Network Security
Objectives
- Understand the problem of network security as a transversal requirement to all levels of the TCP/IP protocol stack.
- Explain the vulnerabilities of main applicational services and protocols, transport and network protocols, and corresponding security solutions.
- Explain the vulnerabilities of main wireless and mobile technologies, and corresponding security solutions.
- Identify the types of security attacks stemming from vulnerabilities of TCP/IP protocol stack.
- Explore network operational security using tools for protocol analysis.
- Apply secure protocol solutions in support of network applications and services from an end-to-end perspective.
Program
- Introduction to security in TCP/IP Networks
- Identification and classification of vulnerabilities
- Models and types of attacks
- Security of application services and protocols (HTTPS, email, DNS, BGP)
- End-to-end data transport security: TLS/TCP, QUIC/UDP protocols
- Network-level security: IPv4 vs IPv6, IPSec, VPNs
- Security in wireless and mobile networks
- Network operational security: protocol analysis
Bibliography
- W. Stallings. Cryptography and Network Security: Principles and Practice. 8th Edition, Pearson, 2022.
- J. Kurose, K. Ross. Computer Networking: A Top-Down Approach. 8th Edition, Pearson, 2021.
- W. Stallings, L. Brown. Computer Security Principles and Practice. 5th Edition, Pearson, 2023.
- K. Sriram, D. Montgomery. Resilient Interdomain Traffic Exchange: BGP Security and DDoS Mitigation. NIST Special Publication (NIST SP), 2019. [online] https://doi.org/10.6028/NIST.SP.800-189
- S. Rose et al. Trustworthy Email. NIST Special Publication (NIST SP), 2019, [online], https://doi.org/10.6028/NIST.SP.800-177r1
- E. Barker et al. Guide to IPsec VPNs. NIST Special Publication (NIST SP), 2020, [online], https://doi.org/10.6028/NIST.SP.800-77r1