|Course Title||Securing Fixed and Wireless Networks|
Tuesday 16:00 - 18:00 Week1-10 CLB5
Friday 12:00 - 14:00 Week1-10 CLB5
Timetable for all classes
LIC: K-17 501L (please seek prior appointment by sending email to firstname.lastname@example.org)
|Units of Credit||6|
To provide an in-depth introduction to a wide range of topics in the field of Wireless Network Security. To get a hands-on understanding of the security issues in wireless networks. Assumed Knowledge
Before commencing this course, students should:
After completing this course:
This course contributes to the development of the following graduate capabilities:
|Graduate Capability||Acquired in|
capable of independent and collaborative
enquiry, rigorous in their analysis, critique and reflection, and able
to innovate by applying their knowledge and skills to the solution of
novel as well as routine real world problems,
the project have been specifically designed so that students can gain the required analytical skills for solving real world problems
|Entrepreneurial leaders capable of initiating and embracing innovation and change, as well as engaging and enabling others to contribute to change||
the students will have to work in a group to accomplish their goals, guest lectures from industry
|Professionals capable of ethical, self- directed practice and independent life long learning||
Labs, assignment, in-class interactions
|Global citizens who are culturally adept and capable of respecting diversity and acting in a socially just and responsible way||
interaction with your fellow students
The main objective of this course is to encourage students to be creative and being able to think outside the box. Students should be able to relate new ideas to previous knowledge or real world experience. The student experience will consist of lectures (3-4 hrs per week) for the first 7-8 weeks. A set of review/quiz questions is provided to help reinforce the main ideas introduced during the lecture (There are no formal tutorials in this course). At least some part of assessment should be based on real world experiences. COMP4337/9337 uses of hands on laboratory sessions aimed at supporting problem based learning to enhance student-learning experience. The student experience will be supported by on-line access to materials. Finally, students will be required to complete a project by either writing programs, analysing security vulnerabilities propose solution or a research report (Details TBA) .
This course is an elective and focussed on acquiring basic theoretical network security skills as well as hands-on skills that will prepare students for the cybersecurity industry as well as R&D oriented jobs.
The Student Code of Conduct ( Information , Policy ) sets out what the University expects from students as members of the UNSW community. As well as the learning, teaching and research environment, the University aims to provide an environment that enables students to achieve their full potential and to provide an experience consistent with the University's values and guiding principles. A condition of enrolment is that students inform themselves of the University's rules and policies affecting them, and conduct themselves accordingly.
In particular, students have the responsibility to observe standards of equity and respect in dealing with every member of the University community. This applies to all activities on UNSW premises and all external activities related to study and research. This includes behaviour in person as well as behaviour on social media, for example Facebook groups set up for the purpose of discussing UNSW courses or course work. Behaviour that is considered in breach of the Student Code Policy as discriminatory, sexually inappropriate, bullying, harassing, invading another's privacy or causing any person to fear for their personal safety is serious misconduct and can lead to severe penalties, including suspension or exclusion from UNSW.
Plagiarism is defined as using the words or ideas of others and presenting them as your own. UNSW and CSE treat plagiarism as academic misconduct, which means that it carries penalties as severe as being excluded from further study at UNSW. There are several on-line sources to help you understand what plagiarism is and how it is dealt with at UNSW:
Make sure that you read and understand these. Ignorance is not accepted as an excuse for plagiarism. In particular, you are also responsible that your assignment files are not accessible by anyone but you by setting the correct permissions in your CSE directory and code repository, if using. Note also that plagiarism includes paying or asking another person to do a piece of work for you and then submitting it as your own work.
UNSW has an ongoing commitment to fostering a culture of learning informed by academic integrity. All UNSW staff and students have a responsibility to adhere to this principle of academic integrity. Plagiarism undermines academic integrity and is not tolerated at UNSW. Plagiarism at UNSW is defined as using the words or ideas of others and passing them off as your own.
If you haven't done so yet, please take the time to read the full text of
The pages below describe the policies and procedures in more detail:
You should also read the following page which describes your rights and responsibilities in the CSE context:
Communications via E-Mail: email@example.com
(1) All students MUST read 'Notices' from the course web-site for any updates or notices regularly. Students must also check their unsw (or redirected) e- mail regularly for announcements regarding this course. Please note that we are using WebCMS for course delivery and improved learning. Students must checkWebCMS regularly. Missing a notification is not a valid excuse at any point.
(2) Students must follow the proper communication channels. These are clearly specified on WebCMS.
Note: Do not send direct emails to LIC, Administrator, etc. via their personal email addresses. Emails received at private accounts will not be read and automatically deleted without reply. All communications must occur through Moodle.
Special Considerations / Supplementary Examination
All students with approved letter from UNSW Disability Support must upload their letters through the designated link on Moodle. Students should not use email for such requests. The Course Admin will reply to the student letter issued from Disability Support and will apply any requirement specified in the letter throughout the semester.
