[an error occurred while processing this directive] [an error occurred while processing this directive]
[an error occurred while processing this directive]
[an error occurred while processing this directive]

Previous Student Evaluations of this unit

If you wish to view how previous students rated this unit, please go to
https://emuapps.monash.edu.au/unitevaluations/index.jsp

Required Resources

Linux OS


Unit Schedule

Week Date* Activities Assessment
0 21/02/11   No formal assessment or activities are undertaken in week 0
1 28/02/11 Introduction to computer system security  
2 07/03/11 Information and Network Security  
3 14/03/11 Cryptography for Information and Network Security (2 lectures: 3 & 4)  
4 21/03/11 Cryptography for Information and Network Security (con't)  
5 28/03/11 Introduction to Firewalls  
6 04/04/11 Security at the IP level : IPSec design and implementation  
7 11/04/11 Security at the Transport Layer: SSL and TLS design and implementation  
8 18/04/11 Security at the Application Layer: Email security and Web security assignment 1 due on Fri 4PM
Mid semester break
9 02/05/11 Introduction to Authentication Systems  
10 09/05/11 Introduction to Wireless Security  
11 16/05/11 Introduction to Large System Security  
12 23/05/11 Informal test Assignments 2 &3 due on Fri 4PM
  30/05/11 SWOT VAC No formal assessment is undertaken SWOT VAC

*Please note that these dates may only apply to Australian campuses of Monash University. Off-shore students need to check the dates with their unit leader.

Assessment Policy

To pass a unit which includes an examination as part of the assessment a student must obtain:

  • 40% or more in the unit's examination, and
  • 40% or more in the unit's total non-examination assessment, and
  • an overall unit mark of 50% or more.

If a student does not achieve 40% or more in the unit examination or the unit non-examination total assessment, and the total mark for the unit is greater than 50% then a mark of no greater than 49-N will be recorded for the unit

Assessment Tasks

Participation

IMPORTANT: You must read the assignment specs carefully and follow the instructions. The unit guide can only provide you general information.

  • Assessment task 1
    Title:
    Secure your computer system with private key, public key, hash functions and digital certificates
    Description:
    You are required to learn the GPG/PGP package and implement a security policy to protect your network communications, stored data, and secure email messages and documents.

    You will need to be able to answer the following questions:

    1. How to generate private and public keys

    2. How to protect your private key and public key

    3. How to protect public keys from tampering

    4. How to secure messages exchanged between you and your friends

    5. How RSA was practically implemented in the package

    6. How secure RSA is in practice
    Weighting:
    30%
    Criteria for assessment:

    You need to be able to understand the theory and demonstrate your practical work to your tutor. If you fail to understand what you have done you will get Zero for the assignment.

    If you can demonstrate your practical work but do not completely understand the theory, you will get a Pass at the maximum.

    If you can demonstrate your practical work but understand 25% of the theory, you will get a Credit as the maximum. 

    If you can demonstrate your practical work and understand 50% of the theory, you will get a Distinction as the maximum. 

    If you can demonstrate your practical work and understand the theory well, you will get a High Distinction. 

    Due date:
    Friday 22 April 2011
  • Assessment task 2
    Title:
    Set up and configure firewalls
    Description:
    Your group is required to set up, configure, and test your firewall using IPTABLES. You need to do the research and readings to be able to complete this assignment.

    Check your system services such as Web service, email service, ftp service, telnet, and ssh service to make sure they are installed and run.

    Then configure your firewall to:

    1. reject all ftp packets from external networks, but still allow internal ftp.

    2. allow ssh remote connections but deny telnet.

    3. deny ping.

    4. reject all traffic coming to port 21 and 80.

    5. reject all traffic coming to all UDP ports

    6. block all email coming in and out of your network. Internal email is allowed.

    7. block all traffic from two particular networks. You can pick any two networks you like and.

    8. allow traffic coming to port 80 but reject traffic coming out through port 80.

    Describe in detail how you test 1,2,3,4,5,6,7 with real practical tests and/or with your gathered information from reliable sources.

    Discuss the advantages and disadvantages of firewalls with iptables.
    Weighting:
    25 %
    Criteria for assessment:

    You need to be able to understand the theory and demonstrate your practical work to your tutor. If you fail to understand what you have done you will get Zero for the assignment.

    If you can demonstrate your practical work but do not completely understand the theory, you will get a Pass at the maximum.

    If you can demonstrate your practical work but understand 25% of the theory, you will get a Credit as the maximum. 

    If you can demonstrate your practical work and understand 50% of the theory, you will get a Distinction as the maximum. 

    If you can demonstrate your practical work and understand the theory well, you will get a High Distinction. 

    Due date:
    Friday 27 May 2011
  • Assessment task 3
    Title:
    Write a security policy for a medium or large computer network and propose an implementation to secure the network
    Description:
    You are required to study a reference computer network (e.g Monash computer network) in detail, write a security policy to protect the network which includes hardware, software, data and users.

    The security policy will be for both wired and wired networks.

    Propose a practical implementation to secure the whole network.
    Weighting:
    25%
    Criteria for assessment:

    The assessment of this assignment is based on:

    1. A complete study of a reference computer network
    2. Good security policy
    3. Practical implementation

    If you do 1. and understand it, you will get a Pass as the maximum.

    If you do 1. and 2. and understand them you will get a Credit as the maximum

    If you do 1. and 2. and 3. and understand them you will get a Distinction as the maximum

    If you do 1. and 2. and 3. and understand them and provide good references you will get a High Distinction

    Due date:
    Friday 27 May 2011

Examinations

Assignment submission

Assignment coversheets are available via "Student Forms" on the Faculty website: http://www.infotech.monash.edu.au/resources/student/forms/
You MUST submit a completed coversheet with all assignments, ensuring that the plagiarism declaration section is signed.

Extensions and penalties

Returning assignments

Policies

Monash has educational policies, procedures and guidelines, which are designed to ensure that staff and students are aware of the University's academic standards, and to provide advice on how they might uphold them. You can find Monash's Education Policies at:
http://policy.monash.edu.au/policy-bank/academic/education/index.html

Key educational policies include:

Student services

The University provides many different kinds of support services for you. Contact your tutor if you need advice and see the range of services available at www.monash.edu.au/students The Monash University Library provides a range of services and resources that enable you to save time and be more effective in your learning and research. Go to http://www.lib.monash.edu.au or the library tab in my.monash portal for more information. Students who have a disability or medical condition are welcome to contact the Disability Liaison Unit to discuss academic support services. Disability Liaison Officers (DLOs) visit all Victorian campuses on a regular basis

Reading List

  • Charlie Kaufman, Radia Perlman and Mike Speciner, Network Security - Private Communication in a Public World, 2nd Edition, Prentice Hall, 2002. ISBN 0-13-046019-2.
  • William Stallings, Cryptography and Network Security: Principles and Practices, Prentice-Hall, 2000. ISBN 0-13-016093-8.
  • Robert L. Ziegler, Linux Firewalls, New Riders, ASIN: 0735709009.
  • Greg Holden, Guide to Network Defense and Counter Measures, Thomson, ISBN: 0-619-13124-1.
  • Practical Unix Security, O'Reilly & Associate, Inc, Simson Garfinkle and Gene Spafford, ISBN: 0-937175-72-2.
  • Jack Kozoil, Intrusion Detection with Snort, SAMS, 157870281x.
  • Stephen Nortcutt, Network Intrusion Detection System: A analyst?s Handbook, Que, ASIN: 0735708681.
  • Adam Engst and Glenn Fleishman, The wireless Networking Starter Kit, Peachpit Press, ISBN: 0321174089.
  • Cyrus Peikari, Seth Fogie, Maximum Wireless Security, SAMS, ISBN: 0672324881.
[an error occurred while processing this directive]