Management and Network Security

Cource Code: Ν2-6030Γ
Weekly Duty: 4 (2Th + 2L)
ECTS: 5
Typical Semester: 6th
Course Category: General Infrastructure Course
Prerequisites:  

Learning Outcomes

The course “Management and Network Security” is a key lesson in Networking, one of the three branches of studies in the department of Informatics, enhancing the students’ knowledge of the management and security of wired and wireless networks.

The network management part of the course covers the five general areas of network management as defined by the International Organization for Standardization (ISO): configuration management, error management, performance management, safety management and accounting management.

Whereas the network security part of the course covers the implementation of security at all layers of the TCP/IP model, so that the student will have an overall concept of secure communications on the Internet. Furthermore, students will be made aware of security holes in network devices and be able to discover vulnerabilities in network applications such as email, web applications etc.

The aim of the course is to sensitize the student to the risks faced by a company or organization and equip him/her with the tools to protect information from any damage, corruption, destruction or the unauthorized use of network resources. Moreover, students will acquire the knowledge needed for the efficient and safe management of a network so it is able to resist against accidental or malicious actions that try to compromise the availability, authentication, integrity and confidentiality of transmitted data and related online network services.

Upon successful completion of this course the student will:

  • Have an understanding of security holes of each TCP/IP layer and be aware of threats that menace network devices and network applications.
  • Have knowledge of tools and techniques to identify security holes in network devices and applications, be able to monitor the smooth and normal networks operation and to interpret problems and errors due to inadequate configuration of the security of the devices and insufficient protection of information processed by the network applications.
  • Be able to apply his/her knowledge in order to protect the devices from malicious spyware actions and protect the alteration, destruction and theft of information.
  • Be able to analyze and design secure networks at all levels of operation, from the physical layer to network applications layer (web applications, e-commerce applications, etc.)
  • In the case of design and development of new network applications be able to propose basic security and data transmission rules that must be included in the writing applications, especially when modern tools are used for the rapid development of applications.
  • Be able to evaluate the secure operation of networks, identify security gaps in the access and transmission of information by remote users and support preventive policies against data integrity, corruption or theft.

Course Content
  1. Network Management Areas (according to international standards ISO).
  2. Description of network management software components (protocols):
    • Structure of Management Information (SMI).
    • Management Information Base (MIB).
    • Management of data preparation Language ASN.1 (Abstract Syntax Notation One Language)
    • Simple Network Management Protocol (SNMP).
  3. Network Security targets (confidentiality, integrity, availability) and related attacks.
  4. Network Security Protocols
    • Key establishment protocols
    • Authentication protocols
    • Confidentiality protocols
    • Data integrity protocols
  5. Safety of the TCP/IP multi-level architecture:
    • Security in Physical layer (FHSS, DSSS).
    • Security in Network Access ayer (EAP, EAPoL, EAP-TLS)
    • Security in Internet layer (IPsec VPNs)
    • Security in Transport layer (SSL / TLS)
    • Security Application layer (email, Web, etc.)
  6. Security in wireless networks (WLANs):
    • Authentication, confidentiality, integrity in 802.11 standard.
    • Security gaps in 802.11 security
    • Keys establishment, authentication, confidentiality, integrity in WEP, WPA, WPA2 (802.11i & 802.1X) security protocols
  7. Security in Ad-Hoc Networks (MANETs)
    • Keys establishment & authentication, confidentiality, integrity
    • Bluetooth network (master-slave operation modes, keys establishment, authentication, confidentiality, integrity).
  8. Firewalls and Access Control Lists (ACLs):
    • Firewalls
    • Control of transmitted information between network devices and computers.

Literature
  1. W.Stallings, Cryptography and Network Security, Principles and Practices, Pearson International Edition, 2011.
  2. B.Forouzan-F. Mosharraf, Computer Networks: A Top Down Approach, Mc Graw Hill, 2012.
  3. B.Forouzan, Cryptography and Network Security, Mc Graw Hill, 2008.

Internationalisation I18n