You are on page 1of 5

SULTAN QABOOS UNIVERSITY

COURSE OUTLINE

PROGRAM: B.Sc. in Computer Science

1. Course Code COMP5507


2. Course Title Cryptography and Network Security
3. Credits 3
4. Pre-requisite Course(s) COMP4502 (Computer Networks) or Equivalent
5. Co-requisite Course(s) -
6. Equivalent Course(s) -
7. Incompatible Course(s) -
8. Course Category ☐ University Requirement ☐ University Elective
☐ College Requirement ☐ College Elective
☐ Department Requirement ☒ Department Elective
☐ Specialization Requirement ☐ Specialization Elective
☐ Other (specify):
9. Course Owner College: Science Department: Computer Science
10. Course Type ☐ Lecture ☐ Lecture/Lab
☐ Lecture/Seminar ☐ Lecture/Studio
☒ Lecture/Tutorial ☐ Lecture/Lab/Tutorial or Seminar
☐ Tutorial ☐ Laboratory (Practical)
☐ Field or Work Placement ☐ Studio
☐ Seminar ☐ Internship
☐ Workshop ☐ Project
11. Language of Instruction English
12. Course Description

This course focuses on the essentials of Network Security. Topics include Security Models and requirements,
Symmetric Key and message confidentiality, Public Key Cryptography and Message Authentication, Key
Managements, Electronic Mail Security (PGP), IP Security, Web and e-commerce Security, Firewalls, and
Malicious Software.

13. Teaching/Learning Strategies


All course materials are posted in Moodle.
14. Assessment Components and Weight [%]
☐ Quizzes ☐ Practical ☐ Other (specify):
☒ Homework assignments 21% ☒ Project 14%
☒ In-term examination(s) 25% ☒ Final examination 40%
15. Grading Method
A-F Scale
16. Textbook(s) and Supplemental Material
Cryptography and Network Security," Third Edition by William Stallings, Prentice-Hall, Third Edition.

Page | 1
References:
1. Pfleeger, Security in Computing, 4 Ed.,Prentice-Hall, Englewood Cliffs, NJ,.
2. Kaufman, Perlman & Speciner, Network Security,

17. Matching Course Objectives with Program Outcomes and SQU Graduate Attributes
SQU Graduate Attributes
A. SQU graduates should be able to: B. SQU graduates possess C. SQU graduates should
1. apply the knowledge and skills 1. interpersonal communication skills and relish good citizenship
relevant to the specialization alignment with culture of international qualities, be conscious of
2. communicate effectively and use labour market to assist them in practical their national identity
information and communication life and in living successfully skills and and be socially
technologies 2. motivation for independent learning and responsible, engage in
3. critically analyze complex community affairs and
engagement in lifelong learning and
information and present it in simple be mindful of
research work ethics and positive values,
clear manner 3. contemporary issues.
and intellectual independence and
4. autonomy teamwork skills and display
potential leadership qualities

# Intended Student Learning Outcome Relevant Program Outcome(s) Applicable


/Course Learning Objective Attribute(s)

Explain common attacks against network assets, the SO1 A1


1. associated threats and vulnerabilities, and what
network security do to secure assets
Explain how to use cryptography to help protect SO1 A1
2. information and how to choose an appropriate
encryption method for an organization
Discuss the concept of symmetric key encryption SO1 A1
3.

Discuss the concept of private key encryption and SO1 A1


4. key distribution mechanisms

Understand Message Authentication techniques SO1 A1


5.

Explain the network IP security protocol and its SO1 A1


6.
advantages
Implement security-enhanced computing baselines SO3 A1, A2
7.
in an organization
Understand the Web Security protocols SSL and SO1 A1
8.
TLS.
Discuss the principle of firewall, their configuration SO1 A1
9.
and access control.
Distinguish between different malicious software SO1 A1
10.
and their different countermeasures

