Network Security (NS)

About Us.

Network Security (Educational Course) Course Homepage

Tuesdays 10:30 - 11:30 and Wednesday 08:30 - 10:30
Room: 109
TAs class: Tuesdays 11:30 - 12:30
Room: 109

Instructors

Instructor: Mohammad Reza Razian
Website: mrazian.com
Email: [MyFamilyName].mr [AT] gmail
TA:
Mr. Abdollahi (Email: en.m.abdollahy [AT] Gmail

Description:

Network Security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure, thereby creating a secure platform for computers, users and programs to perform ... SANS Institute: Network Security Resources https://www.sans.org/network-security/

Prerequisites

Computer Networks or an equivalent course

Resources

    Course References:
  • Cryptography and Network Security Principles and Practices, By William Stallings 5th Edition
  • Introduction to Computer Security, By Matt Bishop

Policies:

Grading policy is as follows. This is tentative.
5 Homework
10 Final
4 Midterm
1 Discipline (Class Participation and Following rules)

There will be no exceptions to the following rules:

  1. If you turn in your assignment one or more day late you will loose grade.

  2. Cell Phones must be turned off (or be silent) when you are in class.

  3. Policy for cheating/copying HWs. Providing your assignment to someone else is considered cheatingon your behalf. All participants will receive -100 for the task at hand.

  4. Your dress should be adopted to Dress code of Roshd-e-Danesh University.

Important Info

TA section

Homework
  • Homework 2 - v1.0: [PDF] 500-worst-passwords.txt [TXT] Due Tir 16th, 23:59:59
  • Homework 1 - v1.0: [PDF] info.log [LOG] Due Ordibehesht 11th, 23:59:59

Course Material
  1. 11/21: Introduction to Course
    1. Course resources
    2. Course paper
    3. Course assignment
    4. Introduction to Data and Network Security
  2. 11/28: Introduction to Data and Network Security [PDF]
    1. Security literacy
    2. Cyber war
    3. what is security
    4. Linux
  3. 12/05: Linux
    1. Linux File System
    2. cd
    3. ls
    4. mkdir, touch, man
  4. 12/19: Introduction to Data and Network Security (Finished) and Security Mechanism Overview [PDF]
    1. Security Attacks
    2. Secure Model
    3. Access Control
    4. Privacy
    5. Defence in depth
    6. Prevention methods: Authentication
  5. 12/26: Introduction to Cryptography and Calssic Cryptography [PDF]
    1. Monoalphabetic Substitution Ciphers
    2. Caesar
    3. General Caesar cipher
    4. Brute Force Attack to Caesar
    5. Frequency Analysis Attack to Caesar
    6. Definition of some keyword in cryptology field
    7. Playfair
  6. 01/17: Introduction to Cryptography and Calssic Cryptography
    1. OTP
    2. Steganography
  7. 01/24-1: Introduction to Symmetric Ciphers (Started) [PDF]
    1. Block cipher vs. stream cipher
    2. Ideal block cipher
    3. Substitution-permutation network (SPN)
    4. Confusion and Diffusion
    5. Feistel cipher structure
    6. DES cipher basics
    7. DES Encryption steps
    8. Attack to and cryptoanalysis of DES
    9. 2DES and 3DES
    10. AES Encryption [SWF]
  8. 01/24-2: Introduction to Cryptography and Calssic Cryptography
    1. Linux
  9. 02/07: Introduction to Symmetric Ciphers (Finished) (helpful resource for deeper view to modes of operation [PPT])
    1. Why we need to mode of operation
    2. Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), Counter (CTR)

    3. Well-known ciphers
  10. 02/14: Introduction to Public Key Cryptography [PDF]
    1. Drawbacks (limitations) of symmetric ciphers
    2. Drawbacks of symmetric ciphers
    3. Public Key Cryptography Standard (PKCS)
    4. Public Key and Private Key
    5. Confidentiality, Digital signature and Key distribution using PKCS
    6. RSA algorithm
    7. Fundation of Modular Arithmetic
    8. RSA encryption and decryption
  11. 02/21: IDS [PDF]
  12. MAC and Hash Function (Started) [PDF]
    1. Linux hash functions
    2. Hash function
    3. MAC
    4. Difference between having integrity with
  13. MAC and Hash Function (Continiue ...)
    1. Mac security
    2. Collision resistance (Weak and Strong)
    3. Hash function applications
    4. Hash vs cryptography
    5. Birthday paradox attack
  14. Firewall: [PDF]
  15. Web Security [PDF]
Useful Resources

In this section you will introduce to so,e additional resources to read them when you have problem or challenges to discussion topics.

Network Security Essentials Applications and Standards (5th Edition)
William Stalling
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)
Edward Skoudis (Author), Tom Liston (Author)
CEH v9: Certified Ethical Hacker Version 9 Study Guide 3rd Edition
by Oriyano (Author)
Best Student of week

Your firstname and lastname - 1

- More Info -

firatname and lastname - 2

- More Info -

Q&A

Piazza question and answer: IT2