Dr. Bradley Reaves
CSC 574 Computer and Network Security
3 Credit Hours
(also offered as ECE 574)
This course provides a graduate-level introduction to computer and network security and privacy. Students successfully completing this class will be able to evaluate works in academic and commercial security, and will have rudimentary skills in security research. The course covers four key topic areas: basics of cryptography and crypto protocols, network security, systems security, and privacy. Readings primarily come from seminal papers in the field.
Formal: [CSC 316 or ECE309] and [CSC 401 or ECE407 or CSC/ECE 573] or equivalent
Informal: The course assumes students have the equivalent of a comprehensive computer science or engineering bachelor’s degree that covered operating systems, networks, discrete mathematics, and programming in multiple languages. Students without prior classes on these topics have done well after increased individual study.
By the end of this course, students will be able to:
- Explain concepts related to applied cryptography, including plaintext, ciphertext, symmetric cryptography, asymmetric cryptography, digital signatures.
- Outline the requirements and mechanisms for identification and authentication of users and computer systems, including authentication protocols and key management. Identify the possible threats to each mechanism and ways to protect against these threats.
- Explain concepts related to access control and operating system security, including access control matrices, protection, reference monitors, least privilege, discretionary access control, mandatory access control, multi-level security, role-based access control, and capabilities.
- Explain common network and Web vulnerabilities and attacks, defense mechanisms against these attacks, and cryptographic protection mechanisms.
- Describe the methods and motivation of Internet malware, and explain existing defense mechanisms and their limitations.
EXAMINATIONS: 2 exams
PROJECTS: There are two project tracks (student selects):
- Mini-Project Track (individual): The Mini-Projects track provides a series of smaller projects that relate more directly to the course material. There is one project for each major topic focus of the course. The projects require a range of programming as well as open-ended investigation.
- Research Project Track (individual or groups of 2): The research project requires that students execute novel research in systems and network security or privacy. By completing the research project, students will learn to think critically about security problems and solutions. Projects may or may not require programming. The topic is chosen by the student, subject to instructor approval.
Network Security: Private Communications in a Public World, 3rd edition
Charlie KaufmanMike SpecinerRadia Perlman Sun Microsystems, Inc.Ray Perlner
Published by Addison-Wesley Professional (September 15th 2022) – Copyright © 2023
eTextbook: ISBN-13: 9780137569014
Print (Hardcover): ISBN-13: 9780136643609
Here are some useful online books that provide additional information:
- Paul C. Van Oorschot. Computer Security and the Internet: Tools and Jewels. Springer
- Ross Anderson. Security Engineering, 2nd Edition. Wiley. April 2008.
- Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press. October 1996.
We will also have some readings from the following textbook, which is available from the NCSU Library.
- Charlie Kaufman, Radia Perlman, and Mike Speciner. Network Security: Private Communication in a Public World, 2nd edition. Prentice Hall. 2002.
Computer and Software Requirements
Please review minimum computer specifications recommended by NC State University and Engineering Online.
SOFTWARE REQUIREMENTS: some programming required, platform and language dependent on project choice.