TCN 4081 Telecommunications Network Security

3y ago
35 Views
2 Downloads
270.53 KB
5 Pages
Last View : 19d ago
Last Download : 2m ago
Upload by : Gideon Hoey
Transcription

TCN 4081—Telecommunications Network SecurityDepartment of Electrical & Computer EngineeringFlorida International UniversityFall 2018ClassroomClass TimeFacultyOffice Reference Textbook :EC 29408:30 pm—12:30 pmDr. Alexander PonsM & W 9:00-11:00 am or by AppointmentEC - 3145305.348.7253apons@fiu.eduTCN 4211 or Permission from the InstructorMark Ciampa, Security Guide to Network SecurityFundamentals, Fifth Edition. Course Technology,Cengage Learning, 2015, ISBN 13: 978-1-30509391-1William Stallings, Cryptography and NetworkSecurity Principles and Practice, Sixth Edition,Pearson, 2014, ISBN 13:978-0-13-335469-0Course DescriptionThis course is intended to provide students with the security aspects that are associatedwith various types of networks. It provides an introduction to the fundamentals ofnetwork security, including compliance and operational security; threats andvulnerabilities; application, data, and host security; access control and identitymanagement; and cryptography. The course covers new topics in network security aswell, including psychological approaches to social engineering attacks, Web applicationattacks, penetration testing, data loss prevention, cloud computing security, andapplication programming development security. Students will also engage in activitiesthat link to the Information Security Community Site. The students will be exposed toNumber Theory, Steganography, Encryption Design Principles and Algorithms, MessageAuthentication and Digital Signature Principle and Designs, and Network SystemSecurity Design. This course offers a comprehensive guide for anyone wishing to take theCompTIA Security SY0-301 Certification Exam.

Course Objectives1.2.3.4.5.6.7.Describe many of the vulnerabilities associated with network attacksIdentify Malware and Social Engineering AttacksConduct Vulnerability Assessment and Attack MitigationDetermine the requirements for Wireless network securityDescribe and use various Cryptographic methodsApply concepts in Number Theory in cypher techniquesUse the concept of Steganography to hide information in different mediumsTopics Covered1. Introduction to Security2. Security Life-Cycle3. Cybersecurity Principles (reduce trust area and relationships)4. Malware and Social Engineering Attacks5. Application and Network Attacks6. Vulnerability Assessment and Mitigating Attacks7. System modeling techniques8. Security Models (Bell-La Padula, Biba, Clark Wilson, Brewer Nash, Multi-level security)9. Host, Application, and Data Security10. Network Security11. Layer 2/Layer 3 security issues and Ipsec12. Administering a Secure Network13. Wireless Network Security14. Access Control Fundamentals15. Authentication and Account Management16. Number Theory17. Basic Cryptography18. Advanced Cryptography19. Business Continuity20. Risk MitigationRelationship of course to program objectivesIn this course, the student will have to show:1. An ability to apply knowledge of mathematics, science, and engineering,2. an ability to design and conduct experiments, as well as to analyze and interpret data,3. an ability to design a system, component, or process to meet desired needs within realisticconstraints such as economic, environmental, social, political, ethical, health and safety,manufacturability, and sustainability,4. an ability to identify, formulate, and solve engineering problems (homework),5. the broad education necessary to understand the impact of engineering solutions in aglobal, economic, environmental, and societal context6. an ability to communicate effectively (through teamwork),

7. an ability to use the techniques, skills, and modern engineering tools necessary forengineering practice,8. a knowledge of contemporary issues,9. a knowledge of advanced mathematics.Tentative Grading ScaleGrading Scale:A 93-100A- 90-92B 87-89B83-86B- 80-82C 77-79C 73-76D 63-66F 62"Florida International University is a community dedicated to generatingand imparting knowledge through excellent teaching and research, therigorous and respectful exchange of ideas, and community service. Allstudents should respect the right of others to have an equitableopportunity to learn and honestly to demonstrate the quality of theirlearning. Therefore, all students are expected to adhere to a standard ofacademic conduct, which demonstrates respect for themselves, theirfellow students, and the educational mission of the University. Allstudents are deemed by the University to understand that if they arefound responsible for academic misconduct, they will be subject to theAcademic Misconduct procedures and sanctions, as outlined in theStudent Handbook."Grading SchemeAttendance (Mandatory)In-Class Assignments (every chapter)Group Research Paper/ProjectMidtermFinal ExamTotal5%10%25%30%30%100%Tentative Dates Final Exam is scheduled on the last Saturday of the semester.Group Presentations will also be done on the last Saturday of the semesterGroup Research/Project Paper1. The course includes a substantial group project (25%) requiring the review and theimplementation of a topic related to Network Security.2. The group contains 3-4 students working together throughout the semester.3. Students will give oral presentations and show their demos on the last day of the class.University’s Code of Academic IntegrityFlorida International University is a community dedicated to generating and impartingknowledge through excellent teaching and research, the rigorous and respectful exchange of

