Page 1 of 1

Module Code - Title:

ET4028 - HOST AND NETWORK SECURITY

Year Last Offered:

2025/6

Hours Per Week:

Lecture

2

Lab

2

Tutorial

1

Other

0

Private

0

Credits

6

Grading Type:

Prerequisite Modules:

Rationale and Purpose of the Module:

Gain an in-depth knowledge of host and network security. Assess the security of a network. Recommend and implement measures to prevent security threats. Research and develop security audits. Conversant in current trends and methodologies.

Syllabus:

[Security Fundamentals] Basics of host and network security: threats, vulnerabilities and risk, risk assessment, business continuity and disaster recovery, security policies, defence in depth. [Firewalls] Packet filters, stateful firewalls, proxy firewalls. DMZ concept, layout and design. [Auditing and Intrusion Detection] Audit trail features, user profiling, intruder profiling, signature analysis, network IDS, host IDS, distributed IDS, combining firewalls and IDS. [Wireless Security] Wireless standards and technologies: IEEE 802.11, WEP Bluetooth, BlackBerry, wireless applications. Wireless network threats: wireless packet sniffers, transmission alteration and manipulation, denial-of-service attacks. [Designing Secure Networks] Host hardening: anti-virus software, host-centric firewalls and IDS. Installing and managing firewalls and IDS. VPN integration. Creating a security policy. [Assessing Network Security] Assessment techniques, maintaining a security perimeter: system and network monitoring, incident response, accommodating change. Network log analysis, troubleshooting defence components, importance of defence in depth. Design under fire: the hacker approach to attacking networks.

Learning Outcomes:

Cognitive (Knowledge, Understanding, Application, Analysis, Evaluation, Synthesis)

Evaluate the security risks of a host and/or network. Explain the principle of defence-in-depth. Design a secure operating network and analyse its vulnerabilities. Understand the importance of auditing and intrusion detection. Analyse additional security threats introduced by wireless systems. Perform basic penetration testing on a given network.

Affective (Attitudes and Values)

N/A

Psychomotor (Physical Skills)

N/A

How the Module will be Taught and what will be the Learning Experiences of the Students:

Research Findings Incorporated in to the Syllabus (If Relevant):

Prime Texts:

Northcutt Stephen, Zeltser Lenny, Winters Scott, Kent Karen and Ritchey Roland W (2005) Inside Network Perimeter Security (2e) , New Riders Publishing
Kenyon Tony (2007) Implementing Network Security: Effective Strategies for the Enterprice , Elsevier
Qian Yi, Tipper David, Krishnamurthy Prashant and Joshi James (2007) Information Assureance: Dependability and Security in Networked Systems , Morgan Kaufmann Publishers

Other Relevant Texts:

Vines, Russel Dean (2002) Wireless Security Essentrials - Defending Mobile Systems from Data Piracy , Wiley
Amon Cherie, Shinder Thomas W and Carasik-Henmi Anne (2003) Best Damn Firewall Book Period , Syngress Publishing
Greene Thomas C (2004) Computer Security for the Home and Small Office , Apress
Archibald Neil, Ramirez Gilbert, Rathaus Noam and Burke Josh (2005) Nessus, Snort and Ethereal Power Tools: Customising Open Source Security Applications , Syngress

Programme(s) in which this Module is Offered:

Semester(s) Module is Offered:

Module Leader:

Reiner.Dojen@ul.ie