Computer and Network Security
University of the South Pacific
Area of Study
Taught In English
CS310: Computer Networks
Course Level Recommendations
ISA offers course level recommendations in an effort to facilitate the determination of course levels by credential evaluators.We advice each institution to have their own credentials evaluator make the final decision regrading course levels.
Credits3 - 4
Recommended U.S. Semester Credits3 - 4
Recommended U.S. Quarter Units4 - 6
Hours & Credits
OverviewThis course provides an introduction to computer security. This course begins with a tutorial of the basic elements of cryptography, cryptanalysis and systems security. Topics include network security, authentication, security protocols design and analysis, trusted computing, key management, intrusion detection, DDOS detection and mitigation, security policy, biometrics, web security and other emerging topics.TopicsThis course provides an introduction to computer security. Students successfully completed this class will be able to evaluate works in academic and commercial security, and will have rudimentary skills in security research. The course begins with a tutorial of the basic elements of cryptography, cryptanalysis, and systems security. Topics will include network security, authentication, security protocol design and analysis, trusted computing, key management, intrusion detection, DDOS detection and mitigation, security policy, group systems, biometrics, web security, privacy and other emerging topics.Course ContentThe main topics are:Introduction- Security definition, Attacks, Risk, Threats and Vulnerabilities- Security models and Policy- Privacy issuesTraditional and Modern Cryptography- Cryptography and Cryptanalysis- Symmetric and Asymmetric Cryptographic algorithms (DES, AES, CBC, RC4, RSA)Security Fundamentals and Theory- Message Integrity & Authentication (MAC)- Entity Authentication ? challenge response, zero- knowledge, biometrics- Cryptographic hash functions (SHA)- Digital Signature- Key management ? KDC, Kerberos, Diffie Hellman algorithm, PKI- Security protocolsNetwork Security- Application layer security ? Email security (PGP)- Transport Layer security (SSL/TLS)- Network Layer Security (IPSec), Firewall, IDS- Program Security - Viruses, Trojan, worms, buffer overflowLearning Outcomes- Relate to the ethical issues and fundamental aspects of computer and network security in the modern society.- Evaluate the strengths and weaknesses of various cryptographic algorithms.- Implement message confidentiality, integrity and authentication.- Recommend security policies and mechanisms to counter threats (resulting from vulnerabilities in real life systems).TextbooksForouzan B. A. (2008), Cryptography and Network Security, McGraw Hill, New York.(ISBN: 978-0-07-287022-0)AssessmentMid Semester Test: 15%Assignments: 30%Tutorial and Lab Participation: 5%Final Exam: 50%
Courses and course hours of instruction are subject to change.
Eligibility for courses may be subject to a placement exam and/or pre-requisites.
Some courses may require additional fees.
Credits earned vary according to the policies of the students' home institutions. According to ISA policy and possible visa requirements, students must maintain full-time enrollment status, as determined by their home institutions, for the duration of the program.
Please reference fall and spring course lists as not all courses are taught during both semesters.
Availability of courses is based on enrollment numbers. All students should seek pre-approval for alternate courses in the event of last minute class cancellations
Please note that some courses with locals have recommended prerequisite courses. It is the student's responsibility to consult any recommended prerequisites prior to enrolling in their course.