Network Security

Objectives

  • Understand the problem of network security as a transversal requirement to all levels of the TCP/IP protocol stack.
  • Explain the vulnerabilities of main applicational services and protocols, transport and network protocols, and corresponding security solutions.
  • Explain the vulnerabilities of main wireless and mobile technologies, and corresponding security solutions.
  • Identify the types of security attacks stemming from vulnerabilities of TCP/IP protocol stack.
  • Explore network operational security using tools for protocol analysis.
  • Apply secure protocol solutions in support of network applications and services from an end-to-end perspective.

Program

  • Introduction to security in TCP/IP Networks
  • Identification and classification of vulnerabilities
  • Models and types of attacks
  • Security of application services and protocols (HTTPS, email, DNS, BGP)
  • End-to-end data transport security: TLS/TCP, QUIC/UDP protocols
  • Network-level security: IPv4 vs IPv6, IPSec, VPNs
  • Security in wireless and mobile networks
  • Network operational security: protocol analysis

Bibliography

  • Stallings W., “Cryptography and Network Security: Principles and Practice”, Pearson, 8th Edition, ISBN: 978-1292437484, June 2022.
  • Stallings W., Brown L., “Computer Security Principles and Practice”, Pearson, 5th Edição, ISBN-13: 9780138091712, July 2023.
  • Sriram, K. and Montgomery, D., “Resilient Interdomain Traffic Exchange: BGP Security and DDoS Mitigation”, NIST Special Publication (NIST SP), 2019, [online], https://doi.org/10.6028/NIST.SP.800-189, (Accessed June, 2024).
  • Rose S. et al., “Trustworthy Email”, NIST Special Publication (NIST SP), 2019, [online], https://doi.org/10.6028/NIST.SP.800-177r1 (Accessed June, 2024).
  • Barker E. et al., “Guide to IPsec VPNs”, NIST Special Publication (NIST SP), 2020, [online], https://doi.org/10.6028/NIST.SP.800-77r1 (Accessed June, 2024). Mapa III - Serviços e Protocolos Multimédia

Updated: