BN200 - Network Security Fundamentals

Credit Points: 15 credit points

Workload: 48 hours

Prerequisite: N/A

Co-requisite: N/A

Aims & Objectives

This is a third trimester core unit out of a total of 24 units in the Bachelor of Networking (BNet) and Bachelor of Engineering Technology (Telecommunications) BEngTech(Tel). This unit addresses the BNet and BEngTech(Tel) course learning outcomes and complements other courses in a related field by developing students’ knowledge and skills in network security. For further course information refer to: http://www.mit.edu.au/study-with-us/programs/bachelor-networking and http://www.mit.edu.au/study-with-us/programs/bachelor-engineering-technology-telecommunications. This unit is part of the AQF Level 7 (BNet and BEngTech(Tel)) courses.

This unit provides students with a comprehensive overview of the field of network security, security risks and countermeasures associated with network connectivity. Students will gain knowledge and skills to understand, apply and manage network security. There are some activities designed to protect network data that include protecting the usability, reliability, integrity, and safety of network and data. 

The unit will help students to identify common security vulnerabilities, threats and in depth analysis of these threats that network users often face. It will help students to respond to and recover from security incidents through exercises.

The content of this unit will cover the following areas:

  • Introduction to Network Security
  • Symmetric Encryption and Message Confidentiality
  • Public‐Key Cryptography and Message Authentication
  • Transport‐Level and IP Security
  • Intruders and Malicious Software

Learning Outcomes

4.1 Course Learning Outcomes
The Course learning outcomes applicable to this unit are listed on the Melbourne Institute of Technology’s website: www.mit.edu.au 

4.2 Unit Learning Outcomes
At the completion of this unit students should be able to:
a. Discuss the main security issues and emerging trends of information security;
b. Identify common emerging threats, attacks, mitigation and countermeasures in networked information systems;
c. Explain the major methodologies for secure networks and the threats they address;
d. Identify and report network threats, select and implement appropriate countermeasures for network security;
e. Use security policies to manage operational security, and then administer those policies to ensure compliance by users in an organization.

Weekly Topics

This unit will cover the content below:

Week # Lecture Topic Laboratory
1 Lecture 1 - Introduction to Security (CH-1) Laboratory 1 Creating Win8.1 VM in VBox
2 Lecture 2 - Malware & Social Engineering Attack (CH-2) Laboratory 2 Data Breaches & Malware Scanning
3 Lecture 3 - Application and Networking-Based Attacks (CH-3) Laboratory 3 Social Engineering Attack
4 Lecture 4 - Cryptography 1 (CH-5) Laboratory 4 Application and Networking Based Attacks PART - I
5 Lecture 5 - Cryptography 2 (CH-5,6) Laboratory 5
6 Lecture 6 - Cryptography 3 (CH-6) Laboratory 6 Basic Cryptography 1
7 Lecture 7 - Network Security Fundamentals (CH-7) Laboratory 7 Basic Cryptography 2, In-Class
8 Lecture 8 - Administering a Secure Network (CH-8) Laboratory 8 Advance Cryptography 1
9 Lecture 9 - Access Control Fundamentals (CH-11) Laboratory 9 Advance Cryptography 2
10 Lecture 10 - Vulnerability Assessment 1 (CH-15) Laboratory 10 Assignment 2 Early Feedback and Access Control Fundamental
11 Lecture 11 -Vulnerability Assessment 2 (CH-15) Laboratory 11 Assignment 2 Final Feedback and Access Control Fundamental
12 Review Review

Assessment

Assessment Task Due Date A B Learning Outcomes Assessed
Formative Assignment 1 Week 3 (8/04/2022) 5%   a
In-Class Test Week 7 (02/05/2022)   10% a-b
Assignment 2 Week 11 (31/05/2022) 30%   a-d
Laboratory participation & submissions Week 2 – 11 (7/06/2022) 10%   a-e
Final Examination (2 hours)     45% a-e
TOTALS   45% 55%  

Task Type: Type A: unsupervised, Type B: supervised.

Class Participation and Contribution
This unit has class participation and student contribution as an assessment. The assessment task and marking rubric will follow the Guidelines on Assessing Class Participation (https://www.mit.edu.au/about-us/governance/institute-rules-policies-and-plans/policies-procedures-and-guidelines/Guidelines_on_Assessing_Class_Participation). Further details will be provided in the assessment specification on the type of assessment tasks and the marking rubrics.

Presentations (if applicable)
For presentations conducted in class, students are required to wear business attire.

Textbook and Reference Materials

Text Book:

  • M. Ciampa, Security+ Guide to Network Security Fundamentals. 6th ed., Cengage, 2018.

References:

  • W. Stallings, Network Security Essentials: Applications and Standards. 5th ed., Prentice Hall, 2014.
  • M. Chapple and D. Seidl, CISSP Official (ISC) 2 Practice Test, 1st ed. Sybex, 2016.
  • J. M. Kizza, Guide to Computer Network Security (Computer Communications and Networks). 3rd ed.,  Springer, 2015.
  • R. E. Smith, Elementary Information Security.2nd ed., Jones and Bartlett Learning, 2015.
  • M. E. Whitman & H. J. Mattord, Principles of Information Security. Cengage Learning, 2014.

INTERNET REFERENCES:

Adopted Reference Style: IEEE

Students are required to purchase the prescribed texts and have them available each week in the class.

Graduate Attributes

MIT is committed to ensure the course is current, practical and relevant so that graduates are “work ready” and equipped for life-long learning. In order to accomplish this, the MIT Graduate Attributes identify the required knowledge, skills and attributes that prepare students for the industry.
The level to which Graduate Attributes covered in this unit are as follows:

Ability to communicate Independent and Lifelong Learning Ethics Analytical and Problem Solving Cultural and Global Awareness Team work Specialist knowledge of a field of study

Legend

Levels of attainment Extent covered
The attribute is covered by theory and practice, and addressed by assessed activities in which the students always play an active role, e.g. workshops, lab submissions, assignments, demonstrations, tests, examinations.
The attribute is covered by theory or practice, and addressed by assessed activities in which the students mostly play an active role, e.g. discussions, reading, intepreting documents, tests, examinations.
The attribute is discussed in theory or practice; it is addressed by assessed activities in which the students may play an active role, e.g. lectures and discussions, reading, interpretation, workshops, presentations.
The attribute is presented as a side issue in theory or practice; it is not specifically assessed, but it is addressed by activities such as lectures or tutorials.
The attribute is not considered, there is no theory or practice or activities associated with this attribute.