Spring 2009 |
Clay Shields |
Network SecurityThursday4:15 - 6:45 St. Mary's, Room 324
|
Course Information
InstructorClay Shields, contact information here.
PoliciesThis class, like all my classes, are subject to my course policies. Students are expected to understand these policies. If you have any questions, ask ahead of time.Grading
TextsThere is no required text for this class. Instead, readings will be posted online, on the readings web page.Some of these readings are book chapters that are available on the web through the Library at the http://library.georgetown.edu/, select the Databases tab, then select Computer Science from the list and scroll down. There are also two books that are available for free online, which are excellent and which will be using chapters from. They are: Handbook of Applied Cryptography
DescriptionA look at network protocols and devices with an eye towards how they are designed and how they function, what security problems have been discovered in the past, what problems may still be lurking, and the design of secure systems. This course is intended for graduate students who wish to understand network security well enough to conduct research in the area. Topics include: overview of network protocols and devices; overview of cryptography; security threats in networks; known problems in TCP/IP; authentication protocols and formal methods for analyzing protocols; key management and use; anonymity; attack traceback; intrusion detection; SSL and attacks against it; routing security for unicast and multicast routing; DNS security; wireless security; network malware; denial of service. |