ideas, and community service. All students should respect the right of others to have an equitableopportunity to learn and honestly to demonstrate the quality of their learning. Therefore, allstudents are expected to adhere to a standard of academic conduct, which demonstrates respectfor themselves, their fellow students, and the educational Mission of the University. All studentsare deemed by the University to understand that if they are found responsible for academicmisconduct, they will be subject to the Academic Misconduct procedures and sanctions, asoutlined in the Student Handbook.More information can be found at http://academic.fiu.edu/academic misconduct.htmlDepartment Regulations Concerning Incomplete GradesTo qualify for an Incomplete, a student:1. Must contact (e.g., phone, email, etc.) the instructor or secretary before or during missedportion of class.2. Must be passing the course prior to that part of the course that is not completed3. Must make up the incomplete work through the instructor of the course4. Must see the Instructor. All missed work must be finished before last two weeks of thefollowing term.University policies on sexual harassment, and religious holidays, andinformation on services for students with disabilitiesPlease visit the following uCourse Policies Attendance: Attendance in the course is mandatory and student is not allowed to missany class during the semester. There will be a penalty for missing classes and it mayaffect your final grade.Academic Misconduct: For work submitted, it is expected that each student will submittheir own original work. Any evidence of duplication, cheating or plagiarism will resultat least a failing grade for the course.Unexcused Absences: Two unexcused absences are permitted during the term. Morethan two will result in the loss of points from your final grade. (1 point per absenceabove two, 3 points per absence above 5).Excused Absences: Only emergency medical situations or extenuating circumstances areexcused with proper documentation. After reviewing documentation you are required toemail a description of the excuse and absence dates as a written record to apons@fiu.edu.On Time: As in the workplace, on time arrival and preparation are required. Two “lates”are equivalent to one absence. (Leaving class early is counted the same as tardy.)Deadlines: Assignments are due at the beginning of the class period on the datespecified. Assignments submitted late (within 1 week) will receive half credit.To get assistance try to see me by an appointment.

Students are encouraged to ask questions and to discuss course topics with the instructorand with each other.Any work submitted should display Panther ID number and should be signed, asthe students’ own work, and that no unauthorized help was obtained.Cell phones, communicators, MP3 players, head sets are not allowed to be used in theclass.DO NOT send assignments by email.Instructor reserves right to change course materials or dates as necessary.Exam policy1. Make sure to complete the assigned homework in order to do well in the exam.2. All exams are closed book and closed notes.3. Use of any electronic device with keyboard is prohibited. This also applies to cellphoneswith messaging system.4. No discussion is permitted during the exams.5. Instructor is not compelled to give credit for something he cannot read or followlogically.6. Cheating is considered as a serious offense. Students who are caught will receive theappropriate consequences.Class ScheduleOnce a week, 240 minutes each session: SaturdaysClass 14Weekly TopicChapter 1: Introduction to SecurityChapter 2: Malware and Social Engineering AttacksChapter 3: Application and Network AttacksChapter 4: Vulnerability Assessment and Mitigating AttacksChapter 5: Host, Application, and Data SecurityExam 1Chapter 6: Network SecurityChapter 7: Administering a Secure NetworkChapter 8: Wireless Network SecurityChapter 9: Access Control FundamentalsExam 2Chapter 10: Authentication and Account ManagementChapter 11: Basic CryptographyChapter 12: Advanced CryptographyHandout: Types of Ciphers/DeciphersChapter 13: Business ContinuityChapter 14: Risk MitigationCourse Final ExamGroup/Paper Presentations

William Stallings, Cryptography and Network Security Principles and Practice, Sixth Edition, Pearson, 2014, ISBN 13:978-0-13-335469-0 Course Description This course is intended to provide students with the security aspects that are associated with various types of networks. It provides an introduction to the fundamentals of

Related Documents:

7 36 Enter the last digit of the calendar year. 8-10 37-39 Enter the day of the year. 11 40 Enter the letter “X”. 12-14 41-43 Enter a TCN serial number without any duplication on the day shown in TCN positions 8-10 (rp 37-39). Use the numbers 001 through 999 in sequence.

Telecommunications Law – An Overview – LISA THORNTON 16-48 Introduction 17 1 What is Telecommunications? 17 2 Why Telecommunications is Specially Regulated 18 3 How Telecommunications is Regulated 19 4 The Regulation of Telecommunications in South Africa 20 4.1 Constitutional Framework 20 4.2 National Policy 22 4.3 International Law 28

ANSI/TIA-568.2-D, Balanced Twisted-Pair Telecommunications Cabling and Components Standards ANSI/TIA-569-D, Telecommunications Pathways and Spaces ANSI/TIA-606-C, Administration Standard for Telecommunications Infrastructure ANSI/TIA-607-D, Generic Telecommunications Bonding and Grounding (Earthing) for Customer Premises

2020 Instructions to the Telecommunications Reporting Worksheet, FCC Form 499-A Instructions — Page 3 Although some Telecommunications Reporting Worksheet filers may not need to contribute to each of the support and cost recovery mechanisms, all telecommunications carriers and certain additional telecommunications providers must file.

1 . Madeleine M Leininger and Transcultural Nursing in Australia - an appreciation . Dr Akram Omeri, OAM, PhD, RN, CTN-A, TCN-Scholar, FACN . Reflecting on the development of TCN in Australia, m y thoughts for this paper

future dispute or disturbance by the communities in the course of construction. The Regional Transmission Manager, Enugu Region, Engr. Emmanuel Nwani, on his part, noted that the proposed substation projects w

The piston switch is a closed when the leak detector is fully pen, and otherwise measureso 10,000 ohms. Figure 6 — Piston Switch Only Circuit 7 — Piston and Sump Switch Circuit. ISM-4081 Integrated S

5 SUGGESTED READINGS Smith, G.M. 1971. Cryptogamic Botny. Vol.I Algae & Fungi. Tata McGraw Hill Publishing Co., New Delhi. Sharma, O.P. 1992.