For any unexpected incident that the student requires Special Consideration (e.g. illness affecting reaching a deadline, or missing a Quiz), the student must submit a Special Consideration request through the designated link on Moodle. In fact, as per the university policy, all Special Consideration requests have to be submitted through the central system. Hence, please refer to the designated link on Moodle and follow the instructions. Your LIC will decide as per documents you provide there. Email requests about special consideration sent to course admin and LIC will not be attended to.
The following cases may be considered:
(1) A student has submitted a fully documented request for Special Consideration within 3 days of the assignments or examination. The medical or other evidence is clearly of a nature to affect the student's performance seriously (minor ailments such as cold, headache - unless chronic, or severe enough to require prescribed medication, will not be considered). Feeling 'unwell', for instance does not excuse a poor result. In simple terms, not all applications are automatically accepted.
(2) A student's performance during the semester, particularly in the lab and research reports has been of satisfactory standard. Students who perform poorly in such assessment components will not be granted a supplementary exam.
(3) A supplementary assessment will be arranged at a suitable time by the school/lecturer-in-charge.
If you miss a quiz, we will not be able to organise a supplementary. We will offer scaling up your final exam grades subject to meeting the special consideration policy.
Re-Assessment Policy: The University has a policy for review of results that allows students who believe there has been an error in the calculation of their final mark to appeal that mark. There currently may be a fee attached to applying for a re-mark which is refunded only if the mark changes substantially upwards. UNSW Student Central will advise of the current policy on applying this fee. There is also a 15 working day time limit in applying for a review of marks. See: https://student.unsw.edu.au/results.
Students are able to apply for an "administrative check" that all sections of their final exam have been marked, and all marks and assessment task marks have been correctly entered into the calculation of the final mark. The fee for this is nominal.
Students may also apply for a "re-assessment" or "re-mark" of a piece of work. The fee for this is substantial. The re-mark is done using the same marking scheme as was used originally. Normally this will be done by a person other than the original marker. If the re-marker feels that an error in marking has been made then they will consult with the original marker where relevant as to the correct interpretation of the mark scheme.
A re-mark may result in the allocated mark increasing, staying the same or decreasing.
Students should note that it is rare in a large class for there to be a change in the mark following a re-mark. Before applying for a re-mark the student should have consulted with the Course Convenor on their performance in the course.
|Assignment||Security Analysis/Research Report||TBA||20%||1,...|
||All topics||5 Labs, Weeks TBA||20%||1,2,...|
Note: A double pass is applicable to this course where students must achieve 40% in the final exam to pass this subject. LIC reserves right to apply harmonic mean between final exam and other components. Also, scaling can be applied to any component. If scaling upwards is applied to final examination, no further consideration for double pass will be entertained for border line course. Failure based on double pass will not quality for a supplementary examination.
Course Overview, Security in IP protocol stack Network Security, Crypto intro
Wireless LAN, Stream Ciphers, symmetric key ciphers
|3||Authentication, Key distribution/Kerberso, PGP, SSL, TLS, PKI||No||something||-||
Network Layer Security, IPSec
Authentication and Authorisation in WLAN, 801.X EAP
|No||Lab3 -MiTM, Evil Twin||Ass. release||
Intrusion Detection/Prevention System, Guest Lecture
|No||Lab4- Sec Analysis Wireshark||-||
Introduction to BluetoothSecurityBroadcast Authentication, MerkleTree
|No||lab-5 Snort IDS||
||* Due dates tentative please check notice/specs||-||-||-|
||* Lecture order may change, new topics via guest lecture|
Texts and recommended readings:
This course does not have a prescribed textbook. Most of the content presented will multiple books, on-line materials, conference proceedings, journal articles, etc. A list of references related to each week's lecture content will be made available on the course webpage.
Students are expected to read articles/papers as directed. Lecture notes will have reference to appropriate sections (and other material)
The following is a list of reference textbooks, which may be useful. Students are not required to purchase these.
Students will find the following Network Security Knowledge Area (and other KAs from this site) useful for this subject and other security topics:
Student feedback on this course, and on the lecturing in this course, will be gathered via myExperience portal. Student feedback is taken seriously, and continual improvements are made to the course based in part on this feedback. The course questionnaire results go to the Head of the School of Computer Science and Engineering, who reads the results and follows up in cases where action is clearly needed
In addition feedback will also be gathered mid-way through the session to gauge the student experience and make any quick changes if required to improve student learning.
The course had highly positive feedback in 2019. There have been requests for improved in-class interactions. This is a two-way process; we will brainstorm some ideas on this at the start of lecture. Lab and project specification and submission requirements will be improved to make them more effective.
Resource created Sunday 02 February 2020, 08:46:23 PM, last modified Monday 10 February 2020, 06:13:02 PM.