapter 13)
    #15Lab14-15: Layer 2 Security (Lab14.pdf) OR KALI_1 + Router Security (Lab15.pdf) OR KALI_2
    #16Final Lab Exam (allow Textbooks + Lab_PDF)
    #17Final Lecture Exam (allow 2*A4)

    Academic Integrity
    Students at Khon Khan University are engaged in the first step for their professional career with the highest standards. Please follow the academic integrity guideline at Cheating and Plagiarism [@CMU]. All these rules are enforced for the entire course.
    Security Tools/Apps - Group of 6 students
    Security Tool
    ONLY hands-on security tools on topic of your choice
    The final outcome MUST be something VISUAL= Computer/Network/Information/Internet/ Security Tools
    There is about 20 mins demo + Document (PPT/ Poster/ Video mp4 - youtube/ Code-Zip)
    Tool Ideas: http://sectools.org/?page=1

    Main Project (Project I)
    Project Ideas:
  • Ideas at Stanford.edu
  • Ideas at Berkeley.edu
  • Ideas at MIT.edu
  • Ideas at DotCrime
  • Ideas at Sunysb.edu
  • Ideas at Berkeley.edu
  • Ideas at Udel.edu
  • Ideas at Fsu.edu
  • Ideas at Upenn.edu

  • In this semester, we focus on Mobile and Wireless Network Security including sensor network security; however, we do not limit on these.
    Cisco Netrider Contest (Networking Competition)
    Network Security Contest
    Click Here

    Project Milestone

    Description

    Completion Date

    #1Security Topic Selection Proposal 10 mins PPT Presentation (what is it) = Topic + (2)Related Work + What is it? + What makes different from those 2? + Examples = 6-8 pages)07/01/2025
    #2Security Topic Tool/App Submission 20 mins Presentation (Demo) = Poster + PPT + Video Youtube .mp4 (Presentation + Demo) + Code .zip + Demo 04/03/2025

    Note: These are group projects BUT grading individually *write who do what in what%?*
    Grading: (tentative)
    Mid-Term Exam (Lecture) + Industrial Exam25% +/- 25%
    Final Exam (Lecture/Lab)30% +/- 20%
    Homework + Lab + LabHW + Quiz + Class participation25% +/- 10%
    Security Tools/App20 +/- 10% (grading individually)

    Note that students are allowed to bring only "TWO" piece of A4 paper in midterm/final exams with additional non-memorized calculator
    The final exam material will be after the mid-term; however, all related contents will be also covered.
    The exam includes 1. True/False (+1, -1, and 0), 2. Numerical and Analysis, and 3. Fill in the blank.
    The final grade will be curved based on the overall performance of the whole class (probablistic clear cut-off point).
    Note: Extra Credits:
  • +2.5 to 5% 1st round competition
  • +5 to 10% Final round competition; Published Paper/NSC/Imagine Cup/Samart etc.
  • +1% for taking a security contest exam
  • +2.5% for taking/passing the security online course, e.g., udemy and coursera
  • +5 to 10% passing Security Certifications

  • Other related computer and network security research links
    1. CCSS Center for Computer Systems Security, University of Southern California, http://ccss.usc.edu/
    2. UW CSE Systems, Networking, and Security Research, University of Washington, http://www.cs.washington.edu/research/systems.intro.html
    3. Cyber Security, Virginia Tech, http://www.cyber.vt.edu/research
    4. The Computer Security Group, UCSB, http://seclab.cs.ucsb.edu/
    5. Security Research Lab, UC Berkeley, http://security.cs.berkeley.edu/
    6. IBM Security and Privacy, IBM, http://researcher.ibm.com/view_project.php?id=151
    7. CyLab, CMU, http://www.cylab.cmu.edu/
    8. Computer Security Division, NIST, http://csrc.nist.gov/
    9. Networking and Security Research Center, PSU, http://nsrc.cse.psu.edu/
    10. Security Group @CA, University of Cambridge, http://www.cl.cam.ac.uk/research/security/
    11. Stanford Security Laboratory, Stanford University, http://seclab.stanford.edu/
    12. Network Operations and Internet Security Lab, GATECH (Prof. Nick Feamster), http://www.gtnoise.net/
    13. Illinois Security Lab, UIUC (Dr. Carl A. Gunter), http://seclab.illinois.edu/
    14. Systems and Internet Infrastructure Security (SIIS), PSU, http://siis.cse.psu.edu/
    15. Network Security Lab, Columbia University, http://nsl.cs.columbia.edu/
    16. CENTER FOR INFORMATION AND COMPUTATION SECURITY (CICS), UCLA, http://www.cs.ucla.edu/security/
    17. Center for Wireless Information Network Studies, WPI (Prof. Kaveh Pahlavan), http://www.cwins.wpi.edu/
    18. Maryland Cybersecurity Center, UMD, http://www.cyber.umd.edu/faculty/index.html
    19. Center for Research on Computation and Society (CRCS), Harvard, http://crcs.seas.harvard.edu/
    20. Systems and networking group, UCSD, http://sysnet.sysnet.ucsd.edu/sysnet/
    21. Information Security Research Group, UCL, http://sec.cs.ucl.ac.uk/
    22. Center for Information Assurance and Security, UTexas, http://www.cias.utexas.edu/index.htm
    23. Johns Hopkins University Information Security Institute (JHUISI), JHU, http://web.jhu.edu/jhuisi/
    24. University of Oregon Network Security Research Lab, University of Oregon, http://netsec.cs.uoregon.edu/

    Back to Chakchai So-In's Home Page