Page | 2
16. Student Responsibilities

It is the student’s responsibility to know and comply with all University Academic Regulations relevant to participation in
this course. These regulations specifically include attendance requirement and students` academic code of conduct.
For attendance, it is the student’s responsibility to be punctual and to attend all classes.
Students are expected to perform their work with honesty and avoid any academic misconduct, which is defined as the use
of any dishonest or deceitful means to gain some academic advantage or benefit. This can take many forms, including but
not limited to, the following: copying, plagiarism, collusion and forging documents. For full details, please refer to the
Undergraduate Academic Regulations and to the Student Academic Misconduct Policy.
Additionally, this course requires that you:
1. Late submission of assignments faces a penalty of 20% per day
2. Students involved in copying will be severely penalized. Term Paper is going to be checked for originality by
using Turnitin.
3. A zero mark will be assigned the first time a student is caught involved in copying and his/her name will be added to a
watch list maintained by the Head of Department. Further repeated involvement in copying will cause the student to get an
F grade in that course. This is in line with the university academic regulations (see pages 36-37 of the 2005 edition of the
university academic regulations booklet)
Item Date In Due Date Weights
Homework 1 (W3) SUN (W5) TUE 7%
Homework 2 (W5) SUN (W7) TUE 7%
Midterm Exam (W9) TUE 25%
Homework 3 (W10) SUN (W12) TUE 7%
Project/Term paper
(Report & presentation) (W7) (W15) 14%
Final Exam 16/05/2020 15:00-18:00 40%

List of program Student Outcomes (SOs):

SO1: Analyze a complex computing problem and apply principles of computing and other relevant disciplines to identify
possible solutions.
SO2: Design a computing-based solution to meet a given set of requirements.
SO3: Implement a computing based solution for a given design.
SO4: Evaluate a computing-based solution against a given set of computing requirements.
SO5: Communicate effectively orally and in writing in a variety of professional contexts.
SO6: Recognize professional responsibilities and understand legal and ethical principles.
SO7: Make informed judgments in computing practice based on legal and ethical principles.
SO8: Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
SO9: Apply computer science theory and software development fundamentals to produce computing-based solutions.

Page | 3
COURSE INFORMATION
Course Code COMP5507 Course Title Cryptography and Network Security
Semester/ Year Spring 2019 Section(s) 10/11
Day, Time, and Place SUN, 12:00–13:50, D18
TUES, 12:00–13:50, LAB19A

Course Coordinator Dr. Abderezak Touzene

Office Location ROOM 14 Office Hours Mon. 12:00-13:00, Wed 12:00-13:00


Office Tel. Ext. 2221 Email touzene@squ.edu.om

Tentative Schedule

Week Lecture # Topic/Material to be covered Assessment


1 Introduction OSI Security Architecture HW1,Midterm
Network Security Models , Security services and type of attacks Exam, Final
Exam
2 Network Protocols Network Protocols Vulnerability: Known vulnerabilities. Security attacks HW1,Midterm
Vulnerability and countermeasures at each layers Exam, Final
Exam

3 Network Protocols Network Protocols Vulnerability: continue HW1,Midterm


Vulnerability Exam, Final
Exam
4 Cryptography Cryptography: Symmetric Key, Basic Terminology, Cryptanalysis, HW1,Midterm
Symmetric Block Encryption. Exam, Final
Exam
5 Cryptography Stream Cipher: RC4, Cipher Block chain HW2,Midterm
Exam, Final
Exam
6 Confidentiality using Confidentiality using Symmetric HW2,Midterm
Symmetric Encryption: Placement of Encryption, Encryption vs Protocol Level, Exam, Final
Encryption Traffic Analysis, Key Distribution Exam
7 Public Key Public Key Cryptography and Message Authentication: Message HW2,Midterm
Cryptography Authentication Approaches, Secure Hash Function Exam, Final
Exam
8 Public Key Public Key Cryptography and Message Authentication: Public Key HW2,Midterm
Cryptography Cryptography, Digital Signature, Key Management Exam, Final
Exam
9 Electronic Mail Electronic Mail Security: Pretty Good Security (PGP) HW3, Final
Security Exam

10 IPSEC IP Security: Overview, IP sec Architecture, AH, ESP HW3, Final


Exam

11 IPSEC IP Sec continue: Combine Security association HW3, Final


Exam

12 Web Security SSH AND Web Security: Web security requirements, Secure Socket Layer HW3, Final
(SSL), Transport Layer Security (TLS) Exam

Page | 4
13 Firewall Firewalls: Introduction, Configuration, Access Control, Personal firewall Final Exam

14 Malicious Software Intruders and Malicious Software: IDS, Virus and threats, Virus Final Exam
countermeasures
15 Term Paper Presentations Term Paper

Page | 5

You might also like