13038 (v.3) Enterprise Network Security 601


 

Area:School of Information Systems
Credits:25.0
Contact Hours:3.0
Laboratory:1 x 1.5 Hours Weekly
Seminar:1 x 1.5 Hours Weekly
Prerequisite(s):11736 (v.3) Systems Development 501 or any previous version
AND
12032 (v.5) Internet Fundamentals 501 or any previous version
Syllabus:Internet crime, risk identification, Internet security policies, network firewalls, proxy applications, de-militarised zones, virtual private networks, authentication, web server security, encryption, steganography, tempest, intrusion detection and Internet legal issues.
 
Unit Outcomes: On successful completion of this unit students will have - Decided security measures to minimise risk of computer crime. Explained the role of a certification authority and how to assign digital certificates to users/servers. Illustrated protecting data via Secure Socket Layers. Explained the role of a firewall and how it operates. Illustrated how vulnerability scanners are used to identify weaknesses in server software. Understood the facilities offered on the Internet for remaining anonymous. Explainedthe use of port scanners, packet sniffers and steganography in a network security context. Identified password weakness and recommend good password management procedures. Understood the process of security incident response to Internet security violations. Understood national and international legal issues in relation to the Internet and computer crime.
Text and references listed above are for your information only and current as of September 30, 2003. Please check with the unit coordinator for up-to-date information.
Unit References: Alexander M., (1997), Net Security - Your Digital Doberman, USA, Ventana Communications. Ahuja V., (1997), Secure Commerce on the Internet, USA, Academic Press. Atkins D., Buis P., Hare C., Kelley R., Nachenberg C., Nelson A.B., Phillips P., Ritchey T., Sheldon T. and Snyder J., (1997), Internet Security Professional Reference - 2nd ed, USA, New Riders Publishing. Bernstein T., Bhimani A., Schultz E. and Siegel C., (1996), Internet Security for Business, USA, John Wiley and Sons. Ford W. and Baum S.M., (1997), Secure Electronic Commerce, USA, Prentice Hall. Grabosky P.N. and Smith R.G., (1998), Crime in the Digital Age - Controlling Telecommunications and Cyberspace Illegalities, Australia, Federal Press. Kosiur D., (1997), Understanding Electronic Commerce, USA, Microsoft Press. Minoli D. and Minoli E., (1998), Web Commerce Technology Handbook, USA, McGraw Hill. Rubin A. D., Geer D. and Ranum M.J., (1998), Web Security Source Book - A Complete Guide to Web Security Threats and Solutions, USA, John Wiley and Sons.
Unit Texts: King C., Dalton C. and Osmanoglu T., (2001), Security Architecture - Design, Deployment and Operations, NY, McGraw-Hill.
 
Unit Assessment Breakdown: Examination 60%, Laboratory Test 20%, Written Assignment 20%. This is by Grade/Mark assessment.
YearLocationPeriodInternalArea ExternalCentral External
2004Bentley CampusSemester 2Y  

 

Copyright and Disclaimer
Current as of: February 2, 2004
CRICOS provider code 00301J