Module Code - Title:
EE6042
-
NETWORK AND HOST SECURITY
Year Last Offered:
2025/6
Hours Per Week:
Grading Type:
N
Prerequisite Modules:
Rationale and Purpose of the Module:
Introduction to security attack and defence techniques. Students will be aware of the major attacks on information in computer networks and how to plan for the deployment of secure architectures and security management tools. The student will be able to advise on security criteria and vulnerabilities and will be able to design a secure operating network and analyse its vulnerabilities.
Module added to the elective component of the Master of Engineering in Computer Engineering
Syllabus:
[Security Fundamentals] Basics of Host & Network Security: Threats, Vulnerabilities and Risk, Risk Assessment, Business Continuity and Disaster Recovery, Security Policies, Defence in Depth.
[Firewalls] Packet Filters, Stateful Firewalls, Proxy Firewalls. DMZ Concept, Layout and Design.
[Auditing and Intrusion Detection] Audit Trail Features, User Profiling, Intruder Profiling, Signature Analysis, Network IDS, Host IDS, Distributed IDS, Combining Firewalls and IDS
[Wireless Security] Wireless Standards and Technologies: IEEE 802.11, WEP, Bluetooth, BlackBerry. Wireless Applications. Wireless Network Threats: Wireless Packet Sniffers, Transmission Alteration and Manipulation, Denial-of-Service Attacks
[Designing Secure Networks] Host Hardening: Anti-Virus Software, Host-Centric Firewalls and IDS. Installing and Managing Firewalls and IDS. VPN Integration. Creating a Security Policy.
[Assessing Network Security] Assessment Techniques, Maintaining a Security Perimeter: System and Network Monitoring, Incident Response, Accommodating Change. Network Log Analysis, Troubleshooting Defence Components, Importance of Defence in Depth. Design under Fire: The Hacker Approach to Attacking Networks
Learning Outcomes:
Cognitive (Knowledge, Understanding, Application, Analysis, Evaluation, Synthesis)
On successful completion of this module, students will be able to:
Evaluate the security risks of a host and/or network
Explain the principle of Defense-in-Depth
Design a secure operating nework and analyse its vulnerabilities
Demonstrate an understanding the importance of auditing and intrusion detection
Analyse additional security threats introduced by wireless systems
Perform basic penetration testing on a given network
Affective (Attitudes and Values)
None
Psychomotor (Physical Skills)
None
How the Module will be Taught and what will be the Learning Experiences of the Students:
Lectures/Labs
Research Findings Incorporated in to the Syllabus (If Relevant):
Prime Texts:
Stephen Northcutt, Lenny Zeltser, Scott Winters, Karen Kent, Ronald W. Ritchey (2005)
Inside Network Perimeter Security
, New Riders Publishing
William Stallings (2018)
Effective Cybersecurity : A Guide to Using Best Practices and Standards
, Addison-Wesley
Other Relevant Texts:
Jack Wiles, Terry Gudaitis, Jennifer Jabbush, Russ Rogers, Sean Lowther (2012)
Low Tech Hacking - Street Smarts for Security Professionals
, Elsevier
Christopher Hadnagy (2018)
Social Engineering: The Science of Human Hacking, 2nd Edition
, Wiley
The Art of Service (2020)
Firewall A Complete Guide
, Firewall Publishing
Programme(s) in which this Module is Offered:
MECOENTFA - COMPUTER ENGINEERING
MECCSYTFA - COMPUTER AND COMMUNICATIONS SYSTEMS
Semester(s) Module is Offered:
Spring
Module Leader:
Reiner.Dojen@ul.ie