Network Security
Objectives
- Understand the problem of network security as a transversal requirement to all levels of the TCP/IP protocol stack.
- Explain the vulnerabilities of main applicational services and protocols, transport and network protocols, and corresponding security solutions.
- Explain the vulnerabilities of main wireless and mobile technologies, and corresponding security solutions.
- Identify the types of security attacks stemming from vulnerabilities of TCP/IP protocol stack.
- Explore network operational security using tools for protocol analysis.
- Apply secure protocol solutions in support of network applications and services from an end-to-end perspective.
Program
- Introduction to security in TCP/IP Networks
- Identification and classification of vulnerabilities
- Models and types of attacks
- Security of application services and protocols (HTTPS, email, DNS, BGP)
- End-to-end data transport security: TLS/TCP, QUIC/UDP protocols
- Network-level security: IPv4 vs IPv6, IPSec, VPNs
- Security in wireless and mobile networks
- Network operational security: protocol analysis
Bibliography
- Stallings W., “Cryptography and Network Security: Principles and Practice”, Pearson, 8th Edition, ISBN: 978-1292437484, June 2022.
- Stallings W., Brown L., “Computer Security Principles and Practice”, Pearson, 5th Edição, ISBN-13: 9780138091712, July 2023.
- Sriram, K. and Montgomery, D., “Resilient Interdomain Traffic Exchange: BGP Security and DDoS Mitigation”, NIST Special Publication (NIST SP), 2019, [online], https://doi.org/10.6028/NIST.SP.800-189, (Accessed June, 2024).
- Rose S. et al., “Trustworthy Email”, NIST Special Publication (NIST SP), 2019, [online], https://doi.org/10.6028/NIST.SP.800-177r1 (Accessed June, 2024).
- Barker E. et al., “Guide to IPsec VPNs”, NIST Special Publication (NIST SP), 2020, [online], https://doi.org/10.6028/NIST.SP.800-77r1 (Accessed June, 2024).
Mapa III - Serviços e Protocolos Multimédia