Registry

Module Specifications

Current Academic Year 2012 - 2013
Please note that this information is subject to change.

Module Title Secure Sys Admin & Internetwork Security
Module Code EE538
School School of Electronic Engineering
Online Module Resources

Module Co-ordinatorSemester 1: Xiaojun Wang
Semester 2: Xiaojun Wang
Autumn: Xiaojun Wang
NFQ level 8 Credit Rating 7.5
Pre-requisite None
Co-requisite None
Compatibles None
Incompatibles None
Description
This module introduces the student to the areas of cryptography and cryptanalysis. It provides a basic understanding of the algorithms used to protect users online and to understand some of the design choices behind these algorithms. The student will develop a workable knowledge of the mathematics used in cryptology and this will allow them to understand attacks on cryptosystems with the aim of preventing future attacks.This module will also provide a sufficient familiarity with managing multi-user computer systems and an adequate knowledge of how to protect systems from network based attacks in order to guarantee the authenticity and non-disclosure of data.This module is not accessible to off-campus students because the associated labs involve interaction with fellow students and demonstrators.

Learning Outcomes
1. Describe the fundamental principles and technology which underlie secure data communications over networks and how they apply in particular cases.
2. Demonstrate the use of the mathematics behind cryptographic algorithms and be able to describe the hardware architectures required to implement these systems.
3. Describe recently developed attacks on cryptographic systems and how these can be thwarted.
4. Perform, at an advance level, system administrator duties on a multi-user based computer system, e.g. Linux-type operating system.
5. Exploit core self-learning skills to acquire knowledge on system administration and security, thus ensuring secure and reliable systems.
6. Demonstrate technical writing skills.



Workload Full-time hours per semester
Type Hours Description
Lecture363 hours a week
Laboratory16eight 2hr lab sessions
Assignment16Write up the 8 lab sessions
Assignment16An assignment to implement two random number generators, evaluate and compare their prosperities
Independent learning time100Self study on the subject
Examination3End of Module Formal Examination
Total Workload: 187

All module information is indicative and subject to change. For further information,students are advised to refer to the University's Marks and Standards and Programme Specific Regulations at: http://www.dcu.ie/registry/examinations/index.shtml

Indicative Content and Learning Activities
Overview of security, threats and mechanisms.
Conventional encryption algorithms - DES, AES.

Mathematics used in cryptology - Number Theory, Abstract Algebra.
Public key cryptography, RSA, key management, confidentiality, authentication and digital signatures.

Side Channel attacks.
The Linux operating system in the context of security and system administration.

Wireless (802.xx) security threats, hacking mechanisms, and improvements.
Firewalls and other network structures to ensure data integrity and network security.

Assessment Breakdown
Continuous Assessment40% Examination Weight60%
Course Work Breakdown
TypeDescription% of totalAssessment Date
LaboratoryThere are eight 2hr lab sessions, Write up the 8 lab sessions30%As required
ProjectAn assignment to implement two random number generators, evaluate and compare their prosperities10%As required
Reassessment Requirement
Resit arrangements are explained by the following categories;
1 = A resit is available for all components of the module
2 = No resit is available for 100% continuous assessment module
3 = No resit is available for the continuous assessment component
This module is category 1
Indicative Reading List
  • W. Stallings: 2006, Cryptography and Network Security - Principles and Practice, 4th ed., Prentice Hall,,
  • Ross J. Anderson: 2001, Security engineering - A Guide to Building Dependable Distributed Systems, John Wiley & Sons, New York, 0-471-38922-6
  • James F. Kurose, Keith W. Ross: 2007, Computer Networking - A Top-Down Approach, 4th Ed., Addison Wesley, ISBN: 0-321-49770-8
Other Resources
804, Website, Novell Inc., 0, OpenSUSE Reference, the edition is linked to the release version of Ed.,
Array
Programme or List of Programmes
CAPDPhD
CAPMMSc
CAPTPhD-track
DMEVM.Eng. in Digital Media Engineering
ECSAOStudy Abroad (Engineering & Computing)
EEPDPhD
EEPMMEng
EEPTPhD-track
GCESGrad Cert. in Electronic Systems
GCTCGrad Cert. in Telecommunications Eng.
GDEGraduate Diploma in Electronic Systems
GTCGrad Dip in Telecommunications Eng
ICEVMEng in Info and Comms Engineering
MENMEng in Electronic Systems
MEPDPhD
MEPMMEng
MEPTPhD-track
MEQMasters Engineering Qualifier Course
MTCMEng in Telecommunications Engineering
Timetable this semester: Timetable for EE538
Date of Last Revision07-JUN-11
Archives: