CPSC 6128 - Network Security Assignments


Assignment 0 - Introductions
Assignment 1 - Network Security
Hands-on Lab 1 - Footprinting the network
Assignment 2 - Access Control and Site Security
Hands-on Lab 2 - Passwords    (Setting up the VPN client video)
VPN client (14 Meg zip file)
Assignment 3 - Attack Methods, Firewalls
Hands-on Lab 3 - Antivirus Policy
Hands-on Lab 4 - Firewall Policy
Assignment 4 - Host Security
Hands-on Lab 5 - Host Security
Secure Telnet and FTP using Putty
UNIX commands
Assignment 5 - Crytography
Hands-on Lab 6 - Encryption
Assignment 6 - Application Security
Hands-on Lab 7 - Email Security    (Encrypting a file using pgp video)
    (Decrypting a file using pgp video)
Assignment 7 - Incident and Disaster Response
Assignment 8 - Managing the Security Function
Hands-on Lab 8 - Network Security Auditing
Hands-on Lab 9 - Network Security - Intrusion Detection
Hands-on Lab 10 - Managing Network Security

 

Security Software (from Panko's website)

 

PROJECTS
One of the major requirements for this course is a computer security project or research paper. You will be expected to submit your project in either HTML format suitable for publication on the Internet or Powerpoint. I have listed some example topics below. You may design your own project, but it must be approved by me first. You may work in groups of two on large projects with prior approval. This must be your work. Any material that you use from other sources must be properly cited.

The completed project must be submitted to the Dropbox in WebCT no later than 11:59 p.m. on April 25, 2004. I would like to have a discussion of these projects during the last two weeks of class.
I will be available for help with this projects.

Possible Projects include:

  • Installation and configuration of a Radius server and clients in the SAIL lab
  • Installation and configuration of a router and PIX firewall in the SAIL Lab
  • Installation of a Honeynet
  • Design of a secure wireless network
  • Design of a Security and Assurance of Information Lab (SAIL) (e.g. Creating a Security Laboratory Environment for Education, Research and Outreach)
  • Comparative analysis of different intrusion detection and intrusion prevention systems.
  • Comparative analysis of different wireless security products. [Joe Samples]
  • Comparative analysis of different security assessment toolkits
  • Develop a network security policy for your company / institution (must be a significant enhancement if you already have one)
  • Develop a wireless network security policy for your company / institution
  • OTHER

Possible Papers include:

  • VoIP Security
  • Ultra Wideband Wireless Security
  • Evolution of Encryption [Thomas Manley]
  • Disaster Planning and Recovery
  • Risk Assessment / Management
  • Network Security / Penetration Techniques/ATTACK METHODS [Vikrant Singh]
  • New Developments in Crypto [Joel Hornyak]
  • Wireless Security [Alan Hughes]
  • Executive Threat Briefing [Jeff Hobday]
  • Host and Internet Security [Leonard Miller]
  • RFID [Melia Lewis]
  • Rootkits [Aurelia Smith]
  • OTHER

Your grade will be determined using the following:

  1. Professionalism and Standards (10%)
  2. Organization and Design(10%)
  3. Spelling, Grammar, and Accuracy (10%)
  4. Content (70%)


Click here to return to Wayne's World's homepage: return to Wayne's World


written by Wayne Summers summers_wayne@ColumbusState.edu