ICS 444 ---T071
Computer & network security 

Catalog Description

Introduction to computer and network security; Security services: confidentiality, integrity, availability, accountability; Hacker techniques and attack types; Public and private key encryption; Authentication; Digital signature; User identification and access control; Computer viruses, Trojans and worms; Risk management and analysis; Information security process; Internet security: security protocols such as IPSec, SSL, TLS, email and web security; Security technologies and systems: Firewalls, VPN and IDS.



  • ICS 232  Computer Organization and Assembly Programming
  • ICS 431  -- Operating Systems
  • ICS 432  -- Computer Networks
Course Objectives

Develop a fundamental understanding of computer and network security proper practices, policies, technologies and standards. 


Learning outcome

Upon completion of this course, students will have the ability to:

  1. Describe computer and network security fundamental concepts and principles.

  2. Effectively apply cryptographic algorithms for integrity and authentication.

  3. Identify and assess different types of threats and vulnerabilities and their impact on risk assessment and measurement.

  4. Demonstrate the ability to write a security policy

  5. Demonstrate the ability to design and implement a data encryption system, firewalls, etc

  6. Recognize different techniques for securing Internet services such as email and web transactions

  7.  Identify ethical, professional responsibilities, risks and liabilities in computer and network environment.

Text Book

  • Security in Computing, Pfleeger, C. and Pfleeger, S. (2003), 3rd Edition, Prentice Hall 

Selected References
  • Hacking Exposed, S. McClure and George Kurtz,  5th Edition, McGraw Hill
  • Data Communications and Networking, 3/e. Behrouz A Forouzan, McGraw-Hill 2004

Grading Policy                     

Homework & Assignments


Term paper


Quizzes & attendance


Exam I 


Exam II





Plagiarism, copying and other anti-intellectual behavior are prohibited by the university regulations. Violators may have to face serious consequences. 

1 08-09-07 Introduction
2 15-09-07 Social engineering

Online Attacks

HW1: Find 5 references about Block cipher: Dates already discussed in class
You need to submit a hard copy and soft copy of the paper and list of references writing in the appropriate format.
Due Date Wednesday 26-09-07

3 22-09-07 Malware

Physical Security

Communication security

4 29-09-07 Access Control

Cryptography (Classical Cipher)

Monday: Meeting at RI in the security lab
We will meet at RI reception (first floor)

5 20-10-07 Cryptography (mathematical cipher)

Cryptography (Stream cipher,  RC4)

Cryptography (Block cipher cipher)

Cryptography (DES)

Cryptography (AES)
6 27-10-07 Cryptography (public key)

Cryptography (RSA)

EXAM I (Thursday NOV 1st 10am; 24-125)

7 03-11-07 Software reverse engineering

short class presentation (MONDAY)

8 10-11-07 Stegnography


9 17-11-07 IP sec
10 24-11-07 Secret Sharing
11 01-12-07

Program security

12 08-12-07 EXAM II Saturday DEC 8th 2008

Assignments Demonstration

13 29-12-07 Policy
14 05-01-08 Policy 2
15 12-01-08 Risk Management

Students Presentations (Tuesday 15th @ 7pm)

F 19-01-08 Final examinations: Saturday,  January 26, 2008
7:30 AM @ 24-114
F 26-01-08