Page 1 of 1

Module Code - Title:

EE6042 - NETWORK AND HOST SECURITY

Year Last Offered:

2025/6

Hours Per Week:

Lecture

2

Lab

2

Tutorial

1

Other

0

Private

5

Credits

6

Grading Type:

N

Prerequisite Modules:

Rationale and Purpose of the Module:

Introduction to security attack and defence techniques. Students will be aware of the major attacks on information in computer networks and how to plan for the deployment of secure architectures and security management tools. The student will be able to advise on security criteria and vulnerabilities and will be able to design a secure operating network and analyse its vulnerabilities. Module added to the elective component of the Master of Engineering in Computer Engineering

Syllabus:

[Security Fundamentals] Basics of Host & Network Security: Threats, Vulnerabilities and Risk, Risk Assessment, Business Continuity and Disaster Recovery, Security Policies, Defence in Depth. [Firewalls] Packet Filters, Stateful Firewalls, Proxy Firewalls. DMZ Concept, Layout and Design. [Auditing and Intrusion Detection] Audit Trail Features, User Profiling, Intruder Profiling, Signature Analysis, Network IDS, Host IDS, Distributed IDS, Combining Firewalls and IDS [Wireless Security] Wireless Standards and Technologies: IEEE 802.11, WEP, Bluetooth, BlackBerry. Wireless Applications. Wireless Network Threats: Wireless Packet Sniffers, Transmission Alteration and Manipulation, Denial-of-Service Attacks [Designing Secure Networks] Host Hardening: Anti-Virus Software, Host-Centric Firewalls and IDS. Installing and Managing Firewalls and IDS. VPN Integration. Creating a Security Policy. [Assessing Network Security] Assessment Techniques, Maintaining a Security Perimeter: System and Network Monitoring, Incident Response, Accommodating Change. Network Log Analysis, Troubleshooting Defence Components, Importance of Defence in Depth. Design under Fire: The Hacker Approach to Attacking Networks

Learning Outcomes:

Cognitive (Knowledge, Understanding, Application, Analysis, Evaluation, Synthesis)

On successful completion of this module, students will be able to: Evaluate the security risks of a host and/or network Explain the principle of Defense-in-Depth Design a secure operating nework and analyse its vulnerabilities Demonstrate an understanding the importance of auditing and intrusion detection Analyse additional security threats introduced by wireless systems Perform basic penetration testing on a given network

Affective (Attitudes and Values)

None

Psychomotor (Physical Skills)

None

How the Module will be Taught and what will be the Learning Experiences of the Students:

Lectures/Labs

Research Findings Incorporated in to the Syllabus (If Relevant):

Prime Texts:

Stephen Northcutt, Lenny Zeltser, Scott Winters, Karen Kent, Ronald W. Ritchey (2005) Inside Network Perimeter Security , New Riders Publishing
William Stallings (2018) Effective Cybersecurity : A Guide to Using Best Practices and Standards , Addison-Wesley

Other Relevant Texts:

Jack Wiles, Terry Gudaitis, Jennifer Jabbush, Russ Rogers, Sean Lowther (2012) Low Tech Hacking - Street Smarts for Security Professionals , Elsevier
Christopher Hadnagy (2018) Social Engineering: The Science of Human Hacking, 2nd Edition , Wiley
The Art of Service (2020) Firewall A Complete Guide , Firewall Publishing

Programme(s) in which this Module is Offered:

MECOENTFA - COMPUTER ENGINEERING
MECCSYTFA - COMPUTER AND COMMUNICATIONS SYSTEMS

Semester(s) Module is Offered:

Spring

Module Leader:

Reiner.Dojen@ul